Privacy-Preserving Representations are not Enough -- Recovering Scene
Content from Camera Poses
- URL: http://arxiv.org/abs/2305.04603v1
- Date: Mon, 8 May 2023 10:25:09 GMT
- Title: Privacy-Preserving Representations are not Enough -- Recovering Scene
Content from Camera Poses
- Authors: Kunal Chelani and Torsten Sattler and Fredrik Kahl and Zuzana Kukelova
- Abstract summary: Existing work on privacy-preserving localization aims to defend against an attacker who has access to a cloud-based service.
We show that an attacker can learn about details of a scene without any access by simply querying a localization service.
- Score: 63.12979986351964
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Visual localization is the task of estimating the camera pose from which a
given image was taken and is central to several 3D computer vision
applications. With the rapid growth in the popularity of AR/VR/MR devices and
cloud-based applications, privacy issues are becoming a very important aspect
of the localization process. Existing work on privacy-preserving localization
aims to defend against an attacker who has access to a cloud-based service. In
this paper, we show that an attacker can learn about details of a scene without
any access by simply querying a localization service. The attack is based on
the observation that modern visual localization algorithms are robust to
variations in appearance and geometry. While this is in general a desired
property, it also leads to algorithms localizing objects that are similar
enough to those present in a scene. An attacker can thus query a server with a
large enough set of images of objects, \eg, obtained from the Internet, and
some of them will be localized. The attacker can thus learn about object
placements from the camera poses returned by the service (which is the minimal
information returned by such a service). In this paper, we develop a
proof-of-concept version of this attack and demonstrate its practical
feasibility. The attack does not place any requirements on the localization
algorithm used, and thus also applies to privacy-preserving representations.
Current work on privacy-preserving representations alone is thus insufficient.
Related papers
- Obfuscation Based Privacy Preserving Representations are Recoverable Using Neighborhood Information [43.14648227833812]
Research on privacy-preserving localization has focused on preventing inversion attacks on query image keypoints and the 3D points of the scene map.
We point to a common weakness of these obfuscations that allows to recover approximations of the original point positions under the assumption of known neighborhoods.
Our results show that these schemes should not be considered privacy-preserving, even though they are claimed to be privacy-preserving.
arXiv Detail & Related papers (2024-09-17T20:13:54Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Snail: Secure Single Iteration Localization [2.708816087833581]
localization is a computer vision task by which the position and orientation of a camera is determined from an image and environmental map.
We present two approaches to localization, a baseline data-oblivious adaptation of localization suitable for garbled circuits and our novel Single Iteration localization.
arXiv Detail & Related papers (2024-03-22T02:41:14Z) - Person Re-Identification without Identification via Event Anonymization [23.062038973576296]
Deep learning has been able to reconstruct images from event cameras with high fidelity, reintroducing a potential threat to privacy for event-based vision applications.
We propose an end-to-end network architecture jointly optimized for the twofold objective of preserving privacy and performing a downstream task such as person ReId.
arXiv Detail & Related papers (2023-08-08T17:04:53Z) - Lazy Visual Localization via Motion Averaging [89.8709956317671]
We show that it is possible to achieve high localization accuracy without reconstructing the scene from the database.
Experiments show that our visual localization proposal, LazyLoc, achieves comparable performance against state-of-the-art structure-based methods.
arXiv Detail & Related papers (2023-07-19T13:40:45Z) - Privacy-Preserving Visual Localization with Event Cameras [13.21898697942957]
Event cameras can potentially make robust localization due to high dynamic range and small motion blur.
We propose applying event-to-image conversion prior to localization which leads to stable localization.
In the privacy perspective, event cameras capture only a fraction of visual information compared to normal cameras.
arXiv Detail & Related papers (2022-12-04T07:22:17Z) - Visual Localization via Few-Shot Scene Region Classification [84.34083435501094]
Visual (re)localization addresses the problem of estimating the 6-DoF camera pose of a query image captured in a known scene.
Recent advances in structure-based localization solve this problem by memorizing the mapping from image pixels to scene coordinates.
We propose a scene region classification approach to achieve fast and effective scene memorization with few-shot images.
arXiv Detail & Related papers (2022-08-14T22:39:02Z) - Object Manipulation via Visual Target Localization [64.05939029132394]
Training agents to manipulate objects, poses many challenges.
We propose an approach that explores the environment in search for target objects, computes their 3D coordinates once they are located, and then continues to estimate their 3D locations even when the objects are not visible.
Our evaluations show a massive 3x improvement in success rate over a model that has access to the same sensory suite.
arXiv Detail & Related papers (2022-03-15T17:59:01Z) - Analysis and Mitigations of Reverse Engineering Attacks on Local Feature
Descriptors [15.973484638972739]
We show under controlled conditions a reverse engineering attack on sparse feature maps and analyze the vulnerability of popular descriptors.
We evaluate potential mitigation techniques that select a subset of descriptors to carefully balance privacy reconstruction risk while preserving image matching accuracy.
arXiv Detail & Related papers (2021-05-09T01:41:36Z) - Privacy-Preserving Image Features via Adversarial Affine Subspace
Embeddings [72.68801373979943]
Many computer vision systems require users to upload image features to the cloud for processing and storage.
We propose a new privacy-preserving feature representation.
Compared to the original features, our approach makes it significantly more difficult for an adversary to recover private information.
arXiv Detail & Related papers (2020-06-11T17:29:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.