Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image.
Nan JiangBangjie SunTerence SimJun HanPublished in: USENIX Security Symposium (2024)
Keyphrases
- face images
- face recognition
- human faces
- biometric recognition
- authentication systems
- facial expressions
- face databases
- facial features
- low resolution
- face model
- face verification
- principal component analysis
- face recognition systems
- pose variations
- illumination variations
- face recognition algorithms
- frontal view
- feature vectors
- input image
- feature extraction
- face detection
- high resolution
- face representation
- training set
- facial images
- feature points
- age estimation
- low resolution face images
- real time
- biometric authentication
- image database
- motion estimation
- image processing