Javascript must be enabled to continue!
Generative Modeling towards Model-Free Kinship Verification Attack
View through CrossRef
Abstract
Visual kinship understanding has raised privacy concerns in the past few years. That being said, the kinship relationship can be simply detected and exposed to the public, with or without the permission of photo owners, leading to severe privacy leaks or malicious retaliation against families. Visual kinship verification, a procedure that determines whether two people have kin relations through facial images, is the primary concern among kinship applications. To that end, this paper explores practical approaches to compromising CNN and Transformer based deep kinship verification models, to protect users' kinship privacy. Specifically, two generative models, Kinship-advGAN and Kinship-advTransGAN, are proposed to generate small perturbation vectors in face images to flip the verification results. To validate our methods, we conduct extensive experiments on visual kinship benchmarks, including FIW, KinFaceW datasets, and Kaggle Kinship Verification Challenges. The results show that our methods outperform several state-of-the-art methods and reveal vital insights: the CNN-based method attains a higher success rate of attacks, while the Transformer-based method provides more decentralized adversarial attacks on kinship verification.
Title: Generative Modeling towards Model-Free Kinship Verification Attack
Description:
Abstract
Visual kinship understanding has raised privacy concerns in the past few years.
That being said, the kinship relationship can be simply detected and exposed to the public, with or without the permission of photo owners, leading to severe privacy leaks or malicious retaliation against families.
Visual kinship verification, a procedure that determines whether two people have kin relations through facial images, is the primary concern among kinship applications.
To that end, this paper explores practical approaches to compromising CNN and Transformer based deep kinship verification models, to protect users' kinship privacy.
Specifically, two generative models, Kinship-advGAN and Kinship-advTransGAN, are proposed to generate small perturbation vectors in face images to flip the verification results.
To validate our methods, we conduct extensive experiments on visual kinship benchmarks, including FIW, KinFaceW datasets, and Kaggle Kinship Verification Challenges.
The results show that our methods outperform several state-of-the-art methods and reveal vital insights: the CNN-based method attains a higher success rate of attacks, while the Transformer-based method provides more decentralized adversarial attacks on kinship verification.
Related Results
Verification of High Speed on Chip with VIP using System Verilog
Verification of High Speed on Chip with VIP using System Verilog
Abstract - The exploration work is addressing verification of High speed on chips protocol; we've used the system Verilog grounded test bench structure. I developed a system Verilo...
Linguocultural Aspect of Chinese and English Kinship Terms
Linguocultural Aspect of Chinese and English Kinship Terms
Introduction. The article deals with the kinship term systems of the modern English and Chinese languages in linguocultural perspective. Although the size and the structure of a fa...
ПЕРСПЕКТИВИ ОНТОЛОГІЧНОГО МОДЕЛЮВАННЯ ЯК ЗАСОБУ ВЕРИФІКАЦІЇ РЕЗУЛЬТАТІВ ПСИХОЛОГІЧНОГО ДОСЛІДЖЕННЯ (НА ПРИКЛАДІ ВИВЧЕННЯ ЯВИЩ ГРИ)
ПЕРСПЕКТИВИ ОНТОЛОГІЧНОГО МОДЕЛЮВАННЯ ЯК ЗАСОБУ ВЕРИФІКАЦІЇ РЕЗУЛЬТАТІВ ПСИХОЛОГІЧНОГО ДОСЛІДЖЕННЯ (НА ПРИКЛАДІ ВИВЧЕННЯ ЯВИЩ ГРИ)
Purpose. Methodological differences in the verification standards for the results of scientific knowledge between individual psychological branches represented in the domestic and ...
Enhancing analog circuit security through obfuscation
Enhancing analog circuit security through obfuscation
The focus of this dissertation is the safeguarding of analog circuits against IP piracy attacks, which includes the development of a novel method to secure analog IP, the assessmen...
Shenzi 16-Inch Oil Export SCR CVA Verification
Shenzi 16-Inch Oil Export SCR CVA Verification
Abstract
In 2006 Enterprise developed a 16-inch oil export system from Shenzi field located in Green Canyon Block 653 in the Gulf of Mexico, approximately 120 nau...
Slaveri hos Tuaregerne i Sahara
Slaveri hos Tuaregerne i Sahara
Slavery among the Tuareg in the SaharaA preliminary analysis of its structure.Slavery is an institution of very considerable age. In Europe and the Orient it has been common for as...
Lessons from conducting a participatory evaluation of a kinship navigator program
Lessons from conducting a participatory evaluation of a kinship navigator program
Abstract
Background
Approximately one in ten children globally live with kinship caregivers—relatives and family friends who step in to care for a c...

