Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash

11/12/2021
by   Lukas Struppek, et al.
10

Apple recently revealed its deep perceptual hashing system NeuralHash to detect child sexual abuse material (CSAM) on user devices before files are uploaded to its iCloud service. Public criticism quickly arose regarding the protection of user privacy and the system's reliability. In this paper, we present the first comprehensive empirical analysis of deep perceptual hashing based on NeuralHash. Specifically, we show that current deep perceptual hashing may not be robust. An adversary can manipulate the hash values by applying slight changes in images, either induced by gradient-based approaches or simply by performing standard image transformations, forcing or preventing hash collisions. Such attacks permit malicious actors easily to exploit the detection system: from hiding abusive material to framing innocent users, everything is possible. Moreover, using the hash values, inferences can still be made about the data stored on user devices. In our view, based on our results, deep perceptual hashing in its current form is generally not ready for robust client-side scanning and should not be used from a privacy perspective.

READ FULL TEXT

page 6

page 16

page 17

page 18

page 19

page 20

page 21

page 22

research
11/18/2020

Adversarial collision attacks on image hashing functions

Hashing images with a perceptual algorithm is a common approach to solvi...
research
02/28/2023

A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Typically, metadata of images are stored in a specific data segment of t...
research
02/01/2020

Towards Evaluating Gaussian Blurring in Perceptual Hashing as a Facial Image Filter

With the growth in social media, there is a huge amount of images of fac...
research
06/17/2021

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning

End-to-end encryption (E2EE) by messaging platforms enable people to sec...
research
06/20/2023

Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition

End-to-end encryption (E2EE) provides strong technical protections to in...
research
05/20/2020

Perceptual Hashing applied to Tor domains recognition

The Tor darknet hosts different types of illegal content, which are moni...
research
06/18/2013

A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm

Image perceptual hashing finds applications in content indexing, large-s...

Please sign up or login with your details

Forgot password? Click here to reset