Secure Face Matching Using Fully Homomorphic Encryption Vishnu - - PowerPoint PPT Presentation

secure face matching using fully homomorphic encryption
SMART_READER_LITE
LIVE PREVIEW

Secure Face Matching Using Fully Homomorphic Encryption Vishnu - - PowerPoint PPT Presentation

Secure Face Matching Using Fully Homomorphic Encryption Vishnu Boddeti Michigan State University October 23rd, 2018 []$ [1/1] >>> Face Representation and Matching * Face Representation: Alignment Embedding Function Representation


slide-1
SLIDE 1

Secure Face Matching Using Fully Homomorphic Encryption

Vishnu Boddeti Michigan State University

October 23rd, 2018 [˜]$ [1/1]

slide-2
SLIDE 2

>>> Face Representation and Matching * Face Representation:

. . .

Detection Alignment Normalization Embedding Function Representation

y ∈ Rd

[˜]$ [2/1]

slide-3
SLIDE 3

>>> Face Representation and Matching * Face Representation:

. . .

Detection Alignment Normalization Embedding Function Representation

y ∈ Rd

* Face Matching:

. . . R

. . . R . . . R . . . R . . . R

similarity best match

[˜]$ [2/1]

slide-4
SLIDE 4

>>> Security Vulnerabilities * Attacks on Biometric Systems:

Sensor Feature Extractor Matcher Decision Database

High Resp. Low Resp. Test Image Neurons High Resp. Low Resp. Age Hair Color Race Gender Face Shape Eye Shape Bangs Brown Hair Pale Skin Narrow Eyes High Cheek. Eyeglasses Mustache Black Hair Smiling Big Nose
  • Wear. Hat
Blond Hair Wear. Lipstick Asian Big Eyes (b.1) (b.2) (b.3) (a.1) (a.2) (a.3) (a.4) (a.5) (a.6) Activations Identity-related Attributes Identity-non-related Attributes ANet (FC) ANet (C4) ANet (C3)

(a) (b) 50% 60% 70% 80% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Average Accuracy Percentage of Best Performing Neurons Used ANet (After fine-tuning) HOG (After PCA) single best performing neuron 70% 75% 80% 85% 90% Smiling Wearing Hat Rosy Cheeks 5oClock Shadow 80% 85% 90% 95% 100% Male White Black Asian Accuracy

1Mai, Guangcan, Kai Cao, C. YUEN Pong, and Anil K. Jain. “On the Reconstruction of Face Images from Deep Face Templates.” PAMI 2018

[˜]$ [3/1]

slide-5
SLIDE 5

>>> Security Vulnerabilities * Attacks on Biometric Systems:

Sensor Feature Extractor Matcher Decision Database

* Attacks on Templates:

* Face reconstruction from template1

0.84 0.78 0.82 0.93

High Resp. Low Resp. Test Image Neurons High Resp. Low Resp. Age Hair Color Race Gender Face Shape Eye Shape Bangs Brown Hair Pale Skin Narrow Eyes High Cheek. Eyeglasses Mustache Black Hair Smiling Big Nose
  • Wear. Hat
Blond Hair Wear. Lipstick Asian Big Eyes (b.1) (b.2) (b.3) (a.1) (a.2) (a.3) (a.4) (a.5) (a.6) Activations Identity-related Attributes Identity-non-related Attributes ANet (FC) ANet (C4) ANet (C3)

(a) (b) 50% 60% 70% 80% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Average Accuracy Percentage of Best Performing Neurons Used ANet (After fine-tuning) HOG (After PCA) single best performing neuron 70% 75% 80% 85% 90% Smiling Wearing Hat Rosy Cheeks 5oClock Shadow 80% 85% 90% 95% 100% Male White Black Asian Accuracy

1Mai, Guangcan, Kai Cao, C. YUEN Pong, and Anil K. Jain. “On the Reconstruction of Face Images from Deep Face Templates.” PAMI 2018

[˜]$ [3/1]

slide-6
SLIDE 6

>>> Security Vulnerabilities * Attacks on Biometric Systems:

Sensor Feature Extractor Matcher Decision Database

* Attacks on Templates:

* Face reconstruction from template1 * Privacy leakage through attribute prediction from template

0.84 0.78 0.82 0.93

High Resp. Low Resp. Test Image Neurons High Resp. Low Resp. Age Hair Color Race Gender Face Shape Eye Shape Bangs Brown Hair Pale Skin Narrow Eyes High Cheek. Eyeglasses Mustache Black Hair Smiling Big Nose
  • Wear. Hat
Blond Hair Wear. Lipstick Asian Big Eyes (b.1) (b.2) (b.3) (a.1) (a.2) (a.3) (a.4) (a.5) (a.6) Activations Identity-related Attributes Identity-non-related Attributes ANet (FC) ANet (C4) ANet (C3)

(a) (b) 50% 60% 70% 80% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Average Accuracy Percentage of Best Performing Neurons Used ANet (After fine-tuning) HOG (After PCA) single best performing neuron 70% 75% 80% 85% 90% Smiling Wearing Hat Rosy Cheeks 5oClock Shadow 80% 85% 90% 95% 100% Male White Black Asian Accuracy

1Mai, Guangcan, Kai Cao, C. YUEN Pong, and Anil K. Jain. “On the Reconstruction of Face Images from Deep Face Templates.” PAMI 2018

[˜]$ [3/1]

slide-7
SLIDE 7

>>> Template Protection

(a) Fuzzy Vault [˜]$ [4/1]

slide-8
SLIDE 8

>>> Template Protection

(a) Fuzzy Vault (b) Geometrical Transformations [˜]$ [4/1]

slide-9
SLIDE 9

>>> Template Protection

(a) Fuzzy Vault (b) Geometrical Transformations (c) Correlation with Random Masks [˜]$ [4/1]

slide-10
SLIDE 10

>>> Template Protection

(a) Fuzzy Vault (b) Geometrical Transformations (c) Correlation with Random Masks (d) Biohashing [˜]$ [4/1]

slide-11
SLIDE 11

>>> Template Protection

(a) Fuzzy Vault (b) Geometrical Transformations (c) Correlation with Random Masks (d) Biohashing

* Drawback: Trade-Off matching performance for template security.

[˜]$ [4/1]

slide-12
SLIDE 12

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

[˜]$ [5/1]

slide-13
SLIDE 13

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy

[˜]$ [5/1]

slide-14
SLIDE 14

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy * enables free and open sharing

[˜]$ [5/1]

slide-15
SLIDE 15

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy * enables free and open sharing * mitigate legal and ethical issues

[˜]$ [5/1]

slide-16
SLIDE 16

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy * enables free and open sharing * mitigate legal and ethical issues

* Can we encrypt the biometric signatures?

[˜]$ [5/1]

slide-17
SLIDE 17

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy * enables free and open sharing * mitigate legal and ethical issues

* Can we encrypt the biometric signatures? * Can we perform biometric matching in the encryption domain?

[˜]$ [5/1]

slide-18
SLIDE 18

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy * enables free and open sharing * mitigate legal and ethical issues

* Can we encrypt the biometric signatures? * Can we perform biometric matching in the encryption domain? * Can we maintain matching performance in the encrypted domain?

[˜]$ [5/1]

slide-19
SLIDE 19

>>> Encryption: The Holy Grail? * Data encryption is an attractive option.

* protects user’s privacy * enables free and open sharing * mitigate legal and ethical issues

* Can we encrypt the biometric signatures? * Can we perform biometric matching in the encryption domain? * Can we maintain matching performance in the encrypted domain? * Encryption scheme needs to allow computations directly on the encrypted data.

[˜]$ [5/1]

slide-20
SLIDE 20

>>> What is Homomorphic Encryption? * Encryption that allows computations on ciphertext.

[˜]$ [6/1]

slide-21
SLIDE 21

>>> What is Homomorphic Encryption? * Encryption that allows computations on ciphertext. * Partially Homomorphic Encryption: allows homomorphic additions or multiplications

[˜]$ [6/1]

slide-22
SLIDE 22

>>> What is Homomorphic Encryption? * Encryption that allows computations on ciphertext. * Partially Homomorphic Encryption: allows homomorphic additions or multiplications * Somewhat Homomorphic Encryption: allows limited number of homomorphic additions and multiplications

[˜]$ [6/1]

slide-23
SLIDE 23

>>> What is Homomorphic Encryption? * Encryption that allows computations on ciphertext. * Partially Homomorphic Encryption: allows homomorphic additions or multiplications * Somewhat Homomorphic Encryption: allows limited number of homomorphic additions and multiplications * Fully Homomorphic Encryption: allows unlimited number of additions and multiplications

[˜]$ [6/1]

slide-24
SLIDE 24

>>> What is Homomorphic Encryption? * Encryption that allows computations on ciphertext. * Partially Homomorphic Encryption: allows homomorphic additions or multiplications * Somewhat Homomorphic Encryption: allows limited number of homomorphic additions and multiplications * Fully Homomorphic Encryption: allows unlimited number of additions and multiplications This Paper Explores:

[˜]$ [6/1]

slide-25
SLIDE 25

>>> What is Homomorphic Encryption? * Encryption that allows computations on ciphertext. * Partially Homomorphic Encryption: allows homomorphic additions or multiplications * Somewhat Homomorphic Encryption: allows limited number of homomorphic additions and multiplications * Fully Homomorphic Encryption: allows unlimited number of additions and multiplications This Paper Explores: * feasibility of fully homomorphic encryption for secure face matching. * efficiency of fully homomorphic encryption for secure face matching.

[˜]$ [6/1]

slide-26
SLIDE 26

>>> Enrollment Protocol * Client device:

* generates cryptographic keys Client Device

Key Gen θd

[˜]$ [7/1]

slide-27
SLIDE 27

>>> Enrollment Protocol * Client device:

* generates cryptographic keys * captures biometric signature + extracts feature Client Device

Key Gen x θd

[˜]$ [7/1]

slide-28
SLIDE 28

>>> Enrollment Protocol * Client device:

* generates cryptographic keys * captures biometric signature + extracts feature * encrypts feature Client Device

Key Gen Encryption x θd θe

[˜]$ [7/1]

slide-29
SLIDE 29

>>> Enrollment Protocol * Client device:

* generates cryptographic keys * captures biometric signature + extracts feature * encrypts feature * transmits encrypted feature + identity label to remote database Encrypted Database Client Device

(E(x), c) Key Gen Encryption x θd θe

[˜]$ [7/1]

slide-30
SLIDE 30

>>> Authentication Protocol * Client device:

* captures biometric signature + extracts feature Client Device

y

[˜]$ [8/1]

slide-31
SLIDE 31

>>> Authentication Protocol * Client device:

* captures biometric signature + extracts feature * encrypts feature Client Device

θe Encryption y

[˜]$ [8/1]

slide-32
SLIDE 32

>>> Authentication Protocol * Client device:

* captures biometric signature + extracts feature * encrypts feature * transmits encrypted feature + claimed identity label to remote database Client Device

θe Encryption y (E(y), c′)

[˜]$ [8/1]

slide-33
SLIDE 33

>>> Authentication Protocol * Client device:

* captures biometric signature + extracts feature * encrypts feature * transmits encrypted feature + claimed identity label to remote database

* Remote Database:

* homomorphic inner product between encrypted probe and gallery Encrypted Database Client Device

θe Encryption y (E(y), c′)

[˜]$ [8/1]

slide-34
SLIDE 34

>>> Authentication Protocol * Client device:

* captures biometric signature + extracts feature * encrypts feature * transmits encrypted feature + claimed identity label to remote database

* Remote Database:

* homomorphic inner product between encrypted probe and gallery * transmits encrypted scores to client Encrypted Database Client Device

θe Encryption y (E(y), c′) (E(d1), . . . , E(dn))

[˜]$ [8/1]

slide-35
SLIDE 35

>>> Authentication Protocol * Client device:

* captures biometric signature + extracts feature * encrypts feature * transmits encrypted feature + claimed identity label to remote database

* Remote Database:

* homomorphic inner product between encrypted probe and gallery * transmits encrypted scores to client

* Client device:

* decrypts received scores and makes decision Encrypted Database Client Device

θe Encryption y θd Decryption (d1, . . . , dn) (E(y), c′) (E(d1), . . . , E(dn))

[˜]$ [8/1]

slide-36
SLIDE 36

>>> Homomorphic Inner Products * Feature Matching: Euclidean Distance: d(x, y) = x − y2

2 = xT x + yT y − 2xT y

Cosine Similarity: s(x, y) = xT y xy

[˜]$ [9/1]

slide-37
SLIDE 37

>>> Homomorphic Inner Products * Feature Matching: Euclidean Distance: d(x, y) = x − y2

2 = xT x + yT y − 2xT y

Cosine Similarity: s(x, y) = xT y xy * Inner Product: xT y =

d

  • i=1

xiyi

[˜]$ [9/1]

slide-38
SLIDE 38

>>> Homomorphic Inner Products * Feature Matching: Euclidean Distance: d(x, y) = x − y2

2 = xT x + yT y − 2xT y

Cosine Similarity: s(x, y) = xT y xy * Inner Product: xT y =

d

  • i=1

xiyi * Homomorphic Inner Product: s(x, y) = D  

d

  • i=1

E(xi, θe)E(yi, θe), θd  

[˜]$ [9/1]

slide-39
SLIDE 39

>>> Batching: Amortized Homomorphic Inner Product * Inner Product: d homomorphic multiplications + d − 1 homomorphic additions

[˜]$ [10/1]

slide-40
SLIDE 40

>>> Batching: Amortized Homomorphic Inner Product * Inner Product: d homomorphic multiplications + d − 1 homomorphic additions * Complexity: homomorphic multiplication >>> homomorphic addition

[˜]$ [10/1]

slide-41
SLIDE 41

>>> Batching: Amortized Homomorphic Inner Product * Inner Product: d homomorphic multiplications + d − 1 homomorphic additions * Complexity: homomorphic multiplication >>> homomorphic addition * Batching Inner Product: 1 homomorphic multiplications + log2(d) homomorphic additions

[˜]$ [10/1]

slide-42
SLIDE 42

>>> Batching: Amortized Homomorphic Inner Product * Inner Product: d homomorphic multiplications + d − 1 homomorphic additions * Complexity: homomorphic multiplication >>> homomorphic addition * Batching Inner Product: 1 homomorphic multiplications + log2(d) homomorphic additions * Template Size: batching size <<< no batching size

[˜]$ [10/1]

slide-43
SLIDE 43

>>> Batching: Amortized Homomorphic Inner Product * Inner Product: d homomorphic multiplications + d − 1 homomorphic additions * Complexity: homomorphic multiplication >>> homomorphic addition * Batching Inner Product: 1 homomorphic multiplications + log2(d) homomorphic additions * Template Size: batching size <<< no batching size * Key Idea: amortized inner product

[˜]$ [10/1]

slide-44
SLIDE 44

>>> Batching: Amortized Homomorphic Inner Product * Inner Product: d homomorphic multiplications + d − 1 homomorphic additions * Complexity: homomorphic multiplication >>> homomorphic addition * Batching Inner Product: 1 homomorphic multiplications + log2(d) homomorphic additions * Template Size: batching size <<< no batching size * Key Idea: amortized inner product

* Encode entire vector at once + repetitive circular shift and addition

6 1 2 2 9 3

  • 4

× 54 3

  • 8

+

Kg1

57

  • 5
  • 8

54 +

Kg2

49 49 49 49 × 49 3

  • 8

54

  • 8

54 57

  • 5

1

[˜]$ [10/1]

slide-45
SLIDE 45

>>> Experimental Setup * Datasets: LFW, IJB-A, IJB-B and CASIA * Models: FaceNet (128-D) and SphereFace (512-D) * Evaluation: True Accept Rate 0.01%, 0.1% and 1% FAR * Options: different quantization, security levels, dimensionality of features

[˜]$ [11/1]

slide-46
SLIDE 46

>>> Computational Complexity * Pairwise Matching Time

* Homomorphic Encryption * Homomorphic Matching * Homomorphic Decryption

* Template Size

* Database storage size * Communicating encrypted templates

[˜]$ [12/1]

slide-47
SLIDE 47

>>> Computational Complexity * Pairwise Matching Time

* Homomorphic Encryption * Homomorphic Matching * Homomorphic Decryption

* Template Size

* Database storage size * Communicating encrypted templates

Table: Matching Time and Template Memory Security Dim No FHE No Batching Batching in bits Time Mem Time (ms) Mem Time (ms) Mem (λ) (d) (µs) (KB) Enc Score Dec Total (MB) Enc Score Dec Total (KB) 64 0.44 2.0 128 0.89 4.0 512 3.48 16.0 1024 7.49 32.0

[˜]$ [12/1]

slide-48
SLIDE 48

>>> Computational Complexity * Pairwise Matching Time

* Homomorphic Encryption * Homomorphic Matching * Homomorphic Decryption

* Template Size

* Database storage size * Communicating encrypted templates

Table: Matching Time and Template Memory Security Dim No FHE No Batching Batching in bits Time Mem Time (ms) Mem Time (ms) Mem (λ) (d) (µs) (KB) Enc Score Dec Total (MB) Enc Score Dec Total (KB) 128 64 0.44 2.0 4.40 5.25 0.01 9.66 0.25 128 0.89 4.0 17.57 21.05 0.02 38.64 1.0 512 3.48 16.0 280.19 343.81 0.08 624.07 16.5 1024 7.49 32.0 2214.88 2924.75 0.33 5139.97 131.0

[˜]$ [12/1]

slide-49
SLIDE 49

>>> Computational Complexity * Pairwise Matching Time

* Homomorphic Encryption * Homomorphic Matching * Homomorphic Decryption

* Template Size

* Database storage size * Communicating encrypted templates

Table: Matching Time and Template Memory Security Dim No FHE No Batching Batching in bits Time Mem Time (ms) Mem Time (ms) Mem (λ) (d) (µs) (KB) Enc Score Dec Total (MB) Enc Score Dec Total (KB) 128 64 0.44 2.0 4.40 5.25 0.01 9.66 0.25 0.07 0.17 0.01 0.25 2.0 128 0.89 4.0 17.57 21.05 0.02 38.64 1.0 0.14 0.38 0.02 0.59 4.0 512 3.48 16.0 280.19 343.81 0.08 624.07 16.5 0.58 1.80 0.07 2.45 16.0 1024 7.49 32.0 2214.88 2924.75 0.33 5139.97 131.0 2.27 8.36 0.30 11.42 32.0

[˜]$ [12/1]

slide-50
SLIDE 50

>>> Homomorphic Matching Performance * Face verification: different quantization levels

Table: Face Recognition Accuracy (TAR @ FAR in %)

Dataset Method 128-D FaceNet 512-D SphereFace 0.01% 0.1% 1% 0.01% 0.1% 1% IJB-B No FHE 25.77 48.31 74.47 7.86 31.27 69.83 FHE (2.5×10−3) 25.78 48.28 74.46 7.86 31.27 69.82 FHE (1.0×10−2) 25.71 48.31 74.44 7.80 31.29 69.75 FHE (1.0×10−1) 23.75 46.08 72.87 7.49 30.92 67.45

[˜]$ [13/1]

slide-51
SLIDE 51

>>> Take Home Message * Facial template security is of growing importance.

[˜]$ [14/1]

slide-52
SLIDE 52

>>> Take Home Message * Facial template security is of growing importance. * Fully homomorphic face matching in encrypted domain is feasible and practical.

[˜]$ [14/1]

slide-53
SLIDE 53

>>> Take Home Message * Facial template security is of growing importance. * Fully homomorphic face matching in encrypted domain is feasible and practical. * What next?

[˜]$ [14/1]

slide-54
SLIDE 54

>>> Take Home Message * Facial template security is of growing importance. * Fully homomorphic face matching in encrypted domain is feasible and practical. * What next?

* Limitation: score thresholding is performed after decryption * Consequence: hill climbing attack is still possible from decrypted score

[˜]$ [14/1]

slide-55
SLIDE 55

>>> Take Home Message * Facial template security is of growing importance. * Fully homomorphic face matching in encrypted domain is feasible and practical. * What next?

* Limitation: score thresholding is performed after decryption * Consequence: hill climbing attack is still possible from decrypted score * Limitation: encryption and decryption key are on client device * Consequence: key management on client device is the weakest link

[˜]$ [14/1]