MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders.
Naser DamerMeiling FangPatrick SiebkeJan Niklas KolfMarco HuberFadi BoutrosPublished in: IWBF (2023)
Keyphrases
- denial of service
- buffer overflow
- attack graphs
- countermeasures
- recognition algorithm
- dos attacks
- security risks
- security vulnerabilities
- malicious attacks
- recognition engine
- malicious users
- recognition scheme
- expression recognition
- attack detection
- differential power analysis
- denial of service attacks
- attack graph
- recognition rate
- handwritten digits
- object recognition
- human recognition
- denoising
- power analysis
- cyber attacks
- security threats
- facial expressions
- phishing attacks
- data corruption
- attack scenarios
- network intrusion
- ddos attacks
- fault injection
- network security
- recognition accuracy
- penetration testing
- face recognition algorithms
- face images
- image quality
- diffusion process
- injection attacks
- feature extraction
- method for face recognition
- biometric systems
- intrusion detection
- information leakage
- human faces
- smart card
- digital watermark
- network attacks
- information security
- noise level
- anisotropic diffusion
- watermarking scheme
- defense mechanisms
- security mechanisms