Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection | IEEE Journals & Magazine | IEEE Xplore

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection


Abstract:

Billions of people share images from their daily lives on social media every day. However, their biometric information (e.g., fingerprints) could be easily stolen from th...Show More

Abstract:

Billions of people share images from their daily lives on social media every day. However, their biometric information (e.g., fingerprints) could be easily stolen from these images. The threat of fingerprint leakage from social media has created a strong desire to anonymize shared images while maintaining image quality, since fingerprints act as a lifelong individual biometric password. To guard the fingerprint leakage, adversarial attack that involves adding imperceptible perturbations to fingerprint images have emerged as a feasible solution. However, existing works of this kind are either weak in black-box transferability or cause the images to have an unnatural appearance. Motivated by the visual perception hierarchy (i.e., high-level perception exploits model-shared semantics that transfer well across models while low-level perception extracts primitive stimuli that result in high visual sensitivity when a suspicious stimulus is provided), we propose FingerSafe, a hierarchical perceptual protective noise injection framework to address the above mentioned problems. For black-box transferability, we inject protective noises into the fingerprint orientation field to perturb the model-shared high-level semantics (i.e., fingerprint ridges). Considering visual naturalness, we suppress the low-level local contrast stimulus by regularizing the response of the Lateral Geniculate Nucleus. Our proposed FingerSafe is the first to provide feasible fingerprint protection in both digital (up to 94.12%) and realistic scenarios (Twitter and Facebook, up to 68.75%). Our code can be found at https://github.com/nlsde-safety-team/FingerSafe.
Published in: IEEE Transactions on Image Processing ( Volume: 33)
Page(s): 2714 - 2729
Date of Publication: 01 April 2024

ISSN Information:

PubMed ID: 38557629

Funding Agency:

References is not available for this document.

I. Introduction

Posting photos on social media is a popular way to share our daily lives with others. However, given that thousands of publicly shared images on Instagram contain accessible fingerprint details [1], personal biometric information (e.g., fingerprints, etc) can be easily stolen from photos shared on social media, which may cause severe security problems for fingerprint authentication systems (e.g., access control system) as shown in Fig. 1. There is extensive evidence to support the feasibility of the above challenges. For example, hackers easily accessed the fingerprint of the president of the EU Commission via an online photo in 2014;1 recently, it was reported by CNN and BBC that fingerprints have been easily extracted from images shared on social media,2, 3 even from images taken from 3 meters away.4 The fingerprint leakage is irreversible—since you cannot change your fingerprint, once the fingerprint has been leaked, all systems that rely on fingerprints are at risk for the rest of your life [2]. Based on these leaked fingerprint images, hackers can gain authorized assess to the access control systems of governments, banks and the police,5 or payment systems such as ApplePay6 with more than an 80% success rate with an inkjet-printed paper [3] or a 3D printed mold [4]. The security of fingerprint-based systems is currently at severe risk.

https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands

https://www.bbc.com/news/uk-wales-43711477

https://edition.cnn.com/2021/05/25/uk/drug-dealer-cheese-sentenced-scli-gbr-intl/index.html

https://www.ft.com/content/446ac29a-dbc1-11e6-9d7c-be108f1c1dce

https://www.forbes.com/sites/zakdoffman/2019/08/14/new-data-breach-has-exposed-millions-of-fingerprint-and-facial-recognition-records-report/?sh=38315c146c60

https://arstechnica.com/information-technology/2020/04/attackers-can-bypass-fingerprint-authentication-with-an-80-success-rate/

Posts on Facebook unconsciously leak fingerprint of owners. The protection of pixelization is limited, large PGD is effective but unnatural. In contrast, FingerSafe is effective and natural. Images used with consent from owners.

Select All
1.
A. Malhotra, S. Chhabra, M. Vatsa and R. Singh, "On privacy preserving anonymization of finger-selfies", Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW), pp. 120-128, Jun. 2020.
2.
Y. Zhang, Z. Chen, H. Xue and T. Wei, "Fingerprints on mobile devices: Abusing and leaking", Proc. Black Hat Conf., 2015.
3.
K. Cao and A. K. Jain, "Hacking mobile phones using 2D printed fingerprints", 2016.
4.
P. Rascagneres and V. Ventura, "Fingerprint cloning: Myth or reality?", vol. 8, Apr. 2020.
5.
R. Gross, L. Sweeney, F. de la Torre and S. Baker, "Model-based face de-identification", Proc. Conf. Comput. Vis. Pattern Recognit. Workshop, pp. 161, 2006.
6.
C. Szegedy et al., "Intriguing properties of neural networks", arXiv:1312.6199, 2013.
7.
I. J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples", arXiv:1412.6572, 2014.
8.
H. Huang, X. Ma, S. Monazam Erfani, J. Bailey and Y. Wang, "Unlearnable examples: Making personal data unexploitable", arXiv:2101.04898, 2021.
9.
S. Shan, E. Wenger, J. Zhang, H. Li, H. Zheng and B. Y. Zhao, "Fawkes: Protecting privacy against unauthorized deep learning models", Proc. 29th USENIX Secur. Symp., pp. 1589-1604, 2020.
10.
X. Yang et al., "Towards face encryption by generating adversarial identity masks", arXiv:2003.06814, 2020.
11.
V. Cherepanova et al., "LowKey: Leveraging adversarial attacks to protect social media users from facial recognition", arXiv:2101.07922, 2021.
12.
I. I. A. Groen, E. H. Silson and C. I. Baker, "Contributions of low- and high-level properties to neural processing of visual scenes in the human brain", Phil. Trans. Roy. Soc. B Biol. Sci., vol. 372, no. 1714, Feb. 2017.
13.
J. Wang, A. Liu, Z. Yin, S. Liu, S. Tang and X. Liu, "Dual attention suppression attack: Generate adversarial camouflage in physical world", Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 8561-8570, Jun. 2021.
14.
M. G. Berman et al., "The perception of naturalness correlates with low-level visual features of environmental scenes", PLoS ONE, vol. 9, no. 12, Dec. 2014.
15.
L. Hong, Y. Wan and A. Jain, "Fingerprint image enhancement: Algorithm and performance evaluation", IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 8, pp. 777-789, Jul. 1998.
16.
Y. Tadmor and D. J. Tolhurst, "Calculating the contrasts that retinal ganglion cells and LGN neurones encounter in natural scenes", Vis. Res., vol. 40, no. 22, pp. 3145-3157, Oct. 2000.
17.
A. Jain, L. Hong and R. Bolle, "On-line fingerprint verification", IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 4, pp. 302-314, Apr. 1997.
18.
A. Sankaran, A. Malhotra, A. Mittal, M. Vatsa and R. Singh, "On smartphone camera based fingerphoto authentication", Proc. IEEE 7th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), pp. 1-7, Sep. 2015.
19.
C. Lin and A. Kumar, "Multi-siamese networks to accurately match contactless to contact-based fingerprint images", Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 277-285, Oct. 2017.
20.
F. Afsar, M. Arif and M. Hussain, "Fingerprint identification and verification system using minutiae matching", Proc. Nat. Conf. Emerg. Technol., vol. 2, pp. 141-146, 2004.
21.
R. Cappelli, M. Ferrara and D. Maltoni, "Minutia cylinder-code: A new representation and matching technique for fingerprint recognition", IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 12, pp. 2128-2141, Dec. 2010.
22.
Q. Zheng, A. Kumar and G. Pan, "Suspecting less and doing better: New insights on palmprint identification for faster and more accurate matching", IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 633-641, Mar. 2016.
23.
A. Malhotra, A. Sankaran, M. Vatsa and R. Singh, "On matching finger-selfies using deep scattering networks", IEEE Trans. Biometrics Behav. Identity Sci., vol. 2, no. 4, pp. 350-362, Oct. 2020.
24.
J. Bruna and S. Mallat, "Invariant scattering convolution networks", IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 8, pp. 1872-1886, Aug. 2013.
25.
Y. Tang, F. Gao, J. Feng and Y. Liu, "FingerNet: An unified deep network for fingerprint minutiae extraction", Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 108-116, Oct. 2017.
26.
L. N. Darlow and B. Rosman, "Fingerprint minutiae extraction using deep learning", Proc. IJCB, pp. 22-30, 2017.
27.
C. Lin and A. Kumar, "Contactless and partial 3D fingerprint recognition using multi-view deep representation", Pattern Recognit., vol. 83, pp. 314-327, Nov. 2018.
28.
M. Upmanyu, A. M. Namboodiri, K. Srinathan and C. V. Jawahar, "Blind authentication: A secure crypto-biometric verification protocol", IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 255-268, Jun. 2010.
29.
Y. Sun, Deep Learning Face Representation by Joint Identification-Verification, Cambridge, MA, USA:MIT Press, 2015.
30.
M. H. Ali, V. H. Mahale, P. Yannawar and A. T. Gaikwad, "Overview of fingerprint recognition system", Proc. Int. Conf. Electr. Electron. Optim. Techn. (ICEEOT), pp. 1334-1338, Mar. 2016.

Contact IEEE to Subscribe

References

References is not available for this document.