Categories: Technology Facts

The hack that could make face recognition think someone else is youon August 5, 2020 at 11:00 am

“If we go in front of a live camera that is using facial recognition to identify and interpret who they’re looking at and compare that to a passport photo, we can realistically and repeatedly cause that kind of targeted misclassification,” said the study’s lead author, Steve Povolny.

How it works

To misdirect the algorithm, the researchers used an image translation algorithm known as CycleGAN, which excels at morphing photographs from one style into another. For example, it can make a photo of a harbor look as if it were painted by Monet, or make a photo of mountains taken in the summer look like it was taken in the winter.

Examples of how cycleGAN morphs photos from one style into another, including turning a photo into a Monet, a horse into a zebra, and a summer landscape into a winter landscape.Examples of how cycleGAN morphs photos from one style into another, including turning a photo into a Monet, a horse into a zebra, and a summer landscape into a winter landscape.

JUN-YAN ZHU AND TAESUNG PARK ET AL.

The McAfee team used 1,500 photos of each of the project’s two leads and fed the images into a CycleGAN to morph them into one another. At the same time, they used the facial recognition algorithm to check the CycleGAN’s generated images to see who it recognized. After generating hundreds of images, the CycleGAN eventually created a faked image that looked like person A to the naked eye but fooled the face recognition into thinking it was person B.

The intermediate stages of CycleGAN morphing person A into person BThe intermediate stages of CycleGAN morphing person A into person B

MCAFEE

While the study raises clear concerns about the security of face recognition systems, there are some caveats. First, the researchers didn’t have access to the actual system that airports use to identify passengers and instead approximated it with a state-of-the-art, open-source algorithm. “I think for an attacker that is going to be the hardest part to overcome,” Povolny says, “where [they] don’t have access to the target system.” Nonetheless, given the high similarities across face recognition algorithms, he thinks it’s likely that the attack would work even on the actual airport system.

Second, today such an attack requires lots of time and resources. CycleGANs need powerful computers and expertise to train and execute.

Read More

Recent Posts

5 Ways To Improve Your Business Scalability With Outsourcing

A business can develop in many ways. One of the best ways to grow your…

18 hours ago

Shopping Trends for Back-to-School in 2025: Where Astute Parents Are Locating the Greatest Deals

American families are once again juggling the seasonal custom—and financial burden—of back-to-school shopping as the…

3 days ago

5 Unconventional Ways To Connect With Your Teenager

Want to bond over unexpected activities? Look at these unconventional ways to connect with your…

4 days ago

Managing Burnout as a Homeschool Mom of Littles

Burnout isn’t just something that happens to CEOs. For moms homeschooling littles, it’s a very…

4 days ago

Long Hauls Made Easy: Touring Features That Make BMW Motorcycles a Top Choice

When it comes to long-distance motorcycling, comfort, reliability, and smart engineering can make or break…

4 days ago

Why More People Are Choosing To Order Flowers In Sydney Online?

Flowers have seen significant transformation over time; online flower shopping is increasingly common now for…

4 days ago