Attack 2 - -2c, -c, c, 2c, 3c) to the current synthetic...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Attack 2: Bypass Sensor Adler 2003 •Hill-climbing attack forthreewell known commercial face recognition systems •Attack: •Select an initial image from a local database, based on the highest matching  score •At each iteration, successively add an eigenfacemultiplied with 6 constants (-3c, 
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: -2c, -c, c, 2c, 3c) to the current synthetic image: keep the change that results in the best matching score improvement Crop the gray scale values if they are outside the image capacity (8 bit ? 0-255 values are allowed) Continue till the system is compromised...
View Full Document

Ask a homework question - tutors are online