TY - GEN
T1 - Vulnerabilities in binary face template
AU - Feng, Yi C.
AU - Yuen, Pong C.
N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - It is generally believed that original face image is hard to be reconstructed from its binary face template and therefore, binary face template is secure. In this paper, we find that binary template is not secure and can be attacked by a masquerade attack. A masquerade face image, which may not "look" similar with the original image, is constructed from binary templates and then employed to access the system. Experimental results show that the successful attacking rate on CMU-PIE and FRGC databases are 100% and 77.14% in around 8 and 33 seconds in a personal computer, respectively.
AB - It is generally believed that original face image is hard to be reconstructed from its binary face template and therefore, binary face template is secure. In this paper, we find that binary template is not secure and can be attacked by a masquerade attack. A masquerade face image, which may not "look" similar with the original image, is constructed from binary templates and then employed to access the system. Experimental results show that the successful attacking rate on CMU-PIE and FRGC databases are 100% and 77.14% in around 8 and 33 seconds in a personal computer, respectively.
UR - http://www.scopus.com/inward/record.url?scp=84865029154&partnerID=8YFLogxK
U2 - 10.1109/CVPRW.2012.6239223
DO - 10.1109/CVPRW.2012.6239223
M3 - Conference proceeding
AN - SCOPUS:84865029154
SN - 9781467316118
T3 - IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops
SP - 105
EP - 110
BT - 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2012
T2 - 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2012
Y2 - 16 June 2012 through 21 June 2012
ER -