Abstract: 3D face recognition is subject to frequent spoofing attacks, in which 3D face presentation attack is one of the most notorious attacks. The attacker takes advantages of 3D scanning and printing techniques to generate masks of targets, which has found success in numerous real-life examples. The salient feature in such attacks is to obtain 3D face models through 3D scanning, though relatively more expensive and inconvenient when comparing with 2D photos. In this work, we propose a new method, DREAM, to recover 3D face models from single 2D image. Specifically, we adopt a black-box approach, which recovers ‘sufficient’ depths to defeat target recognition models (e.g., face identification and face authentication models) by accessing its output and the corresponding RGB photo. The key observation is that it is not necessary to restore the true value of depths, but only need to recover the essential features relevant to the target model. We used four public 3D face datasets to verify the effectiveness of DREAM. The experimental results show that DREAM can achieve a success rate of 94\% on face authentication model, even in cross-dataset testing, and a success rate of 36\% on face identification model.
Primary Subject Area: [Experience] Multimedia Applications
Secondary Subject Area: [Content] Vision and Language
Relevance To Conference: 3D face recognition technology is a popular and important multimedia application. Through 3D face recognition technology, multimedia applications can offer more personalized and intelligent functionalities. Meanwhile, 3D face recognition plays a gatekeeper role in volumetric video calls and VR games. However, the security of 3D face recognition has not been extensively studied. This is particularly crucial for aspects such as identity verification and access control in multimedia applications. In this work, we investigate the vulnerability of RGB-D face recognition systems through a new attack method and conduct extensive experiments on three face recognition systems and four datasets. This contributes to enhancing security and privacy in multimedia applications.
Submission Number: 585
Loading