skip to main content
10.1145/3577164.3577170acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvsipConference Proceedingsconference-collections
research-article

Recapture Detection to Fight Deep Identity Theft

Published:04 April 2023Publication History

ABSTRACT

The progress made in deep learning has allowed the deployment of more powerful biometric authentication systems instead of traditional ones based on passwords or PIN codes. Facial recognition is widely used on smartphones to grant user access. However, advances in deep learning also improve methods for doctoring images and videos. A fraudulent user can use these methods to steal the identity of another person. It is very easy for impostors to present to the smartphone an image or video of the victim's face displayed on another screen. In this paper, we describe the security risks when a facial recognition system is attacked by presenting an image, a video or an interactive deepfake displayed on a screen. We also present a deep learning-based method to detect this kind of attack.

References

  1. Changsha, ‎ZAO. 2019.Google ScholarGoogle Scholar
  2. I. Perov , « DeepFaceLab: A simple, flexible and extensible face swapping framework », ArXiv200505535 Cs Eess, 2020.Google ScholarGoogle Scholar
  3. A. Siarohin , « First Order Motion Model for Image Animation », 2019.Google ScholarGoogle Scholar
  4. J. Galbally , « Biometric Antispoofing Methods: A Survey in Face Recognition », IEEE Access, vol. 2, 2014.Google ScholarGoogle Scholar
  5. C. Lu and X. Tang, « Surpassing Human-Level Face Verification Performance on LFW with GaussianFace », ArXiv14043840, 2014.Google ScholarGoogle Scholar
  6. Y. Taigman , « DeepFace: Closing the Gap to Human-Level Performance in Face Verification », in Conference on Computer Vision and Pattern Recognition, USA, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G.G. Patil and R.K. Banyal, « A Dynamic Unconstrained Feature Matching Algorithm for Face Recognition », in Journal of Advances in Information Technology, 2020.Google ScholarGoogle Scholar
  8. J.A. Moreano and N.L. Palomino, « Global Facial Recognition Using Gabor Wavelet, Support Vector Machines and 3D Face Models », in Journal of Advances in Information Technology, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  9. P. Easom-Mccaldin , « Towards Building A Facial Identification System Using Quantum Machine Learning Techniques », 2022.Google ScholarGoogle ScholarCross RefCross Ref
  10. Chandra ., « Application of "Face Recognition" Technology for Class Room Electronic Attendance Management System », in International Conference on ICT for Smart Society, 2020.Google ScholarGoogle Scholar
  11. Z. Luo and S.-T. Wu, « OLED Versus LCD: Who Wins? », 2015.Google ScholarGoogle Scholar
  12. H. Cao and A. C. Kot, « Identification of recaptured photographs on LCD screens », in International Conference on Acoustics, Speech and Signal Processing, USA, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. H. Muammar and P. L. Dragotti, « An investigation into aliasing in images recaptured from an LCD monitor using a digital camera », in International Conference on Acoustics, Speech and Signal Processing, Canada, 2013.Google ScholarGoogle Scholar
  14. B. M. Adam Novoz, « Detecting Cyclostationarity in Re-Captured LCD Screens », J. Forensic Res., vol. 06, no 04, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  15. Y. Ke , « Image Recapture Detection Using Multiple Features », Int. J. Multimed. Ubiquitous Eng., vol. 8, no 5, 2013.Google ScholarGoogle Scholar
  16. P. Yang , « Recapture Image Forensics Based on Laplacian Convolutional Neural Networks », in IWDW, 2017.Google ScholarGoogle Scholar
  17. H. Li , « Image Recapture Detection with Convolutional and Recurrent Neural Networks », Electron. Imaging, vol. 2017, no 7, 2017.Google ScholarGoogle Scholar
  18. E. Abraham, « Moiré Pattern Detection using Wavelet Decomposition and Convolutional Neural Network », in Symposium Series on Computational Intelligence (SSCI), India, 2018.Google ScholarGoogle Scholar
  19. X. Gao , « A Smart Phone Image Database for Single Image Recapture Detection », in Digital Watermarking, vol. 6526, 2011.Google ScholarGoogle Scholar
  20. S. Agarwal , « A Diverse Large-Scale Dataset for Evaluating Rebroadcast Attacks », in International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, 2018.Google ScholarGoogle Scholar
  21. T. Thongkamwitoon , « An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles », IEEE Trans. Inf. Forensics Secur., vol. 10, no 5, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T.-Y. Lin , « Microsoft COCO: Common Objects in Context », ArXiv14050312 Cs, 2015.Google ScholarGoogle Scholar
  23. M. Tan et Q. V. Le, « EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks », ArXiv190511946 Cs Stat, 2020.Google ScholarGoogle Scholar

Index Terms

  1. Recapture Detection to Fight Deep Identity Theft
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          VSIP '22: Proceedings of the 2022 4th International Conference on Video, Signal and Image Processing
          November 2022
          165 pages
          ISBN:9781450397810
          DOI:10.1145/3577164

          Copyright © 2022 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 April 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)53
          • Downloads (Last 6 weeks)14

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format