2022 ACM Conference on Fairness, Accountability, and Transparency 2022
DOI: 10.1145/3531146.3533073
|View full text |Cite
|
Sign up to set email alerts
|

Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash

Abstract: Apple recently revealed its deep perceptual hashing system Neu-ralHash to detect child sexual abuse material (CSAM) on user devices before files are uploaded to its iCloud service. Public criticism quickly arose regarding the protection of user privacy and the system's reliability. In this paper, we present the first comprehensive empirical analysis of deep perceptual hashing based on NeuralHash. Specifically, we show that current deep perceptual hashing may not be robust. An adversary can manipulate the hash … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 130 publications
(44 citation statements)
references
References 25 publications
0
44
0
Order By: Relevance
“…While this class of algorithms has recently come into attention due to Apple's intention to use a version of it -NeuralHash -to detect and report reprehensible images on user devices, with all the privacy, censorship and reliability issues it raises (Struppek et al, 2021), use of deep neural networks for similarity detection is all but new. In Bromley et al (1993), the authors trained networks to detect signature similarity with a precision sufficient to distinguish authentic ones from fake ones, by using a method they introduced -Siamese Networks.…”
Section: Perceptual Similarity Features Extraction Methodsmentioning
confidence: 99%
“…While this class of algorithms has recently come into attention due to Apple's intention to use a version of it -NeuralHash -to detect and report reprehensible images on user devices, with all the privacy, censorship and reliability issues it raises (Struppek et al, 2021), use of deep neural networks for similarity detection is all but new. In Bromley et al (1993), the authors trained networks to detect signature similarity with a precision sufficient to distinguish authentic ones from fake ones, by using a method they introduced -Siamese Networks.…”
Section: Perceptual Similarity Features Extraction Methodsmentioning
confidence: 99%
“…Semantic Similarity: Two images x 1 , x 2 ∈ X are semantically similar if, given some metric function The pre-processed image is first embedded with a contrastively-trained MobileNet (Howard et al, 2017) convolutional neural network. The extracted features are then transformed with a randomized hashing matrix, whose outputs are passed through a step function to generate the final binary hash (Struppek et al, 2021;Apple, 2021).…”
Section: Neuralhash Security and Privacy Goalsmentioning
confidence: 99%
“…Because NEURALHASH relies on a neural network whose weights have been extracted and made public (Ygvar, 2021), a variety of gradient-based attacks have also been proposed (Struppek et al, 2021). These white-box attacks rely on the susceptibility of neural networks to small adversarial perturbations (Goodfellow et al, 2014) More formally, consider taking two source images x 1 and x 2 and linearly interpolating them with respect to some parameter α.…”
Section: Related Work In Attacking Neuralhashmentioning
confidence: 99%
See 2 more Smart Citations