Engineering Privacy in Public James Alexander and Jonathan Smith - - PowerPoint PPT Presentation
Engineering Privacy in Public James Alexander and Jonathan Smith - - PowerPoint PPT Presentation
Engineering Privacy in Public James Alexander and Jonathan Smith University of Pennsylvania Introduction Project Goal: A generalized, experimentally validated privacy metric First experiment: Defeating face recognition
SLIDE 1
SLIDE 2
- Project Goal: A generalized, experimentally
validated privacy metric
- First experiment: Defeating face recognition
- Experiments with more biometrics to follow
Introduction
SLIDE 3
Talk Overview
- Project Goals
- Face Recognition: Methodology and Evaluation
- Disguise Slide Show
- Analysis
- Future W
- rk
SLIDE 4
- Though details differ wildly, the goal of all PETs
is the same: to help the user not be identified
- Advantages of a common framework:
- User can tell where they get the most “bang
for the buck”
- Easier to evaluate the combination of severals
PETs in the presence of multimode surveillance
V alue of PET Generality
SLIDE 5
To develop a “benefit” metric for evaluation of privacy enhancing technologies
- Propose candidate metrics and evaluate
against empiricallymeasured PET performance
Project Goal
SLIDE 6
- Suitable for cost / benefit analysis regardless of
how cost is quantified
- Explainable to a lay person
- Places reliable bounds on how well an adversary
can do, even without precise knowledge of adversary’s methods
General Properties
SLIDE 7
Adversary knows some predicate holds of a particular individual
- He builds a probability distribution of this
predicate over the set of all individuals
- Job of a PET is to make sure the correct
individual does not stand out in the distribution
Modeling Privacy
SLIDE 8
noisy channel
identity
SLIDE 9
face disguise
- bstructions
camera
identity
SLIDE 10
user network interface mix network adversary network interface(s)
identity
SLIDE 11
loyalty card munged identifying info + card swapping grocer customer database
identity
SLIDE 12
- W
e want to predict entropy in the adversary’s model we can’t measure it directly, but perhaps can place bounds on it
- Theory of noncooperating communicators is not
wellexplored
- What are the limits of a communication
channel employing a sabotaged encoding?
- What if noise sources are not random?
Challenges
SLIDE 13
Methodolgy
- Tested face recognition system an eigenfaces
system used in the FERET evaluation
- 3816 FERET images used as distractors
- New pictures added to match FERET specs
- Facial occlusion images from AR database give
statistical behavior of two particular disguises
SLIDE 14
Sample Baselines
SLIDE 15
AR Sample
SLIDE 16
Adversary Model
- Can obtain highquality frontal probe images
- Might have more than one gallery image of you
- System output will consist of up to N candidate
matches, presented to an operator for confirmation
- Face recognition system will be deployed on a
large scale
- Do not know if a minimum likelihood cutoff used
SLIDE 17
Score Function
score(x) = N
i=1 wx(i)
N
i=1 i
wx(i) = N − i + 1 if the candidate in the ith position is really x (i.e. a match)
- therwise
SLIDE 18
Effective Disguises
SLIDE 19
SLIDE 20
SLIDE 21
Image group Accuracy Mean Score baseline 99.6 0.6947 sunglasses 15.0 0.0344 scarf 58.7 0.2323
- verall
45.8 0.2136
AR performance
SLIDE 22
SLIDE 23
SLIDE 24
- Problem: The score function doesn’t allow
performance comparison among disguises that all score zero
- Solution: Morphs!
A minor difficulty
SLIDE 25
SLIDE 26
SLIDE 27
SLIDE 28
Ineffective Disguises
SLIDE 29
SLIDE 30
SLIDE 31
SLIDE 32
SLIDE 33
SLIDE 34
SLIDE 35
SLIDE 36
- The system is attempting to match facial features
and their positions to the closest matches in its training data
- To fool it, we need to obscure or remove existing
features, or provide decoy features for it to find
- Features are composed of contrasts in the
photographic data
What’s going on?
SLIDE 37
SLIDE 38
SLIDE 39
SLIDE 40
SLIDE 41
Grid Model
SLIDE 42
A Grid in the Noisy Channel
identity
SLIDE 43
Experiments in progress in order to determine:
- The critical size separating features from non
features i.e. the right size of grid boxes
- The weights representing the differing
importance of each grid position to system performance
Refining the Grid
SLIDE 44
An anomaly
SLIDE 45
Performance T radeoffs
0.2 0.4 0.6 0.8 1 200 250 300 350 400 450 500 550 600 650 700 similarity accuracy ave score false negatives
SLIDE 46
- Elaborate the grid model further
- Test disguises on more subjects
- Replicate with a face recognition system with a
very different underlying model e.g. FaceIt
- Extend framework to more biometrics, and
beyond
Future W
- rk
SLIDE 47