Damer, Naser ; Wainakh, Yaza ; Boller, Viola ; Berken, Sven von den ; Terhörst, Philipp ; Braun, Andreas ; Kuijper, Arjan (2018)
CrazyFaces: Unassisted Circumvention of Watchlist Face Identification.
2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). Los Angeles, California (22.10.2018-25.10.2018)
doi: 10.1109/BTAS.2018.8698557
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Once upon a time, there was a blacklisted criminal who usually avoided appearing in public. He was surfing the Web, when he noticed, what had to be a targeted advertisement announcing a concert of his favorite band. The concert was in a near town, and the only way to get there was by train. He was worried, because he heard in the news about the new face identification system installed at the train station. From his last stay with the police, he remembers that they took these special face images with the white background. He thought about what can he do to avoid being identified and an idea popped in his mind “what if I can make a crazy-face, as the kids call it, to make my face look different? What do I exactly have to do? And will it work?”. He called his childhood geeky friend and asked him if he can build him a face recognition application he can tinker with. The geeky friend was always interested in such small projects where he can use open-source resources and didn’t really care about the goal, as usual. The criminal tested the application and played around, trying to figure out how can he make a crazy-face that won’t be identified as himself. On the day of the concert, he took off to the train station with some doubt in his mind and fear in his soul. To know what happened next, you should read the rest of this paper.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2018 |
Autor(en): | Damer, Naser ; Wainakh, Yaza ; Boller, Viola ; Berken, Sven von den ; Terhörst, Philipp ; Braun, Andreas ; Kuijper, Arjan |
Art des Eintrags: | Bibliographie |
Titel: | CrazyFaces: Unassisted Circumvention of Watchlist Face Identification |
Sprache: | Englisch |
Publikationsjahr: | Oktober 2018 |
Veranstaltungstitel: | 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS) |
Veranstaltungsort: | Los Angeles, California |
Veranstaltungsdatum: | 22.10.2018-25.10.2018 |
DOI: | 10.1109/BTAS.2018.8698557 |
URL / URN: | https://doi.org/10.1109/BTAS.2018.8698557 |
Kurzbeschreibung (Abstract): | Once upon a time, there was a blacklisted criminal who usually avoided appearing in public. He was surfing the Web, when he noticed, what had to be a targeted advertisement announcing a concert of his favorite band. The concert was in a near town, and the only way to get there was by train. He was worried, because he heard in the news about the new face identification system installed at the train station. From his last stay with the police, he remembers that they took these special face images with the white background. He thought about what can he do to avoid being identified and an idea popped in his mind “what if I can make a crazy-face, as the kids call it, to make my face look different? What do I exactly have to do? And will it work?”. He called his childhood geeky friend and asked him if he can build him a face recognition application he can tinker with. The geeky friend was always interested in such small projects where he can use open-source resources and didn’t really care about the goal, as usual. The criminal tested the application and played around, trying to figure out how can he make a crazy-face that won’t be identified as himself. On the day of the concert, he took off to the train station with some doubt in his mind and fear in his soul. To know what happened next, you should read the rest of this paper. |
Freie Schlagworte: | Biometrics, Face recognition, Spoofing attacks, Deep learning, CRISP |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Fraunhofer IGD 20 Fachbereich Informatik > Mathematisches und angewandtes Visual Computing |
Hinterlegungsdatum: | 06 Mai 2019 06:35 |
Letzte Änderung: | 08 Mai 2019 10:54 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |