Hackers can now use social media photos to bypass face detection security

Udi Tirosh

Udi Tirosh is an entrepreneur, photography inventor, journalist, educator, and writer based in Israel. With over 25 years of experience in the photo-video industry, Udi has built and sold several photography-related brands. Udi has a double degree in mass media communications and computer science.

social-media-security-01

The internet is slowly (and painfully) discovering that security is a hard mistress. I mean fingerprints have been hacked, and passwords have not been delivering for a long time. Next step was having a camera look at your face to see if you are really you.

Of course, the early systems could be hacked with a high quality printed photo. So security added a “check if it’s alive” method. That in turn was hacked using tablets and videos. The next step was to check if the received images makes sense (so videos were out). But then hackers started using 3D printed masks.

But 3D masks are hard to create. Why not just grab a few of your social media photos, and use those to create a model that looks so real that it fools security systems.

And this is what the team at University of North Carolina did.

Turns out, it is not that hard. All they needed is 2 front facing photos off social media and 2-3 side facing photos and then they own you. And really, who does not have at least 5 (cross that, 5 million) online photos of themselves.

social-media-security-03

Here is how it works:

  1. First the team needs them photos. Instagram, facebook, twitter, anything goes, tough, obviously, higher res is better.
  2. Your face is being extracted from the photos, and your mouth, nose, eyes and other features are modeled.
  3. Any weird textures are smoothed out
  4. Your gaze (a.k.a eyes) are replaced with “real eyes”
  5. and they even add blinking, eyebrow movement and a other expressions

The team fooled the system so well that in some cases, they got through 97.5% of the times (where a real person got through 98% of the times).

What can you do now? well, the team offers at least two methods of killing this attack:

  • adding an infrared scan of the face or
  • projecting a pattern and looking for it in the analyzing software.

social-media-security-02

Till we have better detection systems, know that you are exposed.

[Virtual U | The University of North Carolina at Chapel Hill]


Filed Under:

Tagged With:

Find this interesting? Share it with your friends!

Udi Tirosh

Udi Tirosh

Udi Tirosh is an entrepreneur, photography inventor, journalist, educator, and writer based in Israel. With over 25 years of experience in the photo-video industry, Udi has built and sold several photography-related brands. Udi has a double degree in mass media communications and computer science.

Join the Discussion

DIYP Comment Policy
Be nice, be on-topic, no personal information or flames.

Leave a Reply

Your email address will not be published. Required fields are marked *

7 responses to “Hackers can now use social media photos to bypass face detection security”

  1. Michael Thomas Ireland Avatar

    This is why my studio is only equipped with the latest 3d phallus scanning technology .Want to steal my gears? Gotta find a picture of my dong on the internet or scan it manually. The first method isn’t possible as I don’t take random pictures of my junk. As for the second, I’m married, so good luck getting past my rabid wildebeest of a spouse.

    1. max webb Avatar
      max webb

      can you please teach me?

  2. DLS Avatar
    DLS

    I haven’t encountered anything that uses plain face recognition as a method of authentication, so what exactly is the point of this?
    Seems to me these guys went to a lot of trouble to hack a hypothetical security system that no one uses or cares about.

    1. Walien Avatar

      My phone use it.

      1. DLS Avatar
        DLS

        Time to replace that toy with a real phone with fingerprint or iris recognition then.
        Or just use a PIN, have the phone lock after 10 attempts.

  3. Stacey Little Avatar
    Stacey Little

    COMPUTERGEEK351@GMAIL.COM is highly respected and recommended. He helped me
    get back the $100k i lost to a scam broker, helped me catch my cheating
    partner and also helped my friend recover his money from ETfinance. You
    can contact him if you need help and want great results

  4. Paul Dunn Avatar
    Paul Dunn

    you can use a online non voip disposable phone number from https://textita.com for phone verification