Abstract
The objective of DARPA’s Human ID at a Distance (HID) program “is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances.” While nominally intended for security applications, if deployed widely, such technologies could become an enormous privacy threat, making practical the automatic surveillance of individuals on a grand scale. Face recognition, as the HID technology most rapidly approaching maturity, deserves immediate research attention in order to understand its strengths and limitations, with an objective of reliably foiling it when it is used inappropriately. This paper is a status report for a research program designed to achieve this objective within a larger goal of similarly defeating all HID technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aldenderfer, M.S., Blashfield, R.K.: Cluster Analysis. Sage Publications, Thousand Oaks (1984)
Ball, G.H.: Data analysis in the social sciences: What about the details? In: Proc. AFIPS 1965 Fall Joint Computer Conference, vol. 27, pp. 533–559 (1965)
Beveridge, J.R., She, K., Draper, B., Givens, G.H.: A nonparametric statistical comparison of principal component and linear discriminant subspaces for face recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 535–542 (2001)
Daugman, J.: Iris recognition. American Scientist 89(4), 326–333 (2001)
Díaz, C., Seys, S., Claussens, J., Prenel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003)
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley and Sons, Inc., Chichester (2001)
Fukunaga, K.: Introduction to Statistical Pattern Recognition. Academic Press, London (1972)
Garfinkel, S.: Database Nation. O’Reilly, Sebastopol (2000)
Gregory, R.L., Gombrich, E.H. (eds.): Illusion in Nature and Art. Gerald Duckworth and Co. Ltd. (1973)
Gross, R., Shi, J., Cohn, J.: Quo vadis face recognition? In: Third Workshop on Empirical Evaluation Methods in Computer Vision (2001)
Hernández, M.A., Stolfo, S.J.: A generalization of band joins and the merge/ purge problem (1996), http://www.cs.columbia.edu/~sal/hpapers/mpjourn.ps
Lawrence, S., Lee Giles, C., Tsoi, A.C., Back, A.D.: Face recognition: A convolutional neural network approach. IEEE Transaction on Neural Networks, Special Issue on Neural Networks and Pattern Recognition 8(1), 98–113 (1997)
Leon-Garcia, A.: Probability and Random Processes for Electrical Engineering. Addison-Wesley, Reading (1994)
Martínez, A.M., Benavente, R.: The AR face database. Technical Report 24, Computer Vision Center, Campus Universitat Autonoma de Barcelona (1998), http://rvl1.ecn.purdue.edu/ARdatabase/ARdatabase.html
Martínez, A.M.: Recognition of partially occluded and/or imprecisely localized faces using a probabilistic approach. In: Proc. of IEEE Computer Vision and Pattern Recognition, CVPR (2000)
Martínez, A.M.: Recognizing imprecisely localized, partially occluded, and expression variant faces from a single sample per class. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(6), 748–763 (2002)
Moon, H., Phillips, P.J.: Computational and performance aspects of PCA-based face-recognition algorithms. In: Perception, pp. 303–321 (2001)
Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)
NIST. FERET database (2001), http://www.itl.nist.gov/iad/humanid/feret/
United States General Accounting Office. Technology assessment: Using biometrics for border security. Pub. number GAO-03-174 (2002), http://www.gao.gov/new.items/d03174.pdf
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley- Interscience, Chichester (1991)
Orwell, G.: 1984: a novel. New American Library (1961)
Phillips, P.J., Rauss, P.J., Der., S.Z.: FERET (face recognition technology) recognition algorithm development and test results. Technical Report ARL-TR-995, Army Research Laboratory (1996)
Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.: The FERET database and evaluation procedure for face-recognition algorithms. Image and Vision Computing Journal 16(5), 295–306 (1998)
Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. In: Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing (1993)
Rao, J.R.: Introduction to Camouflage and Deception. Defence Research and Development Organization. Ministry of Defense, New Delhi (1999)
Raymond, J.-F.: Traffic analysis: Protocols, attacks, design issues and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)
Reed, M., Syverson, P., Goldschlag, D.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection (1998)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Samaria, F., Fallside, F.: Automated face identification using hidden markov models. In: Proceedings of the International Conference on Advanced Mechatronics (1993)
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)
Shannon, C.E., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press (1949)
Sokal, R.R., Sneath, P.H.: Principles of Numerical Taxonomy. W. H. Freeman and Company, New York (1963)
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Workshop on Design Issues in Anonymity and Unobservability (2000)
Traub, J.F., Yemini, Y.: The statistical security of a statistical database. ACM Transactions on Database Systems 9(4), 672–679 (1984)
Turk, M.A., Pentland, A.P.: Face recognition using eigenfaces. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 586–591 (1991)
Valentin, D., Abdi, H., O’Toole, A.J., Cottrell, G.W.: Connectionist models of face processing: A survey. Pattern Recognition 27, 1209–1230 (1994)
Valentin, D., Abdi, H., O’Toole, A.J.: Categorization of identification of human face images by neural networks: A review of the linear autoassociative and principal component approaches. Journal of Biological Systems 2(3), 413–429 (1994)
Vora, P.L.: Towards a theory of variable privacy (2002), In review available at http://www.hpl.hp.com/personal/Poorvi_Vora/Pubs/plv_variable_privacy.pdf
Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the ISOC Network and Distributed System Security Symposium, NDSS 2002 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alexander, J., Smith, J. (2003). Engineering Privacy in Public: Confounding Face Recognition. In: Dingledine, R. (eds) Privacy Enhancing Technologies. PET 2003. Lecture Notes in Computer Science, vol 2760. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40956-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-40956-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20610-1
Online ISBN: 978-3-540-40956-4
eBook Packages: Springer Book Archive