skip to main content
10.1145/2756601.2756617acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A Negative Number Vulnerability for Histogram-based Face Recognition Systems

Published:17 June 2015Publication History

ABSTRACT

A popular method of face identification is the use of local binary pattern (LBP) histograms. In this method, a face image is partitioned into regions, and a histogram of features is produced for each region; faces are compared by measuring the similarity of their histograms through statistics such as chi-square score or K-L divergence. Comparison of histograms, however, is particularly prone to exploitation via a negative-number bug if coded naively. This allows a surprisingly precise and powerful attack: if an adversary can alter a histogram to change a single zero to a negative number of appropriate magnitude, the change will induce a negligible difference in matching under ordinary use, but match an attacker to an intended victim if the attacker briefly displays a printed striped pattern to a camera. This tampering is minor and can be inflicted long before the attack, allowing the insertion of a back door in a face recognition system that will behave normally until the moment of exploitation. We exhibit an example of this bug in the wild, in the OpenCV computer vision library, and illustrate the effectiveness of this attack in impersonating multiple victims.

References

  1. T. Ahonen, A. Hadid, and M. Pietikainen. Face description with local binary patterns: Application to face recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 28(12):2037--2041, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Craver and A. Farrokh baroughi. The non-trusty clown attack on model-based speaker recognition systems. In SPIE/IS&T Electronic Imaging: Media Watermarking, Security, and Forensics, 2015.Google ScholarGoogle Scholar
  3. Z. Goldfarb. As elections near, officials challenge balloting security. Washington Post, January 22, 2006.Google ScholarGoogle Scholar
  4. Z. Lingli and L. Jianghuang. Security algorithm of face recognition based on local binary pattern and random projection. In Cognitive Informatics (ICCI), 2010 9th IEEE International Conference on, pages 733--738, July 2010.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. Numerical Recipes in C (2Nd Ed.): The Art of Scientific Computing. Cambridge University Press, New York, NY, USA, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. The OpenCV project. OpenCV (Open Source Computer Vision), July 2013. http://www.opencv.org/.Google ScholarGoogle Scholar

Index Terms

  1. A Negative Number Vulnerability for Histogram-based Face Recognition Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IH&MMSec '15: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security
        June 2015
        182 pages
        ISBN:9781450335874
        DOI:10.1145/2756601

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 June 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        IH&MMSec '15 Paper Acceptance Rate20of45submissions,44%Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader