Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System
نویسندگان
چکیده
In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training systems by makes model inherent to data. As structure has been fine-tuned data, can abused for accessing estimation in reverse process called inversion attack (MIA). Although, MIA applied shallow neural network models recognizers literature and its threat privacy violation approved, case deep learning (DL) model, efficiency was under question. It due complexity DL structure, big number parameters, huge size registered users thereof class labels. This research work first analyses possibility on recognition system, namely face recognizer. Second, despite conventional white box scenario having partial access users' non-sensitive addition is implemented system just parameters but not any user information. this aspect, it semi-white or other words gray-box scenario. The experimental results targeting five CNN-based approve regeneration images even gray some evaluation score low generated are easily recognizable, high facial features targeted identities observable. objective subjective evaluations demonstrate cyber-attack only feasible also serious with increasing alert state future as there considerable potential integration more advanced techniques MIA.
منابع مشابه
Face Recognition Systems under Spoofing Attack
Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...
متن کاملA Grouping Hotel Recommender System Based on Deep Learning and Sentiment Analysis
Recommender systems are important tools for users to identify their preferred items and for businesses to improve their products and services. In recent years, the use of online services for selection and reservation of hotels have witnessed a booming growth. Customer’ reviews have replaced the word of mouth marketing, but searching hotels based on user priorities is more time-consuming. This s...
متن کاملFace Recognition based on Deep Neural Network
In modern life, we see more techniques of biometric features recognition have been used to our surrounding life, especially the applications in telephones and laptops. These biometric recognition techniques contain face recognition, fingerprint recognition and iris recognition. Our work focuses on the face recognition problem and uses a deep learning method, convolutional neural network, to sol...
متن کاملFace Recognition System for Set-Top Box-Based Intelligent TV
Despite the prevalence of smart TVs, many consumers continue to use conventional TVs with supplementary set-top boxes (STBs) because of the high cost of smart TVs. However, because the processing power of a STB is quite low, the smart TV functionalities that can be implemented in a STB are very limited. Because of this, negligible research has been conducted regarding face recognition for conve...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ksii Transactions on Internet and Information Systems
سال: 2021
ISSN: ['1976-7277', '2288-1468']
DOI: https://doi.org/10.3837/tiis.2021.03.015