FB pixel

Youverse-run challenge shows biometrics vulnerable to certain low-tech attacks

Youverse-run challenge shows biometrics vulnerable to certain low-tech attacks
 

While deepfake fraud attacks have become a prominent source of worry for organizations securing access to accounts or resources with biometrics, simple and low-cost attacks can also exploit vulnerabilities in many systems, the results of an industry challenge make clear.

The Adversarial Attack Challenge for Secure Face Recognition was held as part of the International Joint Conference on Biometrics (IJCB 2025), and organized by Youverse and the Institute of Systems and Robotics at the University of Coimbra (ISR-UC).

Structured attacks carried out with rudimentary technology, like grid occlusion or bit manipulation, were consistently able to defeat biometric systems. Those same systems had already proven their chops against more traditional attacks based on gradient perturbations.

IJCB 2025 takes place September 8 to 11 in Osaka, Japan.

At the close of the competition, Youverse also released a full benchmark, dataset and open-source adversarial toolkit. The release is intended to provide the community with resources design stronger defenses and stress-test biometric recognition models under unseen conditions.

“We’re proud to contribute open tools, benchmarks, and lessons to the community,” says Youverse CPO Miguel Lourenço. “Detection and resilience were put to the test, and the results will help push the boundaries of secure and fair AI in biometrics.”

Earlier in the year, Youverse presented a diffusion-based method for age transformation using multi-modal prompts at FG 2025 (2025 IEEE 19th International Conference on Automatic Face and Gesture Recognition). IDiff-Face-Aged is a patent-pending process which the company says improved age classification accuracy by more than 3 percent, but also improved the generalization capabilities of the models.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events