Reconstructing a Fragmented Face from a Cryptographic Identification Protocol

Abstract

Secure Computation of Face Identification (SCiFI) [20] is a recently developed secure face recognition system that ensures the list of faces it can identify (e.g., a terrorist watch list) remains private. In this work, we study the consequences of malformed input attacks on the system - from both a security and computer vision standpoint. In particular, we present 1) a cryptographic attack that allows a dishonest user to undetectably obtain a coded representation of faces on the list, and 2) a visualization approach that exploits this breach, turning the lossy recovered codes into human-identifiable face sketches. We evaluate our approach on two challenging datasets, with face identification tasks given to a computer and human subjects. Whereas prior work considered security in the setting of honest inputs and protocol execution, the success of our approach underscores the risk posed by malicious adversaries to todays automatic face recognition systems.

Cite

Text

Luong et al. "Reconstructing a Fragmented Face from a Cryptographic Identification Protocol." IEEE/CVF Winter Conference on Applications of Computer Vision, 2013. doi:10.1109/WACV.2013.6475024

Markdown

[Luong et al. "Reconstructing a Fragmented Face from a Cryptographic Identification Protocol." IEEE/CVF Winter Conference on Applications of Computer Vision, 2013.](https://mlanthology.org/wacv/2013/luong2013wacv-reconstructing/) doi:10.1109/WACV.2013.6475024

BibTeX

@inproceedings{luong2013wacv-reconstructing,
  title     = {{Reconstructing a Fragmented Face from a Cryptographic Identification Protocol}},
  author    = {Luong, Andy and Gerbush, Michael and Waters, Brent and Grauman, Kristen},
  booktitle = {IEEE/CVF Winter Conference on Applications of Computer Vision},
  year      = {2013},
  pages     = {238-245},
  doi       = {10.1109/WACV.2013.6475024},
  url       = {https://mlanthology.org/wacv/2013/luong2013wacv-reconstructing/}
}