Skip to main content

Engineering Privacy in Public: Confounding Face Recognition

  • Conference paper
Privacy Enhancing Technologies (PET 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2760))

Included in the following conference series:

Abstract

The objective of DARPA’s Human ID at a Distance (HID) program “is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances.” While nominally intended for security applications, if deployed widely, such technologies could become an enormous privacy threat, making practical the automatic surveillance of individuals on a grand scale. Face recognition, as the HID technology most rapidly approaching maturity, deserves immediate research attention in order to understand its strengths and limitations, with an objective of reliably foiling it when it is used inappropriately. This paper is a status report for a research program designed to achieve this objective within a larger goal of similarly defeating all HID technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aldenderfer, M.S., Blashfield, R.K.: Cluster Analysis. Sage Publications, Thousand Oaks (1984)

    Google Scholar 

  2. Ball, G.H.: Data analysis in the social sciences: What about the details? In: Proc. AFIPS 1965 Fall Joint Computer Conference, vol. 27, pp. 533–559 (1965)

    Google Scholar 

  3. Beveridge, J.R., She, K., Draper, B., Givens, G.H.: A nonparametric statistical comparison of principal component and linear discriminant subspaces for face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 535–542 (2001)

    Google Scholar 

  4. Daugman, J.: Iris recognition. American Scientist 89(4), 326–333 (2001)

    Google Scholar 

  5. Díaz, C., Seys, S., Claussens, J., Prenel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons, Inc., Chichester (2001)

    MATH  Google Scholar 

  7. Fukunaga, K.: Introduction to Statistical Pattern Recognition. Academic Press, London (1972)

    Google Scholar 

  8. Garfinkel, S.: Database Nation. O’Reilly, Sebastopol (2000)

    Google Scholar 

  9. Gregory, R.L., Gombrich, E.H. (eds.): Illusion in Nature and Art. Gerald Duckworth and Co. Ltd. (1973)

    Google Scholar 

  10. Gross, R., Shi, J., Cohn, J.: Quo vadis face recognition? In: Third Workshop on Empirical Evaluation Methods in Computer Vision (2001)

    Google Scholar 

  11. Hernández, M.A., Stolfo, S.J.: A generalization of band joins and the merge/ purge problem (1996), http://www.cs.columbia.edu/~sal/hpapers/mpjourn.ps

  12. Lawrence, S., Lee Giles, C., Tsoi, A.C., Back, A.D.: Face recognition: A convolutional neural network approach. IEEE Transaction on Neural Networks, Special Issue on Neural Networks and Pattern Recognition 8(1), 98–113 (1997)

    Google Scholar 

  13. Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering. Addison-Wesley, Reading (1994)

    Google Scholar 

  14. Martínez, A.M., Benavente, R.: The AR face database. Technical Report 24, Computer Vision Center, Campus Universitat Autonoma de Barcelona (1998), http://rvl1.ecn.purdue.edu/ARdatabase/ARdatabase.html

  15. Martínez, A.M.: Recognition of partially occluded and/or imprecisely localized faces using a probabilistic approach. In: Proc. of IEEE Computer Vision and Pattern Recognition, CVPR (2000)

    Google Scholar 

  16. Martínez, A.M.: Recognizing imprecisely localized, partially occluded, and expression variant faces from a single sample per class. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(6), 748–763 (2002)

    Article  Google Scholar 

  17. Moon, H., Phillips, P.J.: Computational and performance aspects of PCA-based face-recognition algorithms. In: Perception, pp. 303–321 (2001)

    Google Scholar 

  18. Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)

    MATH  Google Scholar 

  19. NIST. FERET database (2001), http://www.itl.nist.gov/iad/humanid/feret/

  20. United States General Accounting Office. Technology assessment: Using biometrics for border security. Pub. number GAO-03-174 (2002), http://www.gao.gov/new.items/d03174.pdf

  21. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley- Interscience, Chichester (1991)

    Book  MATH  Google Scholar 

  22. Orwell, G.: 1984: a novel. New American Library (1961)

    Google Scholar 

  23. Phillips, P.J., Rauss, P.J., Der., S.Z.: FERET (face recognition technology) recognition algorithm development and test results. Technical Report ARL-TR-995, Army Research Laboratory (1996)

    Google Scholar 

  24. Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.: The FERET database and evaluation procedure for face-recognition algorithms. Image and Vision Computing Journal 16(5), 295–306 (1998)

    Article  Google Scholar 

  25. Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing (1993)

    Google Scholar 

  26. Rao, J.R.: Introduction to Camouflage and Deception. Defence Research and Development Organization. Ministry of Defense, New Delhi (1999)

    Google Scholar 

  27. Raymond, J.-F.: Traffic analysis: Protocols, attacks, design issues and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  28. Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection (1998)

    Google Scholar 

  29. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  30. Samaria, F., Fallside, F.: Automated face identification using hidden markov models. In: Proceedings of the International Conference on Advanced Mechatronics (1993)

    Google Scholar 

  31. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  32. Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press (1949)

    Google Scholar 

  33. Sokal, R.R., Sneath, P.H.: Principles of Numerical Taxonomy. W. H. Freeman and Company, New York (1963)

    Google Scholar 

  34. Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Workshop on Design Issues in Anonymity and Unobservability (2000)

    Google Scholar 

  35. Traub, J.F., Yemini, Y.: The statistical security of a statistical database. ACM Transactions on Database Systems 9(4), 672–679 (1984)

    Article  Google Scholar 

  36. Turk, M.A., Pentland, A.P.: Face recognition using eigenfaces. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586–591 (1991)

    Google Scholar 

  37. Valentin, D., Abdi, H., O’Toole, A.J., Cottrell, G.W.: Connectionist models of face processing: A survey. Pattern Recognition 27, 1209–1230 (1994)

    Article  Google Scholar 

  38. Valentin, D., Abdi, H., O’Toole, A.J.: Categorization of identification of human face images by neural networks: A review of the linear autoassociative and principal component approaches. Journal of Biological Systems 2(3), 413–429 (1994)

    Article  Google Scholar 

  39. Vora, P.L.: Towards a theory of variable privacy (2002), In review available at http://www.hpl.hp.com/personal/Poorvi_Vora/Pubs/plv_variable_privacy.pdf

  40. Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the ISOC Network and Distributed System Security Symposium, NDSS 2002 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alexander, J., Smith, J. (2003). Engineering Privacy in Public: Confounding Face Recognition. In: Dingledine, R. (eds) Privacy Enhancing Technologies. PET 2003. Lecture Notes in Computer Science, vol 2760. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40956-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40956-4_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20610-1

  • Online ISBN: 978-3-540-40956-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics