MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders.
Naser DamerMeiling FangPatrick SiebkeJan Niklas KolfMarco HuberFadi BoutrosPublished in: CoRR (2023)
Keyphrases
- denial of service
- dos attacks
- buffer overflow
- recognition algorithm
- countermeasures
- attack graphs
- security risks
- security vulnerabilities
- recognition engine
- denial of service attacks
- recognition scheme
- recognition accuracy
- malicious users
- attack detection
- recognition rate
- attack graph
- object recognition
- malicious attacks
- human recognition
- differential power analysis
- attack scenarios
- data corruption
- handwritten digits
- cyber attacks
- power analysis
- expression recognition
- fault injection
- denoising
- network security
- method for face recognition
- ddos attacks
- feature extraction
- image quality
- human faces
- penetration testing
- facial expressions
- distributed denial of service attacks
- anisotropic diffusion
- phishing attacks
- face images
- diffusion process
- security threats
- face recognition
- malicious activities
- information leakage
- intrusion detection
- digital watermark
- character recognition
- biometric systems