AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems
Abstract
Face recognition (FR) systems are vulnerable to external information leakage (EIL) attacks, which can reveal sensitive information about the training data, thus compromising the confidentiality of the company’s proprietary and the privacy of the individuals concerned. Existing EIL attacks mainly rely on unrealistic assumptions, such as a high query budget for the attacker and massive computational power, resulting in impractical EIL attacks. We present , a novel and practical query-based EIL attack that targets the face verification model of the FR systems by using carefully selected adversarial samples. uses substitute models to craft adversarial samples, which are then handpicked to infer sensitive information. Our extensive evaluation on the MAAD-Face and CelebA datasets, which includes over 200 different target models, shows that outperforms state-of-the-art EIL attacks in inferring the property that best characterizes the FR model’s training set while maintaining a small query budget and practical attacker assumptions.
Cite
Text
Katzav et al. "AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems." Proceedings of the European Conference on Computer Vision (ECCV), 2024. doi:10.1007/978-3-031-73226-3_17Markdown
[Katzav et al. "AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems." Proceedings of the European Conference on Computer Vision (ECCV), 2024.](https://mlanthology.org/eccv/2024/katzav2024eccv-adversarialeak/) doi:10.1007/978-3-031-73226-3_17BibTeX
@inproceedings{katzav2024eccv-adversarialeak,
title = {{AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems}},
author = {Katzav, Roye and Giloni, Amit and Grolman, Edita and Saito, Hiroo and Shibata, Tomoyuki and Omino, Tsukasa and Komatsu, Misaki and Hanatani, Yoshikazu and Elovici, Yuval and Shabtai, Asaf},
booktitle = {Proceedings of the European Conference on Computer Vision (ECCV)},
year = {2024},
doi = {10.1007/978-3-031-73226-3_17},
url = {https://mlanthology.org/eccv/2024/katzav2024eccv-adversarialeak/}
}