Social-Sensor Identity Cloning Detection Using Weakly Supervised Deep Forest and Cryptographic Authentication
- URL: http://arxiv.org/abs/2508.09665v1
- Date: Wed, 13 Aug 2025 09:53:23 GMT
- Title: Social-Sensor Identity Cloning Detection Using Weakly Supervised Deep Forest and Cryptographic Authentication
- Authors: Ahmed Alharbi, Hai Dong, Xun Yi,
- Abstract summary: We introduce a novel method for detecting identity cloning in social-sensor cloud service providers.<n>Our proposed technique consists of two primary components: 1) a similar identity detection method and 2) a cryptography-based authentication protocol.<n>Our experiments on a large real-world dataset demonstrate the feasibility and superior performance of our technique.
- Score: 5.911768189309895
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Recent years have witnessed a rising trend in social-sensor cloud identity cloning incidents. However, existing approaches suffer from unsatisfactory performance, a lack of solutions for detecting duplicated accounts, and a lack of large-scale evaluations on real-world datasets. We introduce a novel method for detecting identity cloning in social-sensor cloud service providers. Our proposed technique consists of two primary components: 1) a similar identity detection method and 2) a cryptography-based authentication protocol. Initially, we developed a weakly supervised deep forest model to identify similar identities using non-privacy-sensitive user profile features provided by the service. Subsequently, we designed a cryptography-based authentication protocol to verify whether similar identities were generated by the same provider. Our extensive experiments on a large real-world dataset demonstrate the feasibility and superior performance of our technique compared to current state-of-the-art identity clone detection methods.
Related papers
- LCMem: A Universal Model for Robust Image Memorization Detection [10.504309161945065]
We introduce Latent Contrastive Memorization Network (LCMem), a cross-domain model evaluated jointly on both tasks.<n> LCMem achieves improvements of up to 16 percentage points on re-identification and 30 percentage points on copy detection.<n>Our results show that existing privacy filters provide limited performance and robustness, highlighting the need for stronger protection mechanisms.
arXiv Detail & Related papers (2025-12-16T14:06:58Z) - Beyond Inference Intervention: Identity-Decoupled Diffusion for Face Anonymization [55.29071072675132]
Face anonymization aims to conceal identity information while preserving non-identity attributes.<n>We propose textbfIDsuperscript2Face, a training-centric anonymization framework.<n>We show that IDtextsuperscript2Face outperforms existing methods in visual quality, identity suppression, and utility preservation.
arXiv Detail & Related papers (2025-10-28T09:28:12Z) - WithAnyone: Towards Controllable and ID Consistent Image Generation [83.55786496542062]
Identity-consistent generation has become an important focus in text-to-image research.<n>We develop a large-scale paired dataset tailored for multi-person scenarios.<n>We propose a novel training paradigm with a contrastive identity loss that leverages paired data to balance fidelity with diversity.
arXiv Detail & Related papers (2025-10-16T17:59:54Z) - Deep Learning Models for Robust Facial Liveness Detection [56.08694048252482]
This study introduces a robust solution through novel deep learning models addressing the deficiencies in contemporary anti-spoofing techniques.<n>By innovatively integrating texture analysis and reflective properties associated with genuine human traits, our models distinguish authentic presence from replicas with remarkable precision.
arXiv Detail & Related papers (2025-08-12T17:19:20Z) - Quantum-Safe Identity Verification using Relativistic Zero-Knowledge Proof Systems [3.8435472626703473]
Identity verification is essential in sectors like finance, healthcare, and online services to ensure security and prevent fraud.<n>Current password/PIN-based identity solutions are susceptible to phishing or skimming attacks.<n>We explore identity verification through graph coloring-based relativistic zero-knowledge proofs.
arXiv Detail & Related papers (2025-07-18T18:59:19Z) - FakeIDet: Exploring Patches for Privacy-Preserving Fake ID Detection [12.969417519807322]
This study focuses on the topic of fake ID detection, covering several limitations in the field.<n>There are no publicly available data from real IDs for proper research in this area.<n>Most published studies rely on proprietary internal databases that are not available for privacy reasons.
arXiv Detail & Related papers (2025-04-10T14:01:22Z) - Cloned Identity Detection in Social-Sensor Clouds based on Incomplete Profiles [5.411585313453657]
We propose a novel approach to effectively detect cloned identities of social-sensor cloud service providers (i.e. social media users) in the face of non-privacy-sensitive profile data.
Named ICD-IPD, the proposed approach first extracts account pairs with similar usernames or screen names from a given set of user accounts collected from a social media.
It then learns a multi-view representation associated with a given account and extracts two categories of features for every single account.
arXiv Detail & Related papers (2024-11-02T18:23:22Z) - ID-Aligner: Enhancing Identity-Preserving Text-to-Image Generation with Reward Feedback Learning [57.91881829308395]
Identity-preserving text-to-image generation (ID-T2I) has received significant attention due to its wide range of application scenarios like AI portrait and advertising.
We present textbfID-Aligner, a general feedback learning framework to enhance ID-T2I performance.
arXiv Detail & Related papers (2024-04-23T18:41:56Z) - Disentangle Before Anonymize: A Two-stage Framework for Attribute-preserved and Occlusion-robust De-identification [55.741525129613535]
"Disentangle Before Anonymize" is a novel two-stage Framework(DBAF)<n>This framework includes a Contrastive Identity Disentanglement (CID) module and a Key-authorized Reversible Identity Anonymization (KRIA) module.<n>Extensive experiments demonstrate that our method outperforms state-of-the-art de-identification approaches.
arXiv Detail & Related papers (2023-11-15T08:59:02Z) - X-ReID: Cross-Instance Transformer for Identity-Level Person
Re-Identification [53.047542904329866]
Cross Intra-Identity Instances module (IntraX) fuses different intra-identity instances to transfer Identity-Level knowledge.
Cross Inter-Identity Instances module (InterX) involves hard positive and hard negative instances to improve the attention response to the same identity.
arXiv Detail & Related papers (2023-02-04T03:16:18Z) - Protecting Celebrities with Identity Consistency Transformer [119.67996461810304]
Identity Consistency Transformer focuses on high-level semantics, specifically identity information, and detecting a suspect face by finding identity inconsistency in inner and outer face regions.
We show that Identity Consistency Transformer exhibits superior generalization ability not only across different datasets but also across various types of image degradation forms found in real-world applications including deepfake videos.
arXiv Detail & Related papers (2022-03-02T18:59:58Z) - Privacy-Aware Identity Cloning Detection based on Deep Forest [9.051524543426451]
This approach leverages non-privacy-sensitive user profile data gathered from social networks and a powerful deep learning model to perform cloned identity detection.
We evaluated the proposed method against the state-of-the-art identity cloning detection techniques and the other popular identity deception detection models atop a real-world dataset.
arXiv Detail & Related papers (2021-10-21T04:55:52Z) - NPS-AntiClone: Identity Cloning Detection based on Non-Privacy-Sensitive
User Profile Data [7.257277734039782]
Social sensing is a paradigm that allows crowdsourcing data from humans and devices.
Attackers intrude social-sensor clouds by cloning SocSen service providers' user profiles.
We propose a novel unsupervised SocSen service provider identity cloning detection approach, NPS-AntiClone.
arXiv Detail & Related papers (2021-09-30T14:49:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.