Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 1897438, 15 pages
https://doi.org/10.1155/2017/1897438
Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

University of Science and Technology of China, Hefei, China

Correspondence should be addressed to Weiming Zhang; nc.ude.ctsu@mwgnahz

Received 19 July 2017; Revised 1 October 2017; Accepted 10 October 2017; Published 14 November 2017

Academic Editor: Lianyong Qi

Copyright © 2017 Yujia Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Zephoria, “The Top 20 Valuable Facebook Statistics,” 2017, https://zephoria.com/top-15-valuable-facebook-statistics/.
  2. B. Krishnamurthy and C. E. Wills, “On the leakage of personally identifiable information via online social networks,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Online Social Networks, WOSN '09, pp. 7–12, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. B. Henne and M. Smith, “Awareness about photos on the web and how privacy-privacy-tradeoffs could help,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 7862, pp. 131–148, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Hardt and S. Nath, “Privacy-aware personalization for mobile advertising,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, (CCS '12), pp. 662–673, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. “Japan researchers warn of fingerprint theft from ’peace’ sign,” 2017, https://phys.org/news/2017-01-japan-fingerprint-theft-peace.html./.
  6. W. Meng, X. Xing, A. Sheth, U. Weinsberg, and W. Lee, “Your online interests-Pwned! A pollution attack against targeted advertising,” in Proceedings of the 21st ACM Conference on Computer and Communications Security, (CCS '14), pp. 129–140, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Reznichenko and P. Francis, “Private-by-design advertising meets the real world,” in Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS ('14), pp. 116–128, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. Icondia, “Smile Marketing Firms Are Mining Your Selfies,” 2016, http://www.icondia.com/wp-content/uploads/2014/11/Image-Mining.pdf.
  9. N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Optimal geo-indistinguishable mechanisms for location privacy,” in Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS 2014, pp. 251–262, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-indistinguishability: differential privacy for location-based systems,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 901–914, ACM, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. M. J. Wilber, V. Shmatikov, and S. Belongie, “Can we still avoid automatic face detection?” in Proceedings of the IEEE Winter Conference on Applications of Computer Vision, (WACV '16), March 2016. View at Publisher · View at Google Scholar · View at Scopus
  12. I. Polakis, P. Ilia, F. Maggi et al., “Faces in the distorting mirror: revisiting photo-based social authentication,” in Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS ('14), pp. 501–512, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis, “Face/off: preventing privacy leakage from photos in social networks,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (CCS '15), pp. 781–792, October 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Zhang, K. Liu, X.-Y. Li, C. Liu, X. Ding, and Y. Liu, “Privacy-friendly photo capturing and sharing system,” in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, pp. 524–534, September 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Collobert and J. Weston, “A unified architecture for natural language processing: deep neural networks with multitask learning,” in Proceedings of the 25th International Conference on Machine Learning, pp. 160–167, ACM, July 2008. View at Scopus
  16. A. Hannun, C. Case, J. Casper, B. Catanzaro et al., “Deep speech: scaling up end-to-end speech recognition,” 2014, https://arxiv.org/abs/1412.5567.
  17. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Proceedings of the 26th Annual Conference on Neural Information Processing Systems (NIPS '12), pp. 1097–1105, Lake Tahoe, Nev, USA, December 2012. View at Scopus
  18. S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: towards real-time object detection with region proposal networks,” in Advances in Neural Information Processing Systems, pp. 91–99, 2015. View at Google Scholar · View at Scopus
  19. J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '15), pp. 3431–3440, IEEE, Boston, Mass, USA, June 2015. View at Publisher · View at Google Scholar
  20. J. Ian Goodfellow, S. Jonathon, and S. Christian, “Explaining and harnessing adversarial examples,” 2014, https://arxiv.org/abs/1412.6572.
  21. Y. Sun, Y. Chen, X. Wang, and X. Tang, “Deep learning face representation by joint identification-verification,” in Advances in neural information processing systems, pp. 1988–1996, 2014. View at Google Scholar · View at Scopus
  22. B. B. Zhu, J. Yan, Q. Li et al., “Attacks and design of image recognition CAPTCHAs,” in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, pp. 187–200, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. G. E. Dahl, J. W. Stokes, L. Deng, and D. Yu, “Large-scale malware classification using random projections and neural networks,” in Proceedings of the 2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013, pp. 3422–3426, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. T. S. Guzella and W. M. Caminhas, “A review of machine learning approaches to Spam filtering,” Expert Systems with Applications, vol. 36, no. 7, pp. 10206–10222, 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. S. Christian, Z. Wojciech, I. Sutskever et al., “Intriguing properties of neural networks,” 2013, https://arxiv.org/abs/1312.6199.
  26. N. Papernot, P. McDaniel, J. Somesh, M. Fredrikson, Z. Berkay Celik, and S. Ananthram, “The limitations of deep learning in adversarial settings,” in Security and Privacy (EuroS&P), 2016 IEEE European Symposium on IEEE, pp. 372–387.
  27. A. Nguyen, J. Yosinski, and J. Clune, “Deep neural networks are easily fooled: High confidence predictions for unrecognizable images,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, pp. 427–436, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. S.-M. Moosavi-Dezfooli, A. Fawzi, and P. Frossard, “Universal adversarial perturbations,” 2016, https://arxiv.org/abs/1610.08401.
  29. N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “Practical black-box attacks against deep learning systems using adversarial examples,” 2016, https://arxiv.org/abs/1602.02697.
  30. N. Papernot, P. McDaniel, and I. Goodfellow, “Transferability in machine learning: from phenomena to black-box attacks using adversarial samples,” 2016, https://arxiv.org/abs/1605.07277.
  31. A. Kurakin, I. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” 2016, https://arxiv.org/abs/1607.02533.
  32. M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security, (CCS '16), pp. 1528–1540, October 2016. View at Publisher · View at Google Scholar · View at Scopus
  33. R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hierarchies for accurate object detection and semantic segmentation,” in Proceedings of the 27th IEEE Conference on Computer Vision and Pattern Recognition (CVPR '14), pp. 580–587, Columbus, Ohio, USA, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  34. R. Girshick, “Fast R-CNN,” in Proceedings of the 15th IEEE International Conference on Computer Vision (ICCV '15), pp. 1440–1448, December 2015. View at Publisher · View at Google Scholar · View at Scopus
  35. S. Christian, R. Scott, and E. Dumitru, “Scalable, high-quality object detection,” 2014, https://arxiv.org/abs/1412.1441.
  36. Y. Li, H. Kaiming, S. Jian et al., “R-fcn: Object detection via region-based fully convolutional networks,” Advances in Neural Information Processing Systems, pp. 379–387, 2016. View at Google Scholar
  37. W. Liu, D. Anguelov, D. Erhan et al., “SSD: single shot multibox detector,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 9905, pp. 21–37, 2016. View at Publisher · View at Google Scholar · View at Scopus
  38. J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, pp. 779–788, July 2016. View at Scopus
  39. H. Jonathan, R. Vivek, and S. Chen, “Speed/accuracy trade-offs for modern convolutional object detectors,” 2016, https://arxiv.org/abs/1611.10012.
  40. M. Everingham, L. van Gool, C. K. I. Williams, J. Winn, and A. Zisserman, “The pascal visual object classes (VOC) challenge,” International Journal of Computer Vision, vol. 88, no. 2, pp. 303–338, 2010. View at Publisher · View at Google Scholar · View at Scopus
  41. Y. Jia, E. Shelhamer, J. Donahue et al., “Caffe: convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on Multimedia, pp. 675–678, ACM, Orlando, Fla, USA, November 2014. View at Publisher · View at Google Scholar
  42. M. D. Zeiler and R. Fergus, “Visualizing and understanding convolutional networks,” in Computer Vision—ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6–12, 2014, Proceedings, Part I, vol. 8689 of Lecture Notes in Computer Science, pp. 818–833, Springer, 2014. View at Publisher · View at Google Scholar
  43. K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” 2014, https://arxiv.org/abs/1409.1556.