2 research outputs found
Child Face Age-Progression via Deep Feature Aging
Given a gallery of face images of missing children, state-of-the-art face
recognition systems fall short in identifying a child (probe) recovered at a
later age. We propose a feature aging module that can age-progress deep face
features output by a face matcher. In addition, the feature aging module guides
age-progression in the image space such that synthesized aged faces can be
utilized to enhance longitudinal face recognition performance of any face
matcher without requiring any explicit training. For time lapses larger than 10
years (the missing child is found after 10 or more years), the proposed
age-progression module improves the closed-set identification accuracy of
FaceNet from 16.53% to 21.44% and CosFace from 60.72% to 66.12% on a child
celebrity dataset, namely ITWCC. The proposed method also outperforms
state-of-the-art approaches with a rank-1 identification rate of 95.91%,
compared to 94.91%, on a public aging dataset, FG-NET, and 99.58%, compared to
99.50%, on CACD-VS. These results suggest that aging face features enhances the
ability to identify young children who are possible victims of child
trafficking or abduction.Comment: arXiv admin note: substantial text overlap with arXiv:1911.0753
Multiple-Identity Image Attacks Against Face-based Identity Verification
Facial verification systems are vulnerable to poisoning attacks that make use
of multiple-identity images (MIIs)---face images stored in a database that
resemble multiple persons, such that novel images of any of the constituent
persons are verified as matching the identity of the MII. Research on this mode
of attack has focused on defence by detection, with no explanation as to why
the vulnerability exists. New quantitative results are presented that support
an explanation in terms of the geometry of the representations spaces used by
the verification systems. In the spherical geometry of those spaces, the
angular distance distributions of matching and non-matching pairs of face
representations are only modestly separated, approximately centred at 90 and
40-60 degrees, respectively. This is sufficient for open-set verification on
normal data but provides an opportunity for MII attacks. Our analysis considers
ideal MII algorithms, demonstrating that, if realisable, they would deliver
faces roughly 45 degrees from their constituent faces, thus classed as matching
them. We study the performance of three methods for MII generation---gallery
search, image space morphing, and representation space inversion---and show
that the latter two realise the ideal well enough to produce effective attacks,
while the former could succeed but only with an implausibly large gallery to
search. Gallery search and inversion MIIs depend on having access to a facial
comparator, for optimisation, but our results show that these attacks can still
be effective when attacking disparate comparators, thus securing a deployed
comparator is an insufficient defence.Comment: 13 pages, 7 figure