Reconstructing faces from their signatures using RBF regression

The increasing popularity of social networks raises critical issues regarding privacy and protection of personal information. One typical example - which is the motivation of the paper - is face images and face recognition, face recognition being ubiquitous on the web now. Assuming someone with bad intentions steals a database containing face signatures, would it be possible to reconstruct the corresponding face images, revealing who was in the database? Would these reconstructed images be good enough to allow them to gain access via a face recognition system? This paper brings a contribution to this topic by proposing a face reconstruction algorithm, based on RBF-regression in eigenspace, which is able to reconstruct face images from their signatures (i.e. neither knowing the identity of the persons nor their true facial appearance). We show that in addition to being visually realistic, the images generated by the proposed method can fool a state-of-the-art face recognition algorithm.

[1]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[2]  Nicolas Pinto,et al.  Beyond simple features: A large-scale feature search approach to unconstrained face recognition , 2011, Face and Gesture 2011.

[3]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[4]  Jian Sun,et al.  Face recognition with learning-based descriptor , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[5]  Sudeep Sarkar,et al.  From Scores to Face Templates: A Model-Based Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  R. Shah,et al.  Least Squares Support Vector Machines , 2022 .

[7]  David S. Broomhead,et al.  Multivariable Functional Interpolation and Adaptive Networks , 1988, Complex Syst..

[8]  R. Franke A Critical Comparison of Some Methods for Interpolation of Scattered Data , 1979 .

[9]  D. Broomhead,et al.  Radial Basis Functions, Multi-Variable Functional Interpolation and Adaptive Networks , 1988 .

[10]  Wen Gao,et al.  Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[11]  C. Micchelli Interpolation of scattered data: Distance matrices and conditionally positive definite functions , 1986 .

[12]  Jian Sun,et al.  An associate-predict model for face recognition , 2011, CVPR 2011.

[13]  Shree K. Nayar,et al.  Attribute and simile classifiers for face verification , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[14]  E. Kansa MULTIQUADRICS--A SCATTERED DATA APPROXIMATION SCHEME WITH APPLICATIONS TO COMPUTATIONAL FLUID-DYNAMICS-- II SOLUTIONS TO PARABOLIC, HYPERBOLIC AND ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS , 1990 .

[15]  E. Kansa,et al.  Numerical simulation of two-dimensional combustion using mesh-free methods , 2009 .

[16]  A. Adler,et al.  Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[17]  Christoph Busch,et al.  Multi-Biometric Template Protection: Issues and Challenges , 2012 .

[18]  Centro de Pesquisas do Cacau Brazil Technical report 1979. , 1980 .

[19]  Julian Fiérrez,et al.  Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.

[20]  Takeo Kanade,et al.  Multi-PIE , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.

[21]  R. L. Hardy Theory and applications of the multiquadric-biharmonic method : 20 years of discovery 1968-1988 , 1990 .

[22]  J. Hoschek,et al.  Scattered Data Interpolation , 1992 .

[23]  R. Franke Scattered data interpolation: tests of some methods , 1982 .

[24]  V. Kshirsagar,et al.  Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.

[25]  Alice Caplier,et al.  Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching , 2012, IEEE Transactions on Image Processing.

[26]  Alexander Gammerman,et al.  Ridge Regression Learning Algorithm in Dual Variables , 1998, ICML.

[27]  LinLin Shen,et al.  Local Gabor Binary Pattern Whitened PCA: A Novel Approach for Face Recognition from Single Image Per Person , 2009, ICB.

[28]  Xiaoyang Tan,et al.  Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions , 2007, IEEE Transactions on Image Processing.

[29]  R. L. Hardy Multiquadric equations of topography and other irregular surfaces , 1971 .

[30]  Peng Li,et al.  Distance Metric Learning with Eigenvalue Optimization , 2012, J. Mach. Learn. Res..

[31]  Li Bai,et al.  Cosine Similarity Metric Learning for Face Verification , 2010, ACCV.

[32]  Matti Pietikäinen,et al.  Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[33]  Nicolas Pinto,et al.  How far can you get with a modern face recognition test set using only simple features? , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[34]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[35]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[36]  Tal Hassner,et al.  Similarity Scores Based on Background Samples , 2009, ACCV.

[37]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[38]  Jooyoung Park,et al.  Universal Approximation Using Radial-Basis-Function Networks , 1991, Neural Computation.

[39]  Frédéric Jurie,et al.  Face Recognition using Local Quantized Patterns , 2012, BMVC.

[40]  Julian Fierrez,et al.  Hill-climbing attack to an Eigenface-based face verification system , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).

[41]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.