Generating Dual-Identity Face Impersonations with Generative Adversarial Networks: An Adversarial Attack Methodology
Abstract
Background: Face recognition systems, powered by deep neural networks, are increasingly integral to security and user authentication applications. However, these systems are vulnerable to adversarial attacks, where carefully crafted inputs deceive the model. While existing research has explored attacks that cause misclassification (dodging) or impersonate a single target, a more complex threat involves generating a single face that can be successfully verified as two separate identities—a "dual-identity" attack.
Objective: This paper introduces and evaluates a novel methodology for crafting dual-identity face impersonations using Generative Adversarial Networks (GANs). Our objective is to develop an end-to-end framework capable of generating a single, visually plausible facial image that can successfully deceive a state-of-the-art face recognition system into matching it with two distinct, pre-selected target identities.
Methods: We propose a GAN-based architecture specifically designed for this attack. The core of our contribution is a novel dual-identity loss function that simultaneously maximizes the similarity score with two different target identities while minimizing the visual perturbation to a source image. The methodology leverages a momentum-iterative algorithm to enhance attack strength and ensure high transferability to black-box models. We trained and evaluated our system using the Labeled Faces in the Wild (LFW) dataset against several state-of-the-art face recognition models, including ArcFace and GhostFaceNets.
Results: Our proposed method achieved a high Attack Success Rate (ASR), successfully fooling target models into verifying the generated image as both identities in a significant percentage of test cases. The attack also demonstrated strong transferability to black-box systems. Qualitative results show that the generated adversarial faces remain visually coherent and inconspicuous, making them practical for stealthy attacks.
Conclusion: The ability to generate dual-identity impersonations represents a significant evolution in adversarial threats against biometric security. Our findings underscore a critical vulnerability in current face recognition systems and highlight the urgent need for developing more robust defense mechanisms against sophisticated, GAN-driven adversarial attacks.
Keywords
References
Similar Articles
- Nourhan F. Abdelrahman, Miguel Torres, CRAFTING DUAL-IDENTITY FACE IMPERSONATIONS USING GENERATIVE ADVERSARIAL NETWORKS: AN ADVERSARIAL ATTACK METHODOLOGY , International Journal of Advanced Artificial Intelligence Research: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Dr. Mateo Alvarez, Integrative Perspectives On Identity, Authentication, And Privacy: From RFID Security Protocols To Facial Biometric Representations , International Journal of Advanced Artificial Intelligence Research: Vol. 3 No. 01 (2026): Volume 03 Issue 01
- Adrian Velasco, Meera Narayan, REVOLUTIONIZING SILICON PHOTONIC DEVICE DESIGN THROUGH DEEP GENERATIVE MODELS: AN INVERSE APPROACH AND EMERGING TRENDS , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dr. Michael Lawson, Dr. Victor Almeida, Securing Deep Neural Networks: A Life-Cycle Perspective On Trojan Attacks And Defensive Measures , International Journal of Advanced Artificial Intelligence Research: Vol. 1 No. 01 (2024): Volume 01 Issue 01
- Severov Arseni Vasilievich, Artyom V. Smirnov, Architecting Real-Time Risk Stratification in the Insurance Sector: A Deep Convolutional and Recurrent Neural Network Framework for Dynamic Predictive Modeling , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Prof. Michael T. Edwards, ENHANCING AI-CYBERSECURITY EDUCATION: DEVELOPMENT OF AN AI-BASED CYBERHARASSMENT DETECTION LABORATORY EXERCISE , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 02 (2025): Volume 02 Issue 02
- Sara Rossi, Samuel Johnson, NEUROSYMBOLIC AI: MERGING DEEP LEARNING AND LOGICAL REASONING FOR ENHANCED EXPLAINABILITY , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 06 (2025): Volume 02 Issue 06
- Dwi Jatmiko, Huu Nguyen, AI-Guided Policy Learning For Hyperdimensional Sampling: Exploiting Expert Human Demonstrations From Interactive Virtual Reality Molecular Dynamics , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 10 (2025): Volume 02 Issue 10
- Dr. Leila K. Moreno, Integrated Real-Time Fraud Detection and Response: A Streaming Analytics Framework for Financial Transaction Security , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 11 (2025): Volume 02 Issue 11
- Dr. Larian D. Venorth, Prof. Elias J. Vance, A Machine Learning Approach to Identifying Maternal Risk Factors for Congenital Heart Disease , International Journal of Advanced Artificial Intelligence Research: Vol. 2 No. 08 (2025): Volume 02 Issue 08
You may also start an advanced similarity search for this article.