论文标题

PrivacyProber:评估和检测软性生物标准技术增强技术

PrivacyProber: Assessment and Detection of Soft-Biometric Privacy-Enhancing Techniques

论文作者

Rot, Peter, Peer, Peter, Štruc, Vitomir

论文摘要

软性生物识别增强技术代表了机器学习方法,其目的是:(i)通过抑制面部图像中选定的软生物测量属性(例如性别,年龄,种族)和(ii)使敏感的个人信息的提取敏感的个人信息,来减轻与面部识别技术相关的隐私问题。由于这些技术越来越多地用于现实世界应用程序中,因此必须了解可以在多大程度上倒入隐私的增强,以及可以从隐私增强图像中恢复多少属性信息。尽管这些方面至关重要,但尚未在文献中进行调查。因此,我们研究了几种最先进的软性隐私增强技术的鲁棒性,以归因恢复尝试。我们提出了PrivacyProber,这是一个高级框架,用于从隐私增强面部图像中恢复软性生物标准信息,并将其应用于三个公共面部数据集(即LFW,Muct,Muct and Adience)的综合实验中的属性恢复。我们的实验表明,所提出的框架能够恢复大量被压制的信息,而不论使用的隐私增强技术,但所考虑的隐私模型之间存在显着差异。这些结果表明需要需要提高现有隐私增强技术的鲁棒性的新型机制,并确保它们免受试图恢复被抑制信息的潜在对手。

Soft-biometric privacy-enhancing techniques represent machine learning methods that aim to: (i) mitigate privacy concerns associated with face recognition technology by suppressing selected soft-biometric attributes in facial images (e.g., gender, age, ethnicity) and (ii) make unsolicited extraction of sensitive personal information infeasible. Because such techniques are increasingly used in real-world applications, it is imperative to understand to what extent the privacy enhancement can be inverted and how much attribute information can be recovered from privacy-enhanced images. While these aspects are critical, they have not been investigated in the literature. We, therefore, study the robustness of several state-of-the-art soft-biometric privacy-enhancing techniques to attribute recovery attempts. We propose PrivacyProber, a high-level framework for restoring soft-biometric information from privacy-enhanced facial images, and apply it for attribute recovery in comprehensive experiments on three public face datasets, i.e., LFW, MUCT and Adience. Our experiments show that the proposed framework is able to restore a considerable amount of suppressed information, regardless of the privacy-enhancing technique used, but also that there are significant differences between the considered privacy models. These results point to the need for novel mechanisms that can improve the robustness of existing privacy-enhancing techniques and secure them against potential adversaries trying to restore suppressed information.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源