Security-Preserving Live 3D Video Surveillance

3D video surveillance has become the new trend in security monitoring with the popularity of 3D depth cameras in the consumer market. While enabling more fruitful surveillance features, the finer-grained 3D videos being captured would raise new security concerns that have not been addressed by existing research. This paper explores the security implications of live 3D surveillance videos in triggering biometrics-related attacks, such as face ID spoofing. We demonstrate that the state-of-the-art face authentication systems can be effectively compromised by the 3D face models presented in the surveillance video. Then, to defend against such face spoofing attacks, we propose to proactively and benignly inject adversarial perturbations to the surveillance video in real time, prior to the exposure to potential adversaries. Such dynamically generated perturbations can prevent the face models from being exploited to bypass deep learning-based face authentications while maintaining the required quality and functionality of the 3D video surveillance. We evaluate the proposed perturbation generation approach on both an RGB-D dataset and a 3D video dataset, which justifies its effective security protection, low quality degradation, and real-time performance.

[1]  M. Jarrahi,et al.  To image, or not to image: class-specific diffractive cameras with all-optical erasure of undesired objects , 2022, eLight.

[2]  Steve T. K. Jan,et al.  It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications , 2021, CCS.

[3]  Amro Awad,et al.  VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets , 2021, 2021 IEEE Virtual Reality and 3D User Interfaces (VR).

[4]  Mohamed Khamis,et al.  Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing , 2021, ACM Trans. Comput. Hum. Interact..

[5]  H. Qi,et al.  Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction , 2020, 2020 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Yi Xie,et al.  VVSec: Securing Volumetric Video Streaming via Benign Use of Adversarial Perturbation , 2020, ACM Multimedia.

[7]  Chin-Hui Lee,et al.  Characterizing Speech Adversarial Examples Using Self-Attention U-Net Enhancement , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Qian Zhang,et al.  EchoFace: Acoustic Sensor-Based Media Attack Detection for Face Authentication , 2020, IEEE Internet of Things Journal.

[9]  Nicu Sebe,et al.  First Order Motion Model for Image Animation , 2020, NeurIPS.

[10]  Dimitrios Koutsonikolas,et al.  How to Evaluate Mobile 360° Video Streaming Systems? , 2020, HotMobile.

[11]  Onur Günlü,et al.  Differential privacy for eye tracking with temporal correlations , 2020, IACR Cryptol. ePrint Arch..

[12]  C. Hellge,et al.  Low-latency cloud-based volumetric video streaming using head motion prediction , 2020, NOSSDAV.

[13]  Bo Yuan,et al.  CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator , 2019, AAAI.

[14]  Filip De Turck,et al.  Towards 6DoF HTTP Adaptive Streaming Through Point Cloud Compression , 2019, ACM Multimedia.

[15]  Chenchen Liu,et al.  MASKER: Adaptive Mobile Security Enhancement against Automatic Speech Recognition in Eavesdropping , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).

[16]  Fan Ye,et al.  Multi-Modal Face Authentication using Deep Visual and Acoustic Features , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[17]  Feng Qian,et al.  Toward Practical Volumetric Video Streaming on Commodity Smartphones , 2019, HotMobile.

[18]  Chenchen Liu,et al.  HAMPER: high-performance adaptive mobile security enhancement against malicious speech and image recognition , 2019, ASP-DAC.

[19]  Xin Li,et al.  LiveFace: A Multi-task CNN for Fast Face-Authentication , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).

[20]  Jaemin Lim,et al.  Pinto: Enabling Video Privacy for Commodity IoT Cameras , 2018, CCS.

[21]  Lingxiao Wang,et al.  Feature Learning for One-Shot Face Recognition , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).

[22]  Stefanos Zafeiriou,et al.  ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[23]  Susanne Boll,et al.  PrivacEye: privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features , 2018, ETRA.

[24]  Alexei A. Efros,et al.  The Unreasonable Effectiveness of Deep Features as a Perceptual Metric , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[25]  Isay Katsman,et al.  Generative Adversarial Perturbations , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[26]  Aleksander Madry,et al.  Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.

[27]  Tadayoshi Kohno,et al.  Securing Augmented Reality Output , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[28]  Bhiksha Raj,et al.  SphereFace: Deep Hypersphere Embedding for Face Recognition , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[29]  David A. Wagner,et al.  Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[30]  Jan-Michael Frahm,et al.  Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos , 2016, USENIX Security Symposium.

[31]  Samy Bengio,et al.  Adversarial examples in the physical world , 2016, ICLR.

[32]  Sanjeev J. Koppal,et al.  Sensor-level privacy for thermal cameras , 2016, 2016 IEEE International Conference on Computational Photography (ICCP).

[33]  Yue Ming,et al.  A unified 3D face authentication framework based on robust local mesh SIFT feature , 2016, Neurocomputing.

[34]  Cyril Concolato,et al.  MPEG-DASH for Low Latency and Hybrid Streaming Services , 2015, ACM Multimedia.

[35]  Robert H. Deng,et al.  Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication , 2015, CCS.

[36]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[37]  Nikola Pavesic,et al.  An overview of face de-identification in still images and videos , 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).

[38]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[39]  Cyril Concolato,et al.  DashCast, A Live DASH Streaming Server , 2013, MMSP 2013.

[40]  Fei Peng,et al.  An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.

[41]  Helen J. Wang,et al.  Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.

[42]  Vitaly Shmatikov,et al.  A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.

[43]  R I Hg,et al.  An RGB-D Database Using Microsoft's Kinect for Windows for Face Detection , 2012, 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems.

[44]  Touradj Ebrahimi,et al.  Subjective study of privacy filters in video surveillance , 2012, 2012 IEEE 14th International Workshop on Multimedia Signal Processing (MMSP).

[45]  Iraj Sodagar,et al.  The MPEG-DASH Standard for Multimedia Streaming Over the Internet , 2011, IEEE MultiMedia.

[46]  Cyril Concolato,et al.  GPAC: open source multimedia framework , 2007, ACM Multimedia.

[47]  Suramya Tomar,et al.  Converting video formats with FFmpeg , 2006 .

[48]  Kassem Fawaz,et al.  Kalεido: Real-Time Privacy Control for Eye-Tracking Systems , 2021, USENIX Security Symposium.

[49]  Wenyao Xu,et al.  OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display , 2020, NDSS.

[50]  M. Westerlund The Emergence of Deepfake Technology: A Review , 2019, Technology Innovation Management Review.

[51]  Moustapha Cissé,et al.  Countering Adversarial Images using Input Transformations , 2018, ICLR.

[52]  Salah Bourennane,et al.  Robust multimodal 2D and 3D face authentication using local feature fusion , 2016, Signal Image Video Process..

[53]  David J. Crandall,et al.  PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.

[54]  Larry Li,et al.  Time-of-Flight Camera - An Introduction , 2014 .

[55]  Nguyen Minh Duc Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .

[56]  Minghua Chen,et al.  Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.