Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack.
Hadi MansourifarWeidong ShiPublished in: CoRR (2020)
Keyphrases
- face recognition systems
- face images
- face verification
- face recognition
- face matching
- robust face recognition
- attack graphs
- high resolution
- face recognition algorithms
- facial appearance
- human faces
- feret database
- illumination variations
- face identification
- facial expressions
- penetration testing
- attack graph
- facial features
- illumination normalization
- buffer overflow
- three dimensional
- frontal view
- face recognition grand challenge
- feature extraction
- multi class
- computer vision
- face representation
- recognition algorithm
- dos attacks
- pose variations
- recognition accuracy
- face detection
- detection method
- feature points
- recognition rate
- input image
- training set
- multiscale
- image processing