The Brazilian Data at Risk in the Age of AI?
Abstract
Advances in image processing and analysis as well as machine learning techniques have contributed to the use of biometric recognition systems in daily people tasks. These tasks range from simple access to mobile devices to tagging friends in photos shared on social networks and complex financial operations on self-service devices for banking transactions. On July 05th 2021, the Brazilian government announced acquisition of a biometric recognition system to be used nationwide. In the opposite direction to China, Europe and some American cities have already started the discussion about the legality of using biometric systems in public places, even banning this practice in their territory. In order to open a deeper discussion about the risks and legality of using these systems, this work exposes the vulnerabilities of biometric recognition systems, focusing its efforts on the face modality. Furthermore, it shows how it is possible to fool a biometric system through a well-known presentation attack approach in the literature called morphing. Finally, a list of ten concerns was created to start the discussion about the security of citizen data and data privacy law in the Age of Artificial Intelligence (AI).
References
Anjos, A., Chakka, M. M., and Marcel, S. (2014). Motion-based counter-measures to photo attacks in face recognition. IET Biom., 3:147-158.
Best-Rowden, L. and Jain, A. K. (2018). Longitudinal study of automatic face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 40(1):148-162.
Biometrics, I. .-. (2016). Information technology biometric presentation attack detection part 1: Framework. Technical report, International Organization for Standardization, Geneva, Switzerland.
CNIL (2019). Facial recognition: for a debate living up to the challenges. Technical report, CNIL - Commission Nationale de l'Informatique et des Libertés, Paris, France.
EUCouncil (2018). Report from the commission to the european parliament and the council on the implementation of the action plan to strengthen the eu response to travel document fraud. Technical report, Council of the European Union, Brussels, Belgium.
Faria, F. A. and Carneiro, G. (2020). Why are generative adversarial networks so fascinating and annoying? In 2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pages 1-8.
Ferrara, M., Franco, A., and Maltoni, D. (2014). The magic passport. In IEEE International Joint Conference on Biometrics, Clearwater, IJCB 2014, FL, USA, September 29 October 2, 2014, pages 1-7. IEEE.
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014). Generative adversarial nets. In Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N. D., and Weinberger, K. Q., editors, Advances in Neural Information Processing Systems 27, pages 2672-2680.
Karras, T., Laine, S., and Aila, T. (2019). A style-based generator architecture for generative adversarial networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 4401-4410.
Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., and Aila, T. (2020). Analyzing and improving the image quality of stylegan. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pages 8107-8116.
Mai, G., Cao, K., Yuen, P. C., and Jain, A. K. (2019). On the reconstruction of face images from deep face templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 41(5):1188-1202.
Ngan, M., Grother, P., Hanaoka, K., and Kuo, J. (2020). Face recognition vendor test (frvt) part 4: Morph - performance of automated face morph detection.
Park, T., Liu, M.-Y., Wang, T.-C., and Zhu, J.-Y. (2019). Semantic image synthesis with spatially-adaptive normalization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
Phillips, P., O'Toole, A., Jiang, F., Narvekar, A., and Ayadd, J. (2009). An other-race effect for face recognition algorithms.
Ramachandra, R. and Busch, C. (2017). Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Comput. Surv., 50(1).
Richardson, E., Alaluf, Y., Patashnik, O., Nitzan, Y., Azar, Y., Shapiro, S., and Cohen-Or, D. (2021). Encoding in style: A stylegan encoder for image-to-image translation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 2287-2296.
Scherhag, U. J. (2020). Face Morphing and Morphing Attack detection. PhD thesis, Technische Universität Darmstadt.
Seibold, C., Samek, W., Hilsmann, A., and Eisert, P. (2020). Accurate and robust neural networks for face morphing attack detection. Journal of Information Security and Applications, 53:102526.
Venkatesh, S., Ramachandra, R., Raja, K. B., and Busch, C. (2020). Face morphing attack generation & detection: A comprehensive survey. CoRR, abs/2011.02045.
Wang, T.-C., Mallya, A., and Liu, M.-Y. (2021). One-shot free-view neural talking-head synthesis for video conferencing. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 10039-10049.
Yoon, S., Feng, J., and Jain, A. K. (2012). Altered fingerprints: Analysis and detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(3):451-464.
Zhang, H., Zhang, Z., Odena, A., and Lee, H. (2020). Consistency regularization for generative adversarial networks. In International Conference on Learning Representations - to appear.
