Privacy-Preserving Face Recognition for Access Control Systems

被引:0
|
作者
Zhang, Sucan [1 ]
Ma, Jianfei [1 ]
Zhang, Mingxuan [1 ]
Hua, Jingyu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
关键词
face recognition; physical adversarial patch; ACS; privacy protection;
D O I
10.1109/MASS62177.2024.00053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Face recognition (FR) technology, a highly secure biometric authentication method, has been widely applied in physical access control systems (ACSs). However, the facial information uploaded by users in the system is vulnerable to third parties, which can be utilized to train unauthorized FR models, which could be used for illegal identification of users in unknown contexts, posing significant threats to user privacy. Although many privacy-preserving FR methods have been proposed, they are rarely directly applicable to existing physical ACSs because they require invasive modifications to the core FR algorithms in ACSs. In this paper, we present a non-intrusive facial privacy protection method based on adversarial example technique, which does not require to modify any software or hardware of the target ACS. It first adds subtle perturbations that do not affect visual perception to the facial photos submitted by users, ensuring that the photos could pass the identity verification of human administrators of ACSs but the FR models built on them would mis-recognize real users. Then, it trains physical adversarial example stickers using masks as carriers, which, when worn on the mouth, users could be correctly recognized, thus passing through the ACS successfully. According to experiments conducted on multiple test subjects and various face recognition models, the validity of the proposed method has been demonstrated.
引用
收藏
页码:348 / 356
页数:9
相关论文
共 50 条
  • [21] To pass or not to pass: Privacy-preserving physical access control
    Garcia-Rodriguez, Jesus
    Krenn, Stephan
    Slamanig, Daniel
    COMPUTERS & SECURITY, 2024, 136
  • [22] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):
  • [23] ACCESS CONTROL FOR PRIVACY-PRESERVING GAUSSIAN PROCESS REGRESSION
    Nakachi, Takayuki
    Wang, Yitu
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4158 - 4162
  • [24] Towards Distributed Privacy-Preserving Mobile Access Control
    Wang, Zhijie
    Huang, Dijiang
    Wu, Huijun
    Li, Bing
    Deng, Yuli
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 582 - 587
  • [25] Distributed Privacy-Preserving Access Control in Sensor Networks
    Zhang, Rui
    Zhang, Yanchao
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (08) : 1427 - 1438
  • [26] Privacy-Preserving Data Processing with Flexible Access Control
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 363 - 376
  • [27] Privacy-Preserving Object Recognition with Explainability in Smart Systems
    Abbasi, Wisam
    Mori, Paolo
    Saracino, Andrea
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 519 - 534
  • [28] PRIVACY-PRESERVING ACTION RECOGNITION
    Zou, Chengming
    Yuan, Ducheng
    Lan, Long
    Chi, Haoang
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2175 - 2179
  • [29] A Privacy-Preserving Learning Framework for Face Recognition in Edge and Cloud Networks
    Wang, Yitu
    Nakachi, Takayuki
    IEEE ACCESS, 2020, 8 : 136056 - 136070
  • [30] Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and Solutions
    Laishram, Lamyanba
    Shaheryar, Muhammad
    Lee, Jong taek
    Jung, Soon ki
    ACM COMPUTING SURVEYS, 2025, 57 (06)