Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse
- URL: http://arxiv.org/abs/2408.17121v1
- Date: Fri, 30 Aug 2024 09:04:11 GMT
- Title: Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse
- Authors: Kedi Yang, Zhenyong Zhang, Youliang Tian,
- Abstract summary: Metaverse allows users to delegate their AI models to an AI engine, which builds corresponding AI-driven avatars.
In this paper, we propose an authentication method using multi-factors to guarantee the traceability of AI-driven avatars.
- Score: 7.436039179584676
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Metaverse allows users to delegate their AI models to an AI engine, which builds corresponding AI-driven avatars to provide immersive experience for other users. Since current authentication methods mainly focus on human-driven avatars and ignore the traceability of AI-driven avatars, attackers may delegate the AI models of a target user to an AI proxy program to perform impersonation attacks without worrying about being detected. In this paper, we propose an authentication method using multi-factors to guarantee the traceability of AI-driven avatars. Firstly, we construct a user's identity model combining the manipulator's iris feature and the AI proxy's public key to ensure that an AI-driven avatar is associated with its original manipulator. Secondly, we propose a chameleon proxy signature scheme that supports the original manipulator to delegate his/her signing ability to an AI proxy. Finally, we design three authentication protocols for avatars based on the identity model and the chameleon proxy signature to guarantee the virtual-to-physical traceability including both the human-driven and AI-driven avatars. Security analysis shows that the proposed signature scheme is unforgeability and the authentication method is able to defend against false accusation. Extensive evaluations show that the designed authentication protocols complete user login, avatar delegation, mutual authentication, and avatar tracing in about 1s, meeting the actual application needs and helping to mitigate impersonation attacks by AI-driven avatars.
Related papers
- Is It Really You? Exploring Biometric Verification Scenarios in Photorealistic Talking-Head Avatar Videos [12.12643642515884]
An attacker can steal a user's avatar, preserving his appearance and voice, making it nearly impossible to detect its usage by sight or sound alone.<n>Our main question is whether an individual's facial motion patterns can serve as reliable behavioral biometrics to verify their identity when the avatar's visual appearance is a facsimile of its owner.<n> Experimental results demonstrate that facial motion landmarks enable meaningful identity verification with AUC values approaching 80%.
arXiv Detail & Related papers (2025-08-01T16:23:27Z) - SmartAvatar: Text- and Image-Guided Human Avatar Generation with VLM AI Agents [91.26239311240873]
SmartAvatar is a vision-language-agent-driven framework for generating fully rigged, animation-ready 3D human avatars.<n>A key innovation is an autonomous verification loop, where the agent renders draft avatars.<n>The generated avatars are fully rigged and support pose manipulation with consistent identity and appearance.
arXiv Detail & Related papers (2025-06-05T03:49:01Z) - Perceptual Quality Assessment for Embodied AI [66.96928199019129]
Embodied AI has developed rapidly in recent years, but it is still mainly deployed in laboratories.<n>There is no IQA method to assess the usability of an image in embodied tasks, namely, the perceptual quality for robots.
arXiv Detail & Related papers (2025-05-22T15:51:07Z) - User Identification Procedures with Human Mutations: Formal Analysis and Pilot Study (Extended Version) [0.0]
We analyze user identification procedures by modeling them as security ceremonies and apply proven techniques for automatically analyzing such ceremonies.
The approach relies on mutation rules to model potential human errors that deviate from expected interactions during the identification process.
As a proof-of-concept, we consider a real-life pilot study involving an AI-driven, virtual receptionist kiosk for authenticating visitors.
arXiv Detail & Related papers (2025-02-08T11:29:53Z) - Self-Supervised Learning for Detecting AI-Generated Faces as Anomalies [58.11545090128854]
We describe an anomaly detection method for AI-generated faces by leveraging self-supervised learning of camera-intrinsic and face-specific features purely from photographic face images.
The success of our method lies in designing a pretext task that trains a feature extractor to rank four ordinal exchangeable image file format (EXIF) tags and classify artificially manipulated face images.
arXiv Detail & Related papers (2025-01-04T06:23:24Z) - An Anti-disguise Authentication System Using the First Impression of Avatar in Metaverse [11.794123126761367]
We propose an anti-disguise authentication method that draws on the idea of the first impression from the physical world to recognize an old friend.
Specifically, the first meeting scenario in the metaverse is stored and recalled to help the authentication between avatars.
The proposed signcryption mechanism meets not only the security requirement but also the public verifiability.
arXiv Detail & Related papers (2024-09-17T02:37:44Z) - Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online [5.365346373228897]
Malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes.
With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations.
We analyze the value of a new tool to address this challenge: "personhood credentials" (PHCs)
PHCs empower users to demonstrate that they are real people -- not AIs -- to online services, without disclosing any personal information.
arXiv Detail & Related papers (2024-08-15T02:41:25Z) - Digital Avatars: Framework Development and Their Evaluation [26.74934835511383]
We present Crowd Vote - an adaptation of Crowd Score that allows for judges to elect a large language model (LLM) candidate over competitors answering the same or similar prompts.
We propose an end-to-end framework for creating high-fidelity artificial intelligence (AI) driven digital avatars.
Our visualization tool, and our Crowd Vote metrics demonstrate our AI driven digital avatars have state-of-the-art humor, authenticity, and favorability outperforming all competitors and baselines.
arXiv Detail & Related papers (2024-08-07T20:09:47Z) - OTAvatar: One-shot Talking Face Avatar with Controllable Tri-plane
Rendering [81.55960827071661]
Controllability, generalizability and efficiency are the major objectives of constructing face avatars represented by neural implicit field.
We propose One-shot Talking face Avatar (OTAvatar), which constructs face avatars by a generalized controllable tri-plane rendering solution.
arXiv Detail & Related papers (2023-03-26T09:12:03Z) - Responsibility: An Example-based Explainable AI approach via Training
Process Inspection [1.4610038284393165]
We present a novel XAI approach that identifies the most responsible training example for a particular decision.
This example can then be shown as an explanation: "this is what I (the AI) learned that led me to do that"
Our results demonstrate that responsibility can help improve accuracy for both human end users and secondary ML models.
arXiv Detail & Related papers (2022-09-07T19:30:01Z) - Dynamic Prototype Mask for Occluded Person Re-Identification [88.7782299372656]
Existing methods mainly address this issue by employing body clues provided by an extra network to distinguish the visible part.
We propose a novel Dynamic Prototype Mask (DPM) based on two self-evident prior knowledge.
Under this condition, the occluded representation could be well aligned in a selected subspace spontaneously.
arXiv Detail & Related papers (2022-07-19T03:31:13Z) - Cybertrust: From Explainable to Actionable and Interpretable AI (AI2) [58.981120701284816]
Actionable and Interpretable AI (AI2) will incorporate explicit quantifications and visualizations of user confidence in AI recommendations.
It will allow examining and testing of AI system predictions to establish a basis for trust in the systems' decision making.
arXiv Detail & Related papers (2022-01-26T18:53:09Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Voting for the right answer: Adversarial defense for speaker
verification [79.10523688806852]
ASV is under the radar of adversarial attacks, which are similar to their original counterparts from human's perception.
We propose the idea of "voting for the right answer" to prevent risky decisions of ASV in blind spot areas.
Experimental results show that our proposed method improves the robustness against both the limited-knowledge attackers.
arXiv Detail & Related papers (2021-06-15T04:05:28Z) - Towards Quantum-Secure Authentication and Key Agreement via Abstract
Multi-Agent Interaction [7.673465837624366]
Current methods for authentication and key agreement based on public-key cryptography are vulnerable to quantum computing.
We propose a novel approach based on artificial intelligence research in which communicating parties are viewed as autonomous agents.
We release PyAMI, a prototype authentication and key agreement system based on the proposed method.
arXiv Detail & Related papers (2020-07-18T04:22:02Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.