Security Implications of Deepfakes in Face Authentication

dc.contributor.authorŠalko, Milancs
dc.contributor.authorFirc, Antoncs
dc.contributor.authorMalinka, Kamilcs
dc.date.issued2024-04-08cs
dc.description.abstractDeepfakes are media generated by deep learning and are nearly indistinguishable from real content to humans. Deepfakes have seen a significant surge in popularity in recent years. There have been numerous papers discussing their effectiveness in deceiving people. What's equally, if not more concerning, is the potential vulnerability of facial and voice recognition systems to deepfakes. The misuse of deepfakes to spoof automated facial recognition systems can threaten various aspects of our lives, including financial security and access to secure locations. This issue remains largely unexplored. Thus, this paper investigates the technical feasibility of a spoofing attack on facial recognition. Firstly, we perform a threat analysis to understand what facial recognition use cases allow the execution of deepfake spoofing attacks. Based on this analysis, we define the attacker model for these attacks on facial recognition systems. Then, we demonstrate the ability of deepfakes to spoof two commercial facial recognition systems. Finally, we discuss possible means to prevent such spoofing attacks.en
dc.description.abstractDeepfakes are media generated by deep learning and are nearly indistinguishable from real content to humans. Deepfakes have seen a significant surge in popularity in recent years. There have been numerous papers discussing their effectiveness in deceiving people. What's equally, if not more concerning, is the potential vulnerability of facial and voice recognition systems to deepfakes. The misuse of deepfakes to spoof automated facial recognition systems can threaten various aspects of our lives, including financial security and access to secure locations. This issue remains largely unexplored. Thus, this paper investigates the technical feasibility of a spoofing attack on facial recognition. Firstly, we perform a threat analysis to understand what facial recognition use cases allow the execution of deepfake spoofing attacks. Based on this analysis, we define the attacker model for these attacks on facial recognition systems. Then, we demonstrate the ability of deepfakes to spoof two commercial facial recognition systems. Finally, we discuss possible means to prevent such spoofing attacks.en
dc.formattextcs
dc.format.extent1376-1384cs
dc.format.mimetypeapplication/pdfcs
dc.identifier.citationProceedings of the ACM Symposium on Applied Computing. 2024, p. 1376-1384.en
dc.identifier.doi10.1145/3605098.3635953cs
dc.identifier.isbn979-8-4007-0243-3cs
dc.identifier.orcid0009-0004-9604-168Xcs
dc.identifier.orcid0000-0002-4717-1910cs
dc.identifier.orcid0000-0002-9009-2193cs
dc.identifier.other188029cs
dc.identifier.researcheridHJP-8074-2023cs
dc.identifier.researcheridAAB-5046-2022cs
dc.identifier.scopus57699371300cs
dc.identifier.scopus24824985000cs
dc.identifier.urihttp://hdl.handle.net/11012/252868
dc.language.isoencs
dc.publisherAssociation for Computing Machinerycs
dc.relation.ispartofProceedings of the ACM Symposium on Applied Computingcs
dc.relation.urihttps://dl.acm.org/doi/10.1145/3605098.3635953cs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.accessopenAccesscs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectdeepfakeen
dc.subjectfacial recognitionen
dc.subjectbiometrics systemsen
dc.subjectmachine learningen
dc.subjectcomputer securityen
dc.subjectdeepfake
dc.subjectfacial recognition
dc.subjectbiometrics systems
dc.subjectmachine learning
dc.subjectcomputer security
dc.titleSecurity Implications of Deepfakes in Face Authenticationen
dc.title.alternativeSecurity Implications of Deepfakes in Face Authenticationen
dc.type.driverconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
sync.item.dbidVAV-188029en
sync.item.dbtypeVAVen
sync.item.insts2025.10.14 14:13:19en
sync.item.modts2025.10.14 10:12:26en
thesis.grantorVysoké učení technické v Brně. Fakulta informačních technologií. Ústav inteligentních systémůcs

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3605098.3635953.pdf
Size:
4.84 MB
Format:
Adobe Portable Document Format
Description:
file 3605098.3635953.pdf