Security

On the Vulnerability of Face Verification Systems to Hill-Climbing Attacks

Free registration required

Executive Summary

In this paper, the authors use a general hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution computed from an independent set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an Eigenface-based and a Parts-base face verification system using the XM2VTS database. Experimental results demonstrate that the hill-climbing algorithm is very efficient and is able to bypass over 85% of the attacked accounts (for both face recognition systems).

  • Format: PDF
  • Size: 735.3 KB