evaluation of privacy

Evaluation of Privacy Protection Performance of De-id Faces STSM - PowerPoint PPT Presentation

Evaluation of Privacy Protection Performance of De-id Faces STSM Report by Zongji Sun University of Hertfordshire, UK Host institution: Department of Electronic System, Aalborg University, Denmark 1 Aim of this STSM Evaluation of the UH


  1. Evaluation of Privacy Protection Performance of De-id Faces STSM Report by Zongji Sun University of Hertfordshire, UK Host institution: Department of Electronic System, Aalborg University, Denmark 1

  2. Aim of this STSM • Evaluation of the UH face de-identification method using the AAU face recognition system. • UH face de-identification: k -Diff-furthest • Methods in AAU face recognition system: • LBP • LPQ • HOG • Face datasets used in the evaluation • FERET • Multi-PIE 2

  3. Our k -Diff-furthest method Face features in a simplified 2D illustration 05/11/2015 3

  4. k -Diff-furthest de-identified faces • Original faces • De-identified faces 05/11/2015 4

  5. Re-identification risk of de-identified faces against their original faces 05/11/2015 5

  6. Types of re-identification attacks Gallery Probe Naïve recognition Original De-identified Reverse De-identified Original recognition Parrot recognition De-identified Mock De- identified 6

  7. Performance of Threshold method [1] Newton, E. M., Sweeney, L., & Malin, B. (2005). Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge and Data Engineering, 17(2), 232 – 243. doi:10.1109/TKDE.2005.32 7

  8. Face datasets - FERET • 963 subjects each with two face images captured at the same shooting session • Nearly identical head pose, hair details, upper body, clothing and background • Details within face region (e.g. facial expression) may be different id: 002 id: 0043 id: 194 8

  9. Face datasets – Multi-PIE • 224 subjects each with two face images captured at the same shooting session • Nearly identical head pose, hair details, upper body, clothing and background • Details within face region are different – one neutral and the other happy id: 001 id: 002 id: 040 9

  10. De-id face De-id face with Original without BG Examples of de-identified faces BG 10

  11. Re-identification Test id: 00043 id: 00050 id: 00048 id: 00130 id: 00155 Original fa Original fb De-id fb 11

  12. Re-identification Test Without background Without background Without background 200  200 Original fa Original fb De-id fb 200 x 200 Without background Orig De-id PCA + K-NN (Euclidean distance) 47.25% 0.10% LBP + K-NN (Euclidean distance) 74.25% 0.21% HOG + K-NN (Cosine distance) 47.14% 0.10% LPQ + K-NN (Cosine distance) 51.92% 0.21% LPQ + SVM 48.39% 0.21% 12

  13. Re-identification Test (cont.) Without background Without background Without background 300  300 Original fa Original fb De-id fb 300 x 300 Without background FERET dataset Orig De-id PCA + k -NN (Euclidean distance) 42.37% 0% LBP + k -NN (Euclidean distance) 63.03% 0.21% HOG + k -NN (Cosine distance) 18.38% 0% LPQ + k -NN (Cosine distance) 45.79% 0.21% 300 x 300 Without background Multi-PIE dataset Orig De-id LBP + k -NN (Euclidean distance) 76.79% 0.45% LPQ + k -NN (Cosine distance) 61.16% 0% 13

  14. Re-identification Test with BG With background With background With background 200  200 Original fa Original fb De-id fb 200 x 200 With background Orig De-id PCA + K-NN (Euclidean distance) 54.83% 4.05% LBP + K-NN (Euclidean distance) 83.39% 1.25% HOG + K-NN (Cosine distance) 74.87% 5.92% LPQ + K-NN (Cosine distance) 80.69% 21.91% LPQ + SVM 78.09% 17.45% 14

  15. Re-identification Test with BG (cont.) With background With background With background 300  300 Original fa Original fb De-id fb 300 x 300 With background Without background FERET dataset Orig De-id Orig De-id PCA + k -NN (Euclidean distance) 61.27% 38.94% 42.37% 0% LBP + k -NN (Euclidean distance) 87.23% 54.83% 63.03% 0.21% HOG + k -NN (Cosine distance) 78.09% 56.70% 18.38% 0% LPQ + k -NN (Cosine distance) 82.24% 61.37% 45.79% 0.21% 300 x 300 With background Without background Multi-PIE dataset Orig De-id Orig De-id LBP + k -NN (Euclidean distance) 95.5% 66.96% 76.79% 0.45% LPQ + k -NN (Cosine distance) 96.88% 75.89% 61.16% 0% 15

  16. Same person? 16

  17. Same person? 17

  18. Potential risk of background • Inverse crop based on their facial landmarks • This is a generic attack to any face de-identification method, which modifies the face region only. id: 00049 id: 00002 id: 00130 id: 00155 Original fa 300 x 300 inverse crop Orig De-id Original fb PCA + k -NN 56.39% 30.11% LBP + k -NN 78.19% 55.24% HOG + k -NN 53.27% 26.17% LPQ + k -NN 60.85% 32.09% De-id fb 18

  19. Summary of activities during this STSM • Extensive re-identification tests with FERET and Multi PIE datasets using different face descriptors and different distance measurements. • Recognition test of a potential re-identification attack based on background image region and evaluation of the risk (recognition using background information) 19

  20. Conclusions • k -Diff-furthest face de-identification method has high privacy protection performance within the face region. • However, when the de-identified face region is merged with the background from the original image, it may significantly increase the risk of re-identification to an unacceptable level. • To build a complete face de-identified system, not only the face region need to be considered, but also the soft-biometric and non-biometric parts outside the face region (work of WG2) need to be considered. 20

  21. Questions? 21

  22. Thank you! 22

Recommend


More recommend


Explore More Topics

Stay informed with curated content and fresh updates.