Semantic Adversarial Attacks on Face Recognition Through Significant Attributes

Faculty Computer Science Year: 2023
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Journal of Computational Intelligence Systems Springer Volume:
Keywords : Semantic Adversarial Attacks , Face Recognition Through    
Abstract:
Face recognition systems are susceptible to adversarial attacks, where adversarial facial images are generated without awareness of the intrinsic attributes of the images in existing works. They change only a single attribute indiscriminately. To this end, we propose a new Semantic Adversarial Attack using StarGAN (SAA-StarGAN), which manipulates the facial attributes that are significant for each image. Specifically, we apply the cosine similarity or probability score to predict the most significant attributes. In the probability score method, we train the face verification model to perform an attribute prediction task to get a class probability score for each attribute. Then, we calculate the degree of change in the probability value in an image before and after altering the attribute. Therefore, we perform the prediction process and then alter either one or more of the most significant facial attributes under white-box or black-box settings. Experimental results illustrate that SAA-StarGAN outperforms transformation-based, gradient-based, stealthy-based, and patch-based attacks under impersonation and dodging attacks. Besides, our method achieves high attack success rates on various models in the black-box setting. In the end, the experiments confirm that the prediction of the most important attributes significantly impacts the success of adversarial attacks in both white-box and black-box settings and could improve the transferability of the generated adversarial examples.
   
     
 
       

Author Related Publications

  • Yasmeen Mohamed Mohamed Khedr, "Robust color image hashing using quaternion polar complex exponential transform for image authentication", Springer, 2018 More
  • Yasmeen Mohamed Mohamed Khedr, "Robust image hashing using exact Gaussian Hermite moments", IET The Institute of Engineering and Technology, 2018 More
  • Yasmeen Mohamed Mohamed Khedr, "TransMix: Crafting highly transferable adversarial examples to evade face recognition models", Elsevier (Science Direct), 2024 More
  • Yasmeen Mohamed Mohamed Khedr, "Sampling-Based Teacher Guided Method to Boost Transferable Attack on SAR Image Classification", Frontiers in Artificial Intelligence and Applications, 2024 More
  • Yasmeen Mohamed Mohamed Khedr, "Experimental and numerical modelling of solid and hollow biomass pellets high-temperature rapid oxy-steam combustion: The effect of integrated CO2/H2O concentration", Elsevier, 2021 More

Department Related Publications

  • Nabil Ali Mohamed Lashen, "A SURVEY OF ROUTING PROTOCOLS FOR WIRLESS MESH NETWORKS (WMNS)", AL-AZHAR ENGINEERING TEWELFTH INTERNATIONAL CONFERENCE, 2012 More
  • Khalied Mohamed Hosny, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
  • Hanaa Mohamed Hamza Kamal, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
  • Nabil Ali Mohamed Lashen, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
Tweet