Presentation Attacks vs. Injection Attacks

Since I’m talking about presentation attack detection and injection attack detection a lot lately, I should briefly explain the difference between the two. This is from a Substack post I wrote last June.

Let’s say that you have an app on your smartphone that verifies that you are who you say you are.

  • Maybe it’s a banking app.
  • Maybe it’s an app that provides access to a government benefits account.
  • Maybe it’s an app that lets you enter a football stadium.

As part of its workflow, the app uses the smartphone camera to take a picture of your face.

But is that really YOUR face?

Presentation attack detection

A “presentation attack” occurs when the presented item is altered. In the case of a face presented to a smartphone camera, here are three examples of presentation attacks:

  • Your face is altered by makeup, a mask, or another disguise.
  • Your face is replaced by a printed photo of someone else’s face.
  • Your face is replaced by a digital photo or video on a monitor or screen.

Injection attack detection

But what if the image is NOT from the smartphone camera?

What if it is “injected” from another source, bypassing the camera altogether?

The victim doesn’t care

From the fraud victim perspective, it doesn’t matter whether a presentation attack or an injection attack is used.

The only thing that matters is that some type of deepfake fraud was used to fool the system.

Leave a Comment