CRAFTING DUAL-IDENTITY FACE IMPERSONATIONS USING GENERATIVE ADVERSARIAL NETWORKS: AN ADVERSARIAL ATTACK METHODOLOGY
Abstract
With the rapid advancement of face recognition systems, security threats posed by adversarial attacks have become increasingly sophisticated. This study presents a novel adversarial methodology for crafting dual-identity face impersonations using Generative Adversarial Networks (GANs). The proposed framework generates synthetic facial images that simultaneously resemble two distinct target identities, thereby enabling high-confidence impersonation across multiple recognition systems. Leveraging a multi-objective loss function, the generator is trained to optimize both identity similarity scores and realism metrics while evading detection from spoofing and liveness classifiers. Extensive evaluations on benchmark datasets such as LFW and CASIA-WebFace demonstrate the effectiveness of the method in deceiving state-of-the-art face verification models with minimal perceptual distortion. The research highlights the vulnerabilities of current biometric systems and underscores the urgent need for robust defense mechanisms against such dual-target adversarial threats.
Keywords
Similar Articles
- Prof. Michael T. Edwards, ENHANCING AI-CYBERSECURITY EDUCATION: DEVELOPMENT OF AN AI-BASED CYBERHARASSMENT DETECTION LABORATORY EXERCISE , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Dr. Kenji Yamamoto, Prof. Lijuan Wang, LEVERAGING DEEP LEARNING IN SURVIVAL ANALYSIS FOR ENHANCED TIME-TO-EVENT PREDICTION , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 05 (2025): Volume 02 Issue 05
- Sara Rossi, Samuel Johnson, NEUROSYMBOLIC AI: MERGING DEEP LEARNING AND LOGICAL REASONING FOR ENHANCED EXPLAINABILITY , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dr. Elias A. Petrova, AN EDGE-INTELLIGENT STRATEGY FOR ULTRA-LOW-LATENCY MONITORING: LEVERAGING MOBILENET COMPRESSION AND OPTIMIZED EDGE COMPUTING ARCHITECTURES , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Lukas Reinhardt, Next-Generation Security Operations Centers: A Holistic Framework Integrating Artificial Intelligence, Federated Learning, and Sustainable Green Infrastructure for Proactive Threat Mitigation , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 09 (2025): Volume 02 Issue 09
- John M. Davenport, AI-AUGMENTED FRAMEWORKS FOR DATA QUALITY VALIDATION: INTEGRATING RULE-BASED ENGINES, SEMANTIC DEDUPLICATION, AND GOVERNANCE TOOLS FOR ROBUST LARGE-SCALE DATA PIPELINES , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 08 (2025): Volume 02 Issue 08
- Marcus T. Feldman, RECONSTRUCTING TRUST IN RFID INFRASTRUCTURES: A COMPREHENSIVE ANALYSIS OF SECURITY, PRIVACY, AND AUTHENTICATION IN CONTEMPORARY RADIO FREQUENCY IDENTIFICATION SYSTEMS , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 02 (2026): Volume 03 Issue 02
- Michael Andrew Thornton, Designing and Evaluating Low Latency Web APIs for High Transaction and Industrial Internet Systems: Architectural, Methodological, and Socio Technical Perspectives , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 01 (2026): Volume 03 Issue 01
You may also start an advanced similarity search for this article.