Re-identification of Individuals in Genomic Datasets Using Public Face
Images
- URL: http://arxiv.org/abs/2102.08557v1
- Date: Wed, 17 Feb 2021 03:54:25 GMT
- Title: Re-identification of Individuals in Genomic Datasets Using Public Face
Images
- Authors: Rajagopal Venkatesaramani, Bradley A. Malin, Yevgeniy Vorobeychik
- Abstract summary: We study how successful such linkage attacks can be when real face images are used.
We observe that the true risk of re-identification is likely substantially smaller for most individuals than prior literature suggests.
- Score: 30.331049734571746
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: DNA sequencing is becoming increasingly commonplace, both in medical and
direct-to-consumer settings. To promote discovery, collected genomic data is
often de-identified and shared, either in public repositories, such as OpenSNP,
or with researchers through access-controlled repositories. However, recent
studies have suggested that genomic data can be effectively matched to
high-resolution three-dimensional face images, which raises a concern that the
increasingly ubiquitous public face images can be linked to shared genomic
data, thereby re-identifying individuals in the genomic data. While these
investigations illustrate the possibility of such an attack, they assume that
those performing the linkage have access to extremely well-curated data. Given
that this is unlikely to be the case in practice, it calls into question the
pragmatic nature of the attack. As such, we systematically study this
re-identification risk from two perspectives: first, we investigate how
successful such linkage attacks can be when real face images are used, and
second, we consider how we can empower individuals to have better control over
the associated re-identification risk. We observe that the true risk of
re-identification is likely substantially smaller for most individuals than
prior literature suggests. In addition, we demonstrate that the addition of a
small amount of carefully crafted noise to images can enable a controlled
trade-off between re-identification success and the quality of shared images,
with risk typically significantly lowered even with noise that is imperceptible
to humans.
Related papers
- Visual Privacy Auditing with Diffusion Models [52.866433097406656]
We propose a reconstruction attack based on diffusion models (DMs) that assumes adversary access to real-world image priors.
We show that (1) real-world data priors significantly influence reconstruction success, (2) current reconstruction bounds do not model the risk posed by data priors well, and (3) DMs can serve as effective auditing tools for visualizing privacy leakage.
arXiv Detail & Related papers (2024-03-12T12:18:55Z) - OpticalDR: A Deep Optical Imaging Model for Privacy-Protective
Depression Recognition [66.91236298878383]
Depression Recognition (DR) poses a considerable challenge, especially in the context of privacy concerns.
We design a new imaging system to erase the identity information of captured facial images while retain disease-relevant features.
It is irreversible for identity information recovery while preserving essential disease-related characteristics necessary for accurate DR.
arXiv Detail & Related papers (2024-02-29T01:20:29Z) - Privacy Assessment on Reconstructed Images: Are Existing Evaluation
Metrics Faithful to Human Perception? [86.58989831070426]
We study the faithfulness of hand-crafted metrics to human perception of privacy information from reconstructed images.
We propose a learning-based measure called SemSim to evaluate the Semantic Similarity between the original and reconstructed images.
arXiv Detail & Related papers (2023-09-22T17:58:04Z) - Toward Face Biometric De-identification using Adversarial Examples [12.990538405629453]
Face recognition has endangered the privacy of internet users particularly in social media.
In this paper, we assess the effectiveness of using two widely known adversarial methods for de-identifying personal images.
arXiv Detail & Related papers (2023-02-07T18:17:41Z) - ConfounderGAN: Protecting Image Data Privacy with Causal Confounder [85.6757153033139]
We propose ConfounderGAN, a generative adversarial network (GAN) that can make personal image data unlearnable to protect the data privacy of its owners.
Experiments are conducted in six image classification datasets, consisting of three natural object datasets and three medical datasets.
arXiv Detail & Related papers (2022-12-04T08:49:14Z) - Deep Learning-based Anonymization of Chest Radiographs: A
Utility-preserving Measure for Patient Privacy [7.240611820374677]
The conventional anonymization process is carried out by obscuring personal information in the images with black boxes.
Such simple measures retain biometric information in the chest radiographs, allowing patients to be re-identified by a linkage attack.
We propose the first deep learning-based approach (PriCheXy-Net) to targetedly anonymize chest radiographs.
arXiv Detail & Related papers (2022-09-23T11:36:32Z) - RealGait: Gait Recognition for Person Re-Identification [79.67088297584762]
We construct a new gait dataset by extracting silhouettes from an existing video person re-identification challenge which consists of 1,404 persons walking in an unconstrained manner.
Our results suggest that recognizing people by their gait in real surveillance scenarios is feasible and the underlying gait pattern is probably the true reason why video person re-idenfification works in practice.
arXiv Detail & Related papers (2022-01-13T06:30:56Z) - An Attack on Feature Level-based Facial Soft-biometric Privacy
Enhancement [13.780253190395715]
We introduce an attack on feature level-based facial soft-biometric privacy-enhancement techniques.
It is able to circumvent the privacy enhancement to a considerable degree and is able to correctly classify gender with an accuracy of up to approximately 90%.
arXiv Detail & Related papers (2021-11-24T10:41:15Z) - How important are faces for person re-identification? [14.718372669984364]
We apply a face detection and blurring algorithm to create anonymized versions of several popular person re-identification datasets.
We evaluate the effect of this anonymization on re-identification performance using standard metrics.
arXiv Detail & Related papers (2020-10-13T11:47:16Z) - Epidemic mitigation by statistical inference from contact tracing data [61.04165571425021]
We develop Bayesian inference methods to estimate the risk that an individual is infected.
We propose to use probabilistic risk estimation in order to optimize testing and quarantining strategies for the control of an epidemic.
Our approaches translate into fully distributed algorithms that only require communication between individuals who have recently been in contact.
arXiv Detail & Related papers (2020-09-20T12:24:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.