Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors

05/09/2021
by   Deeksha Dangwal, et al.
0

As autonomous driving and augmented reality evolve, a practical concern is data privacy. In particular, these applications rely on localization based on user images. The widely adopted technology uses local feature descriptors, which are derived from the images and it was long thought that they could not be reverted back. However, recent work has demonstrated that under certain conditions reverse engineering attacks are possible and allow an adversary to reconstruct RGB images. This poses a potential risk to user privacy. We take this a step further and model potential adversaries using a privacy threat model. Subsequently, we show under controlled conditions a reverse engineering attack on sparse feature maps and analyze the vulnerability of popular descriptors including FREAK, SIFT and SOSNet. Finally, we evaluate potential mitigation techniques that select a subset of descriptors to carefully balance privacy reconstruction risk while preserving image matching accuracy; our results show that similar accuracy can be obtained when revealing less information.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 9

page 10

page 11

research
10/27/2022

Rethinking the Reverse-engineering of Trojan Triggers

Deep Neural Networks are vulnerable to Trojan (or backdoor) attacks. Rev...
research
11/06/2012

From Bits to Images: Inversion of Local Binary Descriptors

Local Binary Descriptors are becoming more and more popular for image ma...
research
12/23/2021

NinjaDesc: Content-Concealing Visual Descriptors via Adversarial Learning

In the light of recent analyses on privacy-concerning scene revelation f...
research
08/22/2023

LDP-Feat: Image Features with Local Differential Privacy

Modern computer vision services often require users to share raw feature...
research
09/20/2018

Morphed Learning: Towards Privacy-Preserving for Deep Learning Based Applications

The concern of potential privacy violation has prevented efficient use o...
research
09/02/2020

Privacy Leakage of SIFT Features via Deep Generative Model based Image Reconstruction

Many practical applications, e.g., content based image retrieval and obj...

Please sign up or login with your details

Forgot password? Click here to reset