ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation.
Naser DamerKiran B. RajaMarius SüßmilchSushma VenkateshFadi BoutrosMeiling FangFlorian KirchbuchnerRaghavendra RamachandraArjan KuijperPublished in: CoRR (2021)
Keyphrases
- countermeasures
- generation process
- malicious users
- attack detection
- malicious attacks
- denial of service attacks
- generation method
- attack scenarios
- data corruption
- ddos attacks
- differential power analysis
- power analysis
- dos attacks
- human faces
- cyber attacks
- block cipher
- security risks
- security vulnerabilities
- network intrusions
- face images
- information security
- fault injection
- injection attacks
- network intrusion
- denial of service
- digital watermark
- intrusion detection system
- detect malicious
- normal traffic
- phishing attacks
- security measures
- normal behavior
- computer security
- intrusion detection
- security threats
- buffer overflow
- attack graphs
- facial animation
- defense mechanisms
- facial features
- anomaly detection