liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (9 of 9) Show all publications
Minh-Ha, L. (2024). Beyond Recognition: Privacy Protections in a Surveilled World. (Doctoral dissertation). Linköping: Linköping University Electronic Press
Open this publication in new window or tab >>Beyond Recognition: Privacy Protections in a Surveilled World
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

This thesis addresses the need to balance the use of facial recognition systems with the need to protect personal privacy in machine learning and biometric identification. As advances in deep learning accelerate their evolution, facial recognition systems enhance security capabilities, but also risk invading personal privacy. Our research identifies and addresses critical vulnerabilities inherent in facial recognition systems, and proposes innovative privacy-enhancing technologies that anonymize facial data while maintaining its utility for legitimate applications.

Our investigation centers on the development of methodologies and frameworks that achieve k-anonymity in facial datasets; leverage identity disentanglement to facilitate anonymization; exploit the vulnerabilities of facial recognition systems to underscore their limitations; and implement practical defenses against unauthorized recognition systems. We introduce novel contributions such as AnonFACES, StyleID, IdDecoder, StyleAdv, and DiffPrivate, each designed to protect facial privacy through advanced adversarial machine learning techniques and generative models. These solutions not only demonstrate the feasibility of protecting facial privacy in an increasingly surveilled world, but also highlight the ongoing need for robust countermeasures against the ever-evolving capabilities of facial recognition technology.

Continuous innovation in privacy-enhancing technologies is required to safeguard individuals from the pervasive reach of digital surveillance and protect their fundamental right to privacy. By providing open-source, publicly available tools, and frameworks, this thesis contributes to the collective effort to ensure that advancements in facial recognition serve the public good without compromising individual rights. Our multi-disciplinary approach bridges the gap between biometric systems, adversarial machine learning, and generative modeling to pave the way for future research in the domain and support AI innovation where technological advancement and privacy are balanced.  

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2024. p. 81
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 2392
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-203225 (URN)10.3384/9789180756761 (DOI)9789180756754 (ISBN)9789180756761 (ISBN)
Public defence
2024-06-12, Ada Lovelace, B-building, Campus Valla, Linköping, 09:15 (English)
Opponent
Supervisors
Note

Funding: This work was supported by the Swedsih Research Council (VR) and the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Foundation.

Available from: 2024-05-06 Created: 2024-05-06 Last updated: 2024-05-08Bibliographically approved
Minh-Ha, L. & Carlsson, N. (2024). StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing. In: De Gruyter Open (Ed.), Proceedings on Privacy Enhancing Technologies: . Paper presented at The 24th Privacy Enhancing Technologies Symposium July 15–20, 2024, Bristol, UK (pp. 106-123). , 2
Open this publication in new window or tab >>StyleAdv: A Usable Privacy Framework Against Facial Recognition with Adversarial Image Editing
2024 (English)In: Proceedings on Privacy Enhancing Technologies / [ed] De Gruyter Open, 2024, Vol. 2, p. 106-123Conference paper, Published paper (Refereed)
Abstract [en]

In this era of ubiquitous surveillance and online presence, protecting facial privacy has become a critical concern for individuals and society as a whole. Adversarial attacks have emerged as a promising solution to this problem, but current methods are limited in quality or are impractical for sensitive domains such as facial editing. This paper presents a novel adversarial image editing framework called StyleAdv, which leverages StyleGAN's latent spaces to generate powerful adversarial images, providing an effective tool against facial recognition systems. StyleAdv achieves high success rates by employing meaningful facial editing with StyleGAN while maintaining image quality, addressing a challenge faced by existing methods. To do so, the comprehensive framework integrates semantic editing, adversarial attacks, and face recognition systems, providing a cohesive and robust tool for privacy protection. We also introduce the ``residual attack`` strategy, using residual information to enhance attack success rates. Our evaluation offers insights into effective editing, discussing tradeoffs in latent spaces, optimal edits for our optimizer, and the impact of utilizing residual information. Our approach is transferable to state-of-the-art facial recognition systems, making it a versatile tool for privacy protection. In addition, we provide a user-friendly interface with multiple editing options to help users create effective adversarial images. Extensive experiments are used to provide insights and demonstrate that StyleAdv outperforms state-of-the-art methods in terms of both attack success rate and image quality. By providing a versatile tool for generating high-quality adversarial samples, StyleAdv can be used both to enhance individual users' privacy and to stimulate advances in adversarial attack and defense research.

Keywords
Adversarial samples, Privacy filter, Facial anonymization
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-203224 (URN)10.56553/popets-2024-0043 (DOI)
Conference
The 24th Privacy Enhancing Technologies Symposium July 15–20, 2024, Bristol, UK
Note

Funding: This work was supported by the Swedish Research Council (VR) and the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation.

Available from: 2024-05-06 Created: 2024-05-06 Last updated: 2024-05-06Bibliographically approved
Le, M.-H. & Carlsson, N. (2023). IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems. In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy: . Paper presented at CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy, Charlotte, NC, USA, April 24 - 26, 2023 (pp. 15-26). ACM Digital Library
Open this publication in new window or tab >>IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems
2023 (English)In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, ACM Digital Library, 2023, p. 15-26Conference paper, Published paper (Refereed)
Abstract [en]

Most state-of-the-art facial recognition systems (FRS:s) use face embeddings. In this paper, we present the IdDecoder framework, capable of effectively synthesizing realistic-neutralized face images from face embeddings, and two effective attacks on state-of-the-art facial recognition models using embeddings. The first attack is a black-box version of a model inversion attack that allows the attacker to reconstruct a realistic face image that is both visually and numerically (as determined by the FRS:s) recognized as the same identity as the original face used to create a given face embedding. This attack raises significant privacy concerns regarding the membership of the gallery dataset of these systems and highlights the importance of both the people designing and deploying FRS:s paying greater attention to the protection of the face embeddings than currently done. The second attack is a novel attack that performs the model inversion, so to instead create the face of an alternative identity that is visually different from the original identity but has close identity distance (ensuring that it is recognized as being of the same identity). This attack increases the attacked system's false acceptance rate and raises significant security concerns. Finally, we use IdDecoder to visualize, evaluate, and provide insights into differences between three state-of-the-art facial embedding models.

Place, publisher, year, edition, pages
ACM Digital Library, 2023
Keywords
Face embedding inversion; Black-box attack; Facial recognition
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-199091 (URN)10.1145/3577923.3583645 (DOI)001352235200003 ()2-s2.0-85158107585 (Scopus ID)9798400700675 (ISBN)
Conference
CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy, Charlotte, NC, USA, April 24 - 26, 2023
Note

Funding Agencies|Swedish Research Council (VR); Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2023-11-11 Created: 2023-11-11 Last updated: 2024-12-11Bibliographically approved
Le, M. H. & Carlsson, N. (2023). StyleID: Identity Disentanglement for Anonymizing Faces. Paper presented at Will also be presented at the Privacy Enhancing Technologies Symposium (PETS) July 2023.. Proceedings on Privacy Enhancing Technologies (PoPETs), 1, 1-4
Open this publication in new window or tab >>StyleID: Identity Disentanglement for Anonymizing Faces
2023 (English)In: Proceedings on Privacy Enhancing Technologies (PoPETs), ISSN 2299-0984, Vol. 1, p. 1-4Article in journal, Editorial material (Other academic) Published
Abstract [en]

Privacy of machine learning models is one of the remaining challenges that hinder the broad adoption of Artificial Intelligent (AI). This paper considers this problem in the context of image datasets containing faces. Anonymization of such datasets is becoming increasingly important due to their central role in the training of autonomous cars, for example, and the vast amount of data generated by surveillance systems. While most prior work de-identifies facial images by modifying identity features in pixel space, we instead project the image onto the latent space of a Generative Adversarial Network (GAN) model, find the features that provide the biggest identity disentanglement, and then manipulate these features in latent space, pixel space, or both. The main contribution of the paper is the design of a feature-preserving anonymization framework, StyleID, which protects the individuals’ identity, while preserving as many characteristics of the original faces in the image dataset as possible. As part of the contribution, we present a novel disentanglement metric, three complementing disentanglement methods, and new insights into identity disentanglement. StyleID provides tunable privacy, has low computational complexity, and is shown to outperform current state-of-the-art solutions.

Place, publisher, year, edition, pages
De Gruyter Open, 2023
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-188914 (URN)10.56553/popets-2023-0001 (DOI)
Conference
Will also be presented at the Privacy Enhancing Technologies Symposium (PETS) July 2023.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Note

This work is accepted and will soon be published open access.  We are still waiting for doi etc.  

Available from: 2022-09-30 Created: 2022-09-30 Last updated: 2024-08-22
Bertmar, S., Gerhardsen, J., Ekblad, A., Höglund, A., Mineur, J., Oknegard Enavall, I., . . . Carlsson, N. (2021). Who's Most Targeted and Does My New Adblocker Really Help: A Profile-based Evaluation of Personalized Advertising. In: Proc. ACM CCS Workshop on Privacy in the Electronic Society (ACM WPES @CCS): . Paper presented at 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event Republic of Korea, 15 November 2021. ACM Digital Library
Open this publication in new window or tab >>Who's Most Targeted and Does My New Adblocker Really Help: A Profile-based Evaluation of Personalized Advertising
Show others...
2021 (English)In: Proc. ACM CCS Workshop on Privacy in the Electronic Society (ACM WPES @CCS), ACM Digital Library, 2021Conference paper, Published paper (Refereed)
Abstract [en]

There is limited prior work studying how the ad personalization experienced by different users is impacted by the use of adblockers, geographic location, the user's persona, or what browser they use. To address this void, this paper presents a novel profile-based evaluation of the personalization experienced by carefully crafted user profiles. Our evaluation framework impersonates different users and captures how the personalization changes over time, how it changes when adding or removing an extension, and perhaps most importantly how the results differ depending on the profile's persona (e.g., interest, occupation, age, gender), geographic location (US East, US West, UK), what browser extension they use (none, AdBlock, AdBlock Plus, Ghostery, CatBlock), what browser they use (Chrome, Firefox), and whether they are logged in to their Google account. By comparing and contrasting observed differences we provide insights that help explain why some user groups may feel more targeted than others and why some people may feel even more targeted after having turned on their adblocker.  

Place, publisher, year, edition, pages
ACM Digital Library, 2021
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-180863 (URN)10.1145/3463676.3485617 (DOI)9781450385275 (ISBN)
Conference
2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event Republic of Korea, 15 November 2021
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2021-11-06 Created: 2021-11-06 Last updated: 2023-04-03Bibliographically approved
Le, M. H., Khan, M. S., Tsaloli, G., Carlsson, N. & Buchegger, S. (2020). AnonFACES: Anonymizing Faces Adjusted to Constraints on Efficacy and Security. In: Wouter Lueks, Paul Syverson (Ed.), WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society: . Paper presented at 19th ACM Workshop on Privacy in the Electronic Society, WPES 2020, held in conjunction with the 27th ACM Conference on Computer and Communication Security, CCS 2020, Virtual, Online, 9 November 2020 (pp. 87-100). New York, NY, United States: Association for Computing Machinery (ACM)
Open this publication in new window or tab >>AnonFACES: Anonymizing Faces Adjusted to Constraints on Efficacy and Security
Show others...
2020 (English)In: WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society / [ed] Wouter Lueks, Paul Syverson, New York, NY, United States: Association for Computing Machinery (ACM) , 2020, p. 87-100Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
New York, NY, United States: Association for Computing Machinery (ACM), 2020
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-179791 (URN)10.1145/3411497.3420220 (DOI)2-s2.0-85097241828 (Scopus ID)9781450380867 (ISBN)
Conference
19th ACM Workshop on Privacy in the Electronic Society, WPES 2020, held in conjunction with the 27th ACM Conference on Computer and Communication Security, CCS 2020, Virtual, Online, 9 November 2020
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2021-10-01 Created: 2021-10-01 Last updated: 2024-09-15Bibliographically approved
Hwang, S. O. & Le, M.-H. (2018). Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model. Paper presented at 6th International Conference on Green and Human Information Technology (ICGHIT), Chiang Mai, THAILAND, jan 31-feb 02, 2018. Journal of Intelligent & Fuzzy Systems, 35(6), 5971-5981
Open this publication in new window or tab >>Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model
2018 (English)In: Journal of Intelligent & Fuzzy Systems, ISSN 1064-1246, E-ISSN 1875-8967, Vol. 35, no 6, p. 5971-5981Article in journal (Refereed) Published
Abstract [en]

Telco systems usually run large-scale, centralized key management systems. However, centralized approaches based on conventional public key encryption like RSA raise problems such as key escrow, secure channel to delivery key, and third-party query as well as single point of failure. To address these problems, we propose both certificate-based encryption (CBE) and hierarchical certificate-based encryption (HCBE) schemes proved secure in the standard model. Compared with other schemes, our schemes are proved IND-CCA2 (Indistinguishability under Adaptive Chosen Ciphertext Attack) secure in full model, where the number of group elements is independent of the value of security parameter. As far as we know, the proposed HCBE is the first fully IND-CCA2 secure scheme with ciphetexts of constant size.

Place, publisher, year, edition, pages
IOS Press, 2018
Keywords
Certificate-based encryption; hierarchical certificate-based encryption; identity-based encryption
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-169153 (URN)10.3233/JIFS-169838 (DOI)000459214900017 ()2-s2.0-85059441886 (Scopus ID)
Conference
6th International Conference on Green and Human Information Technology (ICGHIT), Chiang Mai, THAILAND, jan 31-feb 02, 2018
Note

Funding Agencies|National Research Foundation of Korea(NRF) - Korea government(MSIP) [2017R1A2B4001801]

Available from: 2020-09-10 Created: 2020-09-10 Last updated: 2023-04-03Bibliographically approved
Le, M.-H. & Hwang, S. O. (2016). Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key. ETRI Journal, 38(4), 724-734
Open this publication in new window or tab >>Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key
2016 (English)In: ETRI Journal, ISSN 1225-6463, E-ISSN 2233-7326, Vol. 38, no 4, p. 724-734Article in journal (Refereed) Published
Abstract [en]

To achieve confidentiality, integrity, authentication, and non-repudiation simultaneously, the concept of signcryption was introduced by combining encryption and a signature in a single scheme. Certificate-based encryption schemes are designed to resolve the key escrow problem of identity-based encryption, as well as to simplify the certificate management problem in traditional public key cryptosystems. In this paper, we propose a new certificate-based signcryption scheme that has been proved to be secure against adaptive chosen ciphertext attacks and existentially unforgeable against chosen-message attacks in the random oracle model. Our scheme is not based on pairing and thus is efficient and practical. Furthermore, it allows a signcrypted message to be immediately verified by the public key of the sender. This means that verification and decryption of the signcrypted message are decoupled. To the best of our knowledge, this is the first signcryption scheme without pairing to have this feature.

Place, publisher, year, edition, pages
John Wiley & Sons, 2016
Keywords
Signcryption; certificate-based signcryption; certificate-based public key cryptography
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-169155 (URN)10.4218/etrij.16.0115.0983 (DOI)000380802700014 ()2-s2.0-84983488656 (Scopus ID)
Note

Funding Agencies|Basic Science Research Program through the National Research Foundation of Korea (NRF) - Ministry of Education [2014R1A1A2054174]; MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Global IT Talent support program [IITP-2016-H0905-15-1004]

Available from: 2020-09-10 Created: 2020-09-10 Last updated: 2023-04-03Bibliographically approved
Le, M.-H., Kim, I. & Hwang, S. O. (2016). Efficient certificate-based encryption schemes without pairing. Security and Communication Networks, 9(18), 5376-5391
Open this publication in new window or tab >>Efficient certificate-based encryption schemes without pairing
2016 (English)In: Security and Communication Networks, ISSN 1939-0114, E-ISSN 1939-0122, Vol. 9, no 18, p. 5376-5391Article in journal (Refereed) Published
Abstract [en]

Recently, a lot of researches focused on identity-based encryption (IBE). The advantage of this scheme is that it can reduce the cost of the public key infrastructure by simplifying certificate management. Although IBE has its own innovations, one of its weaknesses is the key escrow problem. That is, the private key generator in IBE knows decryption keys for all identities and consequently can decrypt any ciphertexts. The certificate-based encryption (CBE) scheme proposed in EUROCRYPT 2003 provides a solution for the key escrow problem by allowing the certification authority to possess a partial decryption key that comprises the full decryption key together with the user-generated private key. In this paper, we propose new CBE schemes without pairing and prove them to be Indistinguishability under Chosen Ciphertext Attack secure in the random oracle model based on the hardness of the computational Diffie-Hellman problem. When compared with other CBE schemes, our schemes are significantly efficient in terms of performance, which makes our schemes suitable for computation-limited node (e.g., sensor, wearable device) networks. Copyright (c) 2016 John Wiley & Sons, Ltd.

Place, publisher, year, edition, pages
John Wiley & Sons, 2016
Keywords
cryptography; certificate-based encryption; identity-based encryption; pairing
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-169154 (URN)10.1002/sec.1703 (DOI)000398221800040 ()2-s2.0-85006375372 (Scopus ID)
Note

Funding Agencies|Basic Science Research Program through the National Research Foundation of Korea (NRF) - Ministry of Education [2014R1A1A2054174]; MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Global IT Talent support program [IITP-2016-H0905-15-1004]

Available from: 2020-09-10 Created: 2020-09-10 Last updated: 2023-04-03Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-2391-5951

Search in DiVA

Show all publications