Data Poisoning is Hitting a Wall

Published: 02 May 2023, Last Modified: 02 May 2023Blogposts @ ICLR 2023Readers: Everyone
Keywords: Data Poisoning, Adversarial ML, Computer Vision, Facial Recognition
Abstract: Data poisoning has been proposed as a compelling defense against facial recognition models trained on Web-scraped pictures. Users can perturb images they post online, so that models will misclassify future (unperturbed) pictures. We demonstrate that this strategy provides a false sense of security, as it ignores an inherent asymmetry between the parties: users' pictures are perturbed once and for all before being published (at which point they are scraped) and must thereafter fool all future models---including models trained adaptively against the users' past attacks, or models that use new technologies discovered after the attack. We evaluate two systems for poisoning attacks against large-scale facial recognition, Fawkes (500,000+ downloads) and LowKey. We demonstrate how an "oblivious" model trainer can simply wait for future developments in computer vision to nullify the protection of pictures collected in the past. We further show that an adversary with black-box access to the attack can (i) train a robust model that resists the perturbations of collected pictures and (ii) detect poisoned pictures uploaded online. We caution that facial recognition poisoning will not admit an "arms race" between attackers and defenders. Once perturbed pictures are scraped, the attack cannot be changed so any future successful defense irrevocably undermines users' privacy.
Blogpost Url: https://iclr-blogposts.github.io/2023/blog/2023/facial-poisoning/
ICLR Papers: https://openreview.net/forum?id=B5XahNLmna
ID Of The Authors Of The ICLR Paper: ~Evani_Radiya-Dixit1
Conflict Of Interest: No
4 Replies

Loading