Filters








1,690 Hits in 5.0 sec

Towards Face Encryption by Generating Adversarial Identity Masks [article]

Xiao Yang, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu, Yuefeng Chen, Hui Xue
2021 arXiv   pre-print
To achieve this, we propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks which can be overlaid on facial images, such that the original identities can  ...  Our goal in this paper is to develop a technique that can encrypt the personal photos such that they can protect users from unauthorized face recognition systems but remain visually identical to the original  ...  Face encryption focuses on generating effective and natural adversarial identity masks, which cannot be realized by most previous adversarial attacks w.r.t. the effectiveness (in Tab. 3) and naturalness  ... 
arXiv:2003.06814v2 fatcat:xj54xhmvqjca7h52exsyjhe2fy

Privacy–Enhancing Face Biometrics: A Comprehensive Survey

Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Struc
2021 IEEE Transactions on Information Forensics and Security  
Face recognition technology, in particular, has been in the spotlight, and is now seen by many as posing a considerable risk to personal privacy.  ...  the utility of face recognition technology in several application scenarios.  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.  ... 
doi:10.1109/tifs.2021.3096024 fatcat:z5kvij6g7vgx3b24narxdyp2py

Sanitization of Visual Multimedia Content: A Survey of Techniques, Attacks, and Future Directions [article]

Hanaa Abbas, Roberto Di Pietro
2022 arXiv   pre-print
ACKNOWLEDGMENTS This publication was made possible by an award [GSRA7-2-0527-20101] from Qatar National Research Fund (a member of Qatar Foundation).  ...  This publication was also partially supported by awards NPRP-S-11-0109-180242 "Extending Blockchain Technology -a Novel Paradigm and its Applications to Cybersecurity and Fintech" from the QNRF-Qatar National  ...  Face synthesis is a non-reversible method of generating new faces by averaging a cluster of similar faces (𝑘-same family algorithms) or adversarial learning.  ... 
arXiv:2207.02051v1 fatcat:oevtpttxvvgo3p537t54wwhq5y

Biometrics: Trust, but Verify [article]

Anil K. Jain, Debayan Deb, Joshua J. Engelsma
2021 arXiv   pre-print
Some of these problems include: i) questions related to system recognition performance, ii) security (spoof attacks, adversarial attacks, template reconstruction attacks and demographic information leakage  ...  recognition systems, there are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems that create an element of mistrust in their use - both by  ...  In contrast to face presentation attacks where the attacker needs to actively participate by wearing a mask or replaying a face photograph/video of the victim, adversarial faces do not require active participation  ... 
arXiv:2105.06625v2 fatcat:gnii3qxufzevzlkfimhmmwof7i

Unauthorized AI cannot Recognize Me: Reversible Adversarial Example [article]

Jiayang Liu, Weiming Zhang, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma
2021 arXiv   pre-print
To realize RAE, we combine three technologies, adversarial example, reversible data hiding for exact recovery of adversarial perturbation, and encryption for selective control of AIs who can remove adversarial  ...  In this study, we propose a new methodology to control how user's data is recognized and used by AI via exploiting the properties of adversarial examples.  ...  For example, (Yang et al. 2020) proposed face encryption by generating adversarial identity masks to protect users' face images from unauthorized face recognition systems.  ... 
arXiv:1811.00189v3 fatcat:5xi4ilokkzahdptyebsvjwcb5u

AnonymousNet: Natural Face De-Identification with Measurable Privacy [article]

Tao Li, Lei Lin
2019 arXiv   pre-print
The framework encompasses four stages: facial attribute estimation, privacy-metric-oriented face obfuscation, directed natural image synthesis, and adversarial perturbation.  ...  With billions of personal images being generated from social media and cameras of all sorts on a daily basis, security and privacy are unprecedentedly challenged.  ...  obfuscation, de-identified face generation, and adversarial perturbation.  ... 
arXiv:1904.12620v1 fatcat:545gr4nvr5cw5hml5feubxzbcm

AnonymousNet: Natural Face De-Identification With Measurable Privacy

Tao Li, Lei Lin
2019 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
The framework encompasses four stages: facial attribute estimation, privacy-metric-oriented face obfuscation, directed natural image synthesis, and adversarial perturbation.  ...  With billions of personal images being generated from social media and cameras of all sorts on a daily basis, security and privacy are unprecedentedly challenged.  ...  obfuscation, de-identified face generation, and adversarial perturbation.  ... 
doi:10.1109/cvprw.2019.00013 dblp:conf/cvpr/LiL19b fatcat:hmvympue5ve3jba4vgxvxtyvde

SEMBA: SEcure Multi-Biometric Authentication

Giulia Droandi, Mauro Barni, Riccardo Lazzeretti, Tommaso Pignata
2019 IET Biometrics  
A widely investigated solution to such threats consists of processing the biometric signals under encryption, in order to avoid any leakage of information towards non-authorised parties.  ...  Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on.  ...  Acknowledgment This work has been partially supported by a grant of La Sapienza University of Rome Bando Ricerca 2017 within the project Security and Privacy of Biometrics for Mobile Authentication (SPoB-MA  ... 
doi:10.1049/iet-bmt.2018.5138 fatcat:xaubyklfjfe77lufpht6slx5km

SEMBA:SEcure multi-biometric authentication [article]

Giulia Droandi, Mauro Barni, Riccardo Lazzeretti, Tommaso Pignata
2018 arXiv   pre-print
A widely investigated solution to such threats consists in processing the biometric signals under encryption, to avoid any leakage of information towards non-authorised parties.  ...  From a cryptographic point of view, the protocol relies on SPDZ a new multy-party computation tool designed by Damgaard et al.  ...  The extraction process outputs also a bitwise noise mask. The noise mask represents the regions of the iris altered by noise, e.g. by eyelashes end eyelid.  ... 
arXiv:1803.10758v1 fatcat:7tlzmyjsgfe4xizrb6xy5sej2q

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version) [article]

Alexandros Bakas, Antonis Michalas
2020 IACR Cryptology ePrint Archive  
While our reputation system faces certain limitations, this work is amongst the rst attempts that seek to utilize FE in the solution of a real-life problem.  ...  Functional Encryption (FE) allows users who hold a specic secret key (known as the functional key) to learn a specic function of encrypted data whilst learning nothing about the content of the underlying  ...  In particular, u 1 encrypts v 1 and then masks k 1 by calculating t 1 = k 1 + s 1 where s 1 is the secret value received from the TA during the setup phase.  ... 
dblp:journals/iacr/BakasM20a fatcat:5d5yg4d4arfd7gue2rxsnzg67m

An Anonymity-Based Secure On-Demand Routing For Mobile Ad Hoc Networks

M. Gunasekaran, K. Premalatha
2014 Zenodo  
The SOT protocol is designed based on the combination of group signature and onion routing with ID-based encryption for route discovery.  ...  There are number of protocols have been proposed to provide privacy and security for data communication in an adverse environment, but those protocols are compromised in many ways by the attackers.  ...  which have been posed by adversaries.  ... 
doi:10.5281/zenodo.1090729 fatcat:yss7qrlbazam3hn2b5efim4wui

Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors [article]

Jeffrey Byrne and Brian DeCann and Scott Bloom
2020 arXiv   pre-print
We motivate the key-net by showing that without it there is a utility/privacy tradeoff for a network fine-tuned directly on optically transformed images for face identification and object detection.  ...  on this transformed image, but the image is not interpretable by a human or any other key-net.  ...  This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under Contract No. HR001119C0067.  ... 
arXiv:2008.04469v2 fatcat:j47cr3erxzdildtn3gnuwkk2kq

Mobility changes anonymity: new passive threats in mobile ad hoc networks

Xiaoyan Hong, Jiejun Kong, Mario Gerla
2006 Wireless Communications and Mobile Computing  
For examples, MAC addresses are not encrypted by the standard MAC security protections.  ...  MASK [43] is another anonymous routing protocol that addresses identity anonymity problem. But opportunities exist that fresh (and partial) network topology could be revealed to the adversary.  ... 
doi:10.1002/wcm.395 fatcat:xm2cldry2ffybc55yvgvsi5p5u

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners

Frank Li, Richard Shin, Vern Paxson
2015 Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop - CCSW '15  
We consider the various threat models introduced by this modification.  ...  This work is partially supported by a National Science Foundation grant (CNS-1237265). The first author is supported by the National Science Foundation Graduate Research Fellowship.  ...  We begin by presenting attacks under the simpler 1-NN, and gradually progress towards k-NN.  ... 
doi:10.1145/2808425.2808430 dblp:conf/ccs/LiSP15 fatcat:5doyd7ar3veqnmbwowq4wfsjnq

Privacy preserving video surveillance using pedestrian tracking mechanism

Peng Zhang, Tony Thomas, Sabu Emmanuel, Mohan S. Kankanhalli
2010 Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence - MiFor '10  
The detected pedestrian face/head is obscured by encrypting with a unique key derived from a master key for the privacy preservation purpose.  ...  We achieve this by combining the techniques of pedestrian tracking based on a Markov chain with two hidden states, elliptical head contour detection and encryption.  ...  face with a generic face [11, 17] , complete object removal followed by inpainting of the background and other foreground objects [14] .  ... 
doi:10.1145/1877972.1877983 dblp:conf/mm/0005TEK10 fatcat:egafxrm4wbhyfoaorslvgqf3de
« Previous Showing results 1 — 15 out of 1,690 results