Adversarial Privacy-preserving Filter

被引:25
作者
Zhang, Jiaming [1 ,2 ,3 ]
Sang, Jitao [1 ,2 ,3 ]
Zhao, Xian [1 ,2 ]
Huang, Xiaowen [1 ,2 ]
Sun, Yanfeng [4 ,5 ]
Hu, Yongli [4 ,5 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Beijing Jiaotong Univ, Beijing Key Lab Traff Data Anal & Min, Beijing, Peoples R China
[3] Peng Cheng Lab, Shenzhen, Peoples R China
[4] Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Multimedia & Intelligent Software, Beijing, Peoples R China
[5] Beijing Univ Technol, Fac Informat Technol, Beijing Artificial Intelligence Inst, Beijing, Peoples R China
来源
MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA | 2020年
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
privacy-preserving; face recognition; adversarial example; photo sharing;
D O I
10.1145/3394171.3413906
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
While widely adopted in practical applications, face recognition has been critically discussed regarding the malicious use of face images and the potential privacy problems, e.g., deceiving payment system and causing personal sabotage. Online photo sharing services unintentionally act as the main repository for malicious crawler and face recognition applications. This work aims to develop a privacy-preserving solution, called Adversarial Privacy-preserving Filter (AIM, to protect the online shared face images from being maliciously used. We propose an end-cloud collaborated adversarial attack solution to satisfy requirements of privacy, utility and non-accessibility. Specifically, the solutions consist of three modules: (1) image-specific gradient generation, to extract image-specific gradient in the user end with a compressed probe model; (2) adversarial gradient transfer, to fine-tune the image-specific gradient in the server cloud; and (3) universal adversarial perturbation enhancement, to append image-independent perturbation to derive the final adversarial noise. Extensive experiments on three datasets validate the effectiveness and efficiency of the proposed solution. A prototype application is also released for further evaluation. We hope the end-cloud collaborated attack framework could shed light on addressing the issue of online multimedia sharing privacy-preserving issues from user side.(1)
引用
收藏
页码:1423 / 1431
页数:9
相关论文
共 37 条
[1]  
[Anonymous], 2015, ARXIV151106292, DOI 10.48550/arXiv.1511.06292
[2]   MobileFaceNets: Efficient CNNs for Accurate Real-Time Face Verification on Mobile Devices [J].
Chen, Sheng ;
Liu, Yang ;
Gao, Xiang ;
Han, Zhen .
BIOMETRIC RECOGNITION, CCBR 2018, 2018, 10996 :428-438
[3]  
Chen T, 2016, PROCEEDINGS OF THE ASME/JSME/KSME JOINT FLUIDS ENGINEERING CONFERENCE, 2015, VOL 1A, SYMPOSIA, PT 2
[4]   Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security [J].
Chesney, Bobby ;
Citron, Danielle .
CALIFORNIA LAW REVIEW, 2019, 107 (06) :1753-1819
[5]  
Deb D., 2019, ARXIV190805008
[6]   ArcFace: Additive Angular Margin Loss for Deep Face Recognition [J].
Deng, Jiankang ;
Guo, Jia ;
Xue, Niannan ;
Zafeiriou, Stefanos .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :4685-4694
[7]   Efficient Decision-based Black-box Adversarial Attacks on Face Recognition [J].
Dong, Yinpeng ;
Su, Hang ;
Wu, Baoyuan ;
Li, Zhifeng ;
Liu, Wei ;
Zhang, Tong ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :7706-7714
[8]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[9]  
Goodfellow I.J., 2014, 3 INT C LEARNING REP
[10]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672