FACE-AUDITOR: Data Auditing in Facial Recognition Systems

AI-generated keywords: Facial Recognition Auditing Reference Information Similarity Metrics USENIX Security Symposium

AI-generated Key Points

  • Facial recognition systems are scalable and can work with few face images during model deployment
  • These systems can be misused by entities who can build facial recognition models without people's awareness or consent
  • Modifying raw face images before sharing them destroys semantic information and increases retroactivity difficulty
  • The authors propose a complete toolkit called FACE-AUDITOR to audit facial recognition systems
  • FACE-AUDITOR formulates the auditing process as a user-level membership inference problem
  • The toolkit carefully chooses the probing set to query few-shot-based facial recognition models to determine if any of a user's face images were used in training the model
  • The authors propose using similarity scores between original face images as reference information to improve auditing performance
  • They consider three types of image-level similarity metrics: directly comparing pixel similarity, comparing structural similarity, or using deep neural networks for comparison
  • Empirical experiments show that FACE-AUDITOR achieves up to 99% accuracy in multiple real-world face image datasets
  • FACE-AUDITOR is robust in the presence of several perturbation mechanisms applied to training images or target models
  • Cosine similarity achieves relatively better performance in most settings when learning similarity between images.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang

To appear in the 32nd USENIX Security Symposium, August 2023, Anaheim, CA, USA
License: CC BY-NC-SA 4.0

Abstract: Few-shot-based facial recognition systems have gained increasing attention due to their scalability and ability to work with a few face images during the model deployment phase. However, the power of facial recognition systems enables entities with moderate resources to canvas the Internet and build well-performed facial recognition models without people's awareness and consent. To prevent the face images from being misused, one straightforward approach is to modify the raw face images before sharing them, which inevitably destroys the semantic information, increases the difficulty of retroactivity, and is still prone to adaptive attacks. Therefore, an auditing method that does not interfere with the facial recognition model's utility and cannot be quickly bypassed is urgently needed. In this paper, we formulate the auditing process as a user-level membership inference problem and propose a complete toolkit FACE-AUDITOR that can carefully choose the probing set to query the few-shot-based facial recognition model and determine whether any of a user's face images is used in training the model. We further propose to use the similarity scores between the original face images as reference information to improve the auditing performance. Extensive experiments on multiple real-world face image datasets show that FACE-AUDITOR can achieve auditing accuracy of up to $99\%$. Finally, we show that FACE-AUDITOR is robust in the presence of several perturbation mechanisms to the training images or the target models. The source code of our experiments can be found at \url{https://github.com/MinChen00/Face-Auditor}.

Submitted to arXiv on 05 Apr. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2304.02782v1

Facial recognition systems have gained popularity due to their scalability and ability to work with a few face images during the model deployment phase. However, these systems can be misused by entities with moderate resources who can canvas the internet and build well-performed facial recognition models without people's awareness and consent. To prevent misuse of face images, one straightforward approach is to modify raw face images before sharing them, but this destroys semantic information and increases retroactivity difficulty. In this paper titled "FACE-AUDITOR: Data Auditing in Facial Recognition Systems," the authors formulate the auditing process as a user-level membership inference problem and propose a complete toolkit called FACE-AUDITOR. This toolkit carefully chooses the probing set to query few-shot-based facial recognition models and determines whether any of a user's face images are used in training the model. The authors further propose using similarity scores between original face images as reference information to improve auditing performance. To improve auditing performance further, they consider using image-level similarity between query image and support set as additional reference information referred to as reference auditing feature χr. The auditing feature χ is a concatenation of basic auditing feature and reference auditing feature (χ = χb||χr). They consider three types of image-level similarity metrics: directly comparing pixel similarity (MSE and CosSim), comparing structural similarity (SSIM), or using deep neural networks (LPIPS) for comparison. Empirical experiments show that FACE-AUDITOR achieves up to 99% accuracy in multiple real-world face image datasets. Additionally, FACE-AUDITOR is robust in the presence of several perturbation mechanisms applied to training images or target models. The authors also show that cosine similarity achieves relatively better performance in most settings when learning similarity between images. In conclusion, FACE-AUDITOR is an effective auditing tool that can determine whether facial recognition models use a user's face images without their consent. The proposed reference information and similarity metrics improve the auditing performance significantly. This paper will appear in the 32nd USENIX Security Symposium in August 2023, Anaheim, CA, USA.
Created on 08 Apr. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.