Title :
Reconstructing a fragmented face from a cryptographic identification protocol
Author :
Luong, Anh ; Gerbush, M. ; Waters, B. ; Grauman, Kristen
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas at Austin, Austin, TX, USA
Abstract :
Secure Computation of Face Identification (SCiFI) [20] is a recently developed secure face recognition system that ensures the list of faces it can identify (e.g., a terrorist watch list) remains private. In this work, we study the consequences of malformed input attacks on the system - from both a security and computer vision standpoint. In particular, we present 1) a cryptographic attack that allows a dishonest user to undetectably obtain a coded representation of faces on the list, and 2) a visualization approach that exploits this breach, turning the lossy recovered codes into human-identifiable face sketches. We evaluate our approach on two challenging datasets, with face identification tasks given to a computer and human subjects. Whereas prior work considered security in the setting of honest inputs and protocol execution, the success of our approach underscores the risk posed by malicious adversaries to todays automatic face recognition systems.
Keywords :
computer vision; cryptographic protocols; data visualisation; face recognition; image reconstruction; image representation; SCiFI; computer vision standpoint; cryptographic attack; cryptographic identification protocol; face recognition system; face representation; fragmented face reconstruction; human-identifiable face sketch; malformed input attack; secure computation of face identification; security standpoint; visualization approach; Face; Face recognition; Image reconstruction; Protocols; Servers; Vectors; Vocabulary;
Conference_Titel :
Applications of Computer Vision (WACV), 2013 IEEE Workshop on
Conference_Location :
Tampa, FL
Print_ISBN :
978-1-4673-5053-2
Electronic_ISBN :
1550-5790
DOI :
10.1109/WACV.2013.6475024