Vulnerabilities in binary face template

Yi C. Feng*, Pong C. Yuen

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

7 Citations (Scopus)

Abstract

It is generally believed that original face image is hard to be reconstructed from its binary face template and therefore, binary face template is secure. In this paper, we find that binary template is not secure and can be attacked by a masquerade attack. A masquerade face image, which may not "look" similar with the original image, is constructed from binary templates and then employed to access the system. Experimental results show that the successful attacking rate on CMU-PIE and FRGC databases are 100% and 77.14% in around 8 and 33 seconds in a personal computer, respectively.

Original languageEnglish
Title of host publication2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2012
Pages105-110
Number of pages6
DOIs
Publication statusPublished - 2012
Event2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2012 - Providence, RI, United States
Duration: 16 Jun 201221 Jun 2012

Publication series

NameIEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops
ISSN (Print)2160-7508
ISSN (Electronic)2160-7516

Conference

Conference2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2012
Country/TerritoryUnited States
CityProvidence, RI
Period16/06/1221/06/12

Scopus Subject Areas

  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Vulnerabilities in binary face template'. Together they form a unique fingerprint.

Cite this