zlacker

[return to "Image Scrubber: tool for anonymizing photographs taken at protests"]
1. Ansil8+vn[view] [source] 2020-05-31 18:06:15
>>dsr12+(OP)
Some tips to maximise user privacy while deploying this tool:

1) The code, for now, runs locally. This is good. To avoid the possibility of the code being tampered with at a later day (for example, it could be modified to send copies of the image to a server), download the webpage and use the saved copy, not the live copy.

2) Do not use the blur functionality. For maximum privacy, this should be removed from the app entirely. There are _a lot_ of forensic methods to reverse blur techniques.

3) Be weary of other things in the photograph that might identify someone: reflections, shadows, so on.

4) Really a subset of 2 and 3, but be aware that blocking out faces is often times not sufficient to anonymise the subject in the photo. Identifying marks like tattoos, or even something as basic as the shoes they are wearing, can be used to identify the target.

◧◩
2. Nightl+Qn[view] [source] 2020-05-31 18:09:34
>>Ansil8+vn
"There are _a lot_ of forensic methods to reverse blur techniques"

Any examples? You can't reverse it if the data is gone.

◧◩◪
3. chriss+2p[view] [source] 2020-05-31 18:19:20
>>Nightl+Qn
> You can't reverse it if the data is gone.

That's the problem - the data you think is gone isn't gone. High frequencies are gone.... but you left all the low frequencies, didn't you? You can read a face from the low frequencies.

◧◩◪◨
4. pbhjpb+TB[view] [source] 2020-05-31 20:01:55
>>chriss+2p
If you blur then mosaic, or vice-versa, then presumably you get rid of the low and high frequencies? Depending on the detail shown in the original image either, or both, might remove enough information to render the image anonymised.

How about replace each face with a "this is not a person" AI generated face, then blur+mosaic. Or just a non-person face using a deepfake system that matches the facial expression?

◧◩◪◨⬒
5. chriss+0H[view] [source] 2020-05-31 20:42:08
>>pbhjpb+TB
Why do all these complicated things?

Just draw a black box over faces.

◧◩◪◨⬒⬓
6. tgsovl+wc1[view] [source] 2020-06-01 00:41:18
>>chriss+0H
Because the result is a lot more ugly.

Don't tell people what not to do. Figure out why they're doing it, and provide what they actually want while still achieving the goals (here: security).

Very coarse mosaic, add noise, then blur seems reasonably safe, and doesn't have to look like crap.

◧◩◪◨⬒⬓⬔
7. Hello7+sg1[view] [source] 2020-06-01 01:28:09
>>tgsovl+wc1
"seems reasonably safe" seems like a terrible cryptographic analysis. in fact, given that we already know that both blurring and mosaicing are individually reversible, and noise is easily removable from a sufficiently wide mosaic, this seems like a particularly terrible algorithm. that's not the point though: any man can create an encryption algorithm that he himself cannot break. maybe you can come up with an obfuscation algorithm that cannot be trivially broken, but that doesn't mean it's even remotely a good idea.
◧◩◪◨⬒⬓⬔⧯
8. tgsovl+N84[view] [source] 2020-06-02 00:31:27
>>Hello7+sg1
I was writing a HN comment, not a scientific paper, which is why I wrote "seems safe" instead of making stronger claims.

I'd also like to know how mosaicing is reversible, since it demonstrably reduces the total available amount of information from e.g. 20x20 = 400 RGB values to a single RGB value. This is not sufficient for text where you can start brute-forcing individual options because the search space is small and inputs can be reconstructed precisely, but I'd like to see an explanation why you think this is reversible for photos (even without noise added). I'd also like to know how you want to remove random noise applied to each mosaic block.

The mosaicing is supposed to be the security step here. The blur is optional eye candy not expected to remove further information.

In particular, if you claim that a face mosaiced with a large "pixel" size (e.g. so that the typical face is 5x5 "mosaic blocks" big), you're effectively claiming that you can perform facial recognition based on noisy 5x5 pixel images.

◧◩◪◨⬒⬓⬔⧯▣
9. Hello7+Bp7[view] [source] 2020-06-03 00:42:33
>>tgsovl+N84
according to https://www.bitsoffreedom.nl/2019/12/12/amazons-rekognition-..., current facial recognition software is able to distinguish faces in very blurry mosaics using statistics.

it doesn't matter though. as I've explained, it's far easier to come up with flawed schemes than prove them insecure. just because I can't explain why your specific scheme is insecure doesn't mean it stands a chance against real cryptographers.

◧◩◪◨⬒⬓⬔⧯▣▦
10. tgsovl+e28[view] [source] 2020-06-03 07:08:21
>>Hello7+Bp7
The 20x26 example is indeed scary, but in line with what was known about facial recognition. (It also becomes a bit less scary when you don't look at a zoomed-in version of the image.)

Hence my suggestion to reduce a face to something like 5x5 blocks.

While I'm familiar with the crypto design problem, this is not a crypto algorithm. Sure, it can't be ruled out that someone in the future will find a way to do it, but the state of the art says that 5x5 pixels are not anywhere near enough to run face recognition.

And a solution that may be broken in the future is often much better than a solution that people don't use because it doesn't meet their needs, which in this case is not having fugly black boxes in their picture.

◧◩◪◨⬒⬓⬔⧯▣▦▧
11. Hello7+eHa[view] [source] 2020-06-04 00:44:48
>>tgsovl+e28
this seems like a false dichotomy. there's nothing stopping you from using a pink oval, as long as it covers the face.
[go to top]