LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition

01/20/2021
by   Valeriia Cherepanova, et al.
9

Facial recognition systems are increasingly deployed by private corporations, government agencies, and contractors for consumer services and mass surveillance programs alike. These systems are typically built by scraping social media profiles for user images. Adversarial perturbations have been proposed for bypassing facial recognition systems. However, existing methods fail on full-scale systems and commercial APIs. We develop our own adversarial filter that accounts for the entire image processing pipeline and is demonstrably effective against industrial-grade pipelines that include face detection and large scale databases. Additionally, we release an easy-to-use webtool that significantly degrades the accuracy of Amazon Rekognition and the Microsoft Azure Face Recognition API, reducing the accuracy of each to below 1

READ FULL TEXT

page 2

page 3

page 7

page 8

page 9

page 12

page 13

page 14

research
03/19/2020

Face-Off: Adversarial Face Obfuscation

Advances in deep learning have made face recognition increasingly feasib...
research
12/15/2020

FoggySight: A Scheme for Facial Lookup Privacy

Advances in deep learning algorithms have enabled better-than-human perf...
research
05/22/2023

Attribute-Guided Encryption with Facial Texture Masking

The increasingly pervasive facial recognition (FR) systems raise serious...
research
06/20/2020

FaceHack: Triggering backdoored facial recognition systems using facial characteristics

Recent advances in Machine Learning (ML) have opened up new avenues for ...
research
02/16/2021

Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release

Large organizations such as social media companies continually release d...
research
03/31/2021

DeepBlur: A Simple and Effective Method for Natural Image Obfuscation

There is a growing privacy concern due to the popularity of social media...
research
05/10/2023

Analysis of Adversarial Image Manipulations

As virtual and physical identity grow increasingly intertwined, the impo...

Please sign up or login with your details

Forgot password? Click here to reset