Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition

06/20/2023
by   Shubham Jain, et al.
0

End-to-end encryption (E2EE) provides strong technical protections to individuals from interferences. Governments and law enforcement agencies around the world have however raised concerns that E2EE also allows illegal content to be shared undetected. Client-side scanning (CSS), using perceptual hashing (PH) to detect known illegal content before it is shared, is seen as a promising solution to prevent the diffusion of illegal content while preserving encryption. While these proposals raise strong privacy concerns, proponents of the solutions have argued that the risk is limited as the technology has a limited scope: detecting known illegal content. In this paper, we show that modern perceptual hashing algorithms are actually fairly flexible pieces of technology and that this flexibility could be used by an adversary to add a secondary hidden feature to a client-side scanning system. More specifically, we show that an adversary providing the PH algorithm can “hide" a secondary purpose of face recognition of a target individual alongside its primary purpose of image copy detection. We first propose a procedure to train a dual-purpose deep perceptual hashing model by jointly optimizing for both the image copy detection and the targeted facial recognition task. Second, we extensively evaluate our dual-purpose model and show it to be able to reliably identify a target individual 67 performance at detecting illegal content. We also show that our model is neither a general face detection nor a facial recognition model, allowing its secondary purpose to be hidden. Finally, we show that the secondary purpose can be enabled by adding a single illegal looking image to the database. Taken together, our results raise concerns that a deep perceptual hashing-based CSS system could turn billions of user devices into tools to locate targeted individuals.

READ FULL TEXT

page 1

page 10

page 16

page 18

research
12/08/2022

Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

Content scanning systems employ perceptual hashing algorithms to scan us...
research
06/17/2021

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning

End-to-end encryption (E2EE) by messaging platforms enable people to sec...
research
11/12/2021

Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash

Apple recently revealed its deep perceptual hashing system NeuralHash to...
research
02/01/2020

Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

With the growth in social media, there is a huge amount of images of fac...
research
06/18/2013

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm

Image perceptual hashing finds applications in content indexing, large-s...
research
05/20/2020

Perceptual Hashing applied to Tor domains recognition

The Tor darknet hosts different types of illegal content, which are moni...
research
12/15/2022

Hamming Distributions of Popular Perceptual Hashing Techniques

Content-based file matching has been widely deployed for decades, largel...

Please sign up or login with your details

Forgot password? Click here to reset