Leveraging deep learning-assisted attacks against image obfuscation via federated learning

被引:0
作者
Tekli J. [1 ,2 ]
Al Bouna B. [3 ]
Tekli G. [4 ]
Couturier R. [2 ]
Charbel A. [3 ]
机构
[1] BMW Group, Munich
[2] Université de Franche-Comté, CNRS, institut FEMTO-ST
[3] TICKET Lab, Antonine University, Baabda
[4] R4.0 CoE, Balamand
关键词
Collaborative attacks; Deep learning-assisted attacks; Distributed machine learning; Face obfuscation; Federated learning; Privacy enhancing technologies;
D O I
10.1007/s00521-024-09703-0
中图分类号
学科分类号
摘要
Obfuscation techniques (e.g., blurring) are employed to protect sensitive information (SI) in images such as individuals’ faces. Recent works demonstrated that adversaries can perform deep learning-assisted (DL) attacks to re-identify obfuscated face images. Adversaries are modeled by their goals, knowledge (e.g., background knowledge), and capabilities (e.g., DL-assisted attacks). Nevertheless, enhancing the evaluation methodology of obfuscation techniques and improving the defense strategies against adversaries requires considering more "pessimistic” attacking scenario, i.e., stronger adversaries. According to a 2019 article published by the European Union Agency for Cybersecurity (ENISA), adversaries tend to perform more sophisticated and dangerous attacks when collaborating together. To address these concerns, our paper investigates a novel privacy challenge in the context of image obfuscation. Specifically, we examine whether adversaries, when collaborating together, can amplify their DL-assisted attacks and cause additional privacy breaches against a target dataset of obfuscated images. We empirically demonstrate that federated learning (FL) can be used as a collaborative attack/adversarial strategy to (i) leverage the attacking capabilities of an adversary, (ii) increase the privacy breaches, and (iii) remedy the lack of background knowledge and data shortage without the need to share/disclose the local training datasets in a centralized location. To the best of our knowledge, we are the first to consider collaborative and more specifically FL-based attacks in the context of face obfuscation. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.
引用
收藏
页码:15667 / 15684
页数:17
相关论文
共 57 条
[1]  
Russakovsky O., Deng J., Su H., Krause J., Satheesh S., Ma S., Huang Z., Karpathy A., Khosla A., Bernstein M.S., Berg A.C., Li F., Imagenet large scale visual recognition challenge, Int. J. Comput. Vis, 115, 3, pp. 211-252, (2015)
[2]  
Liu W., Anguelov D., Erhan D., Szegedy C., Reed S., Fu C.-Y., Berg A.C., Ssd: Single shot multibox detector, Computer Vision - ECCV 2016, pp. 21-37, (2016)
[3]  
Chen L., Papandreou G., Kokkinos I., Murphy K., Yuille A.L., Deeplab: Semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs, IEEE Trans. Pattern Anal. Mach. Intell, 40, 4, pp. 834-848, (2018)
[4]  
Naumann A., Hertlein F., Doerr L., Thoma S., Furmans K., Literature Review: Computer Vision Applications in Transportation Logistics and Warehousing. Arxiv, 2304, (2023)
[5]  
Kumar S., Gopi T., Harikeerthana N., Gupta M.K., Gaur V., Krolczyk G.M., Wu C., Machine learning techniques in additive manufacturing: a state of the art review on design, processes and production control, Journal of Intelligent Manufacturing, 34, 1, pp. 21-55, (2023)
[6]  
Akar C.A., Tekli J., Jess D., Khoury M., Kamradt M., Guthe M., Synthetic object recognition dataset for industries, 2022 35Th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), 1, pp. 150-155, (2022)
[7]  
Ayle M., Tekli J., El-Zini J., El-Asmar B., Awad M., Bar - a reinforcement learning agent for bounding-box automated refinement, Proceedings of the AAAI Conference on Artificial Intelligence, 34, 3, pp. 2561-2568, (2020)
[8]  
Tekli J., Al Bouna B., Couturier R., Tekli G., Al Zein Z., Kamradt M A framework for evaluating image obfuscation under deep learning-assisted privacy attacks, In: 17Th International Conference on Privacy, Security and Trust, PST 2019, Fredericton, NB, Canada, August 26-28, 2019, pp1–10. IEEE
[9]  
Tekli J., Al Bouna B., Tekli G., Couturier R., A framework for evaluating image obfuscation under deep learning-assisted privacy attacks, Multimedia Tools and Applications, (2023)
[10]  
Hill S., Zhou Z., Saul L.K., Shacham H., On the (in)effectiveness of mosaicing and blurring as tools for document redaction, Proc. Priv. Enhancing Technol, 2016, 4, pp. 403-417, (2016)