
Citation: Dilvin Taşkın, Görkem Sarıyer. Use of derivatives, financial stability and performance in Turkish banking sector[J]. Quantitative Finance and Economics, 2020, 4(2): 252-273. doi: 10.3934/QFE.2020012
[1] | Jiying Ma, Wei Lin . Dynamics of a stochastic COVID-19 epidemic model considering asymptomatic and isolated infected individuals. Mathematical Biosciences and Engineering, 2022, 19(5): 5169-5189. doi: 10.3934/mbe.2022242 |
[2] | Ahmed Alshehri, Saif Ullah . A numerical study of COVID-19 epidemic model with vaccination and diffusion. Mathematical Biosciences and Engineering, 2023, 20(3): 4643-4672. doi: 10.3934/mbe.2023215 |
[3] | Pannathon Kreabkhontho, Watchara Teparos, Thitiya Theparod . Potential for eliminating COVID-19 in Thailand through third-dose vaccination: A modeling approach. Mathematical Biosciences and Engineering, 2024, 21(8): 6807-6828. doi: 10.3934/mbe.2024298 |
[4] | Tianfang Hou, Guijie Lan, Sanling Yuan, Tonghua Zhang . Threshold dynamics of a stochastic SIHR epidemic model of COVID-19 with general population-size dependent contact rate. Mathematical Biosciences and Engineering, 2022, 19(4): 4217-4236. doi: 10.3934/mbe.2022195 |
[5] | Shina D. Oloniiju, Olumuyiwa Otegbeye, Absalom E. Ezugwu . Investigating the impact of vaccination and non-pharmaceutical measures in curbing COVID-19 spread: A South Africa perspective. Mathematical Biosciences and Engineering, 2022, 19(1): 1058-1077. doi: 10.3934/mbe.2022049 |
[6] | Anthony Morciglio, R. K. P. Zia, James M. Hyman, Yi Jiang . Understanding the oscillations of an epidemic due to vaccine hesitancy. Mathematical Biosciences and Engineering, 2024, 21(8): 6829-6846. doi: 10.3934/mbe.2024299 |
[7] | Fang Wang, Lianying Cao, Xiaoji Song . Mathematical modeling of mutated COVID-19 transmission with quarantine, isolation and vaccination. Mathematical Biosciences and Engineering, 2022, 19(8): 8035-8056. doi: 10.3934/mbe.2022376 |
[8] | Yujie Sheng, Jing-An Cui, Songbai Guo . The modeling and analysis of the COVID-19 pandemic with vaccination and isolation: a case study of Italy. Mathematical Biosciences and Engineering, 2023, 20(3): 5966-5992. doi: 10.3934/mbe.2023258 |
[9] | Tetsuro Kobayashi, Hiroshi Nishiura . Prioritizing COVID-19 vaccination. Part 2: Real-time comparison between single-dose and double-dose in Japan. Mathematical Biosciences and Engineering, 2022, 19(7): 7410-7424. doi: 10.3934/mbe.2022350 |
[10] | Sarafa A. Iyaniwura, Rabiu Musa, Jude D. Kong . A generalized distributed delay model of COVID-19: An endemic model with immunity waning. Mathematical Biosciences and Engineering, 2023, 20(3): 5379-5412. doi: 10.3934/mbe.2023249 |
Nowadays, cameras with face recognition algorithms (FRA) are everywhere. Not only do FRAs get our facial features, but they are likely not to tell us what they are doing. What is worse, even people wearing masks or sunglasses cannot avoid face detectors. Especially after the COVID-19 pandemic, almost all commercial FRAs support the identification of occluded faces. Therefore, our facial privacy is under an unprecedented threat. Also, we cannot eliminate the collection of personal biological data in the physical world.
In the past, people could easily hide their faces by wearing a mask, a hat or a pair of sunglasses. Some ingenious attack networks can generate printable patches [1] for an FRA and place them in parts of the body [2,3] to mislead the classifier [4]. Of course, numerous algorithms can protect static face privacy data. However, recent surveys have proved that our facial features can still be inferred when the faces don masks and other ornaments. As shown in Figure 1, CCTV in many neighborhoods can identify whether people are wearing masks and the state-of-the-art FRAs can still distinguish the face ID. These innovative recognition algorithms invalidate many liveness privacy protection algorithms, and most importantly, these models are freely available to anyone on the internet.
The existing occlusion face recognition methods include representation-based and reconstruction-based algorithms. The online evaluation uses a gradually growing network approach to remove an unwanted object. In [5], two discriminators are used to learn the global structure and the deep missing region for face image reconstruction. Similarly, Ge et al. [6] applied a set of identity-centered features in the extractors as supervision to enable the clustering toward their identity centers. In [7], the authors restore the whole face with a local facial texture. In the reconstruction field, the deep features extracted from the unmasked regions are widely used [8]. Furthermore, the accuracy of the MTArcFace [9] algorithm to recognize the face donning a mask has exceeded 99.7%. To sum up, those recognition algorithms are very accurate for faces donning masks. In contrast, the development of facial privacy protection methods is much slower than that of FRAs.
Attacking the existing FRAs is an effective means to protect face privacy in the physical world. Face information is obtained mainly through two modes. One is the face features to be sampled into multiple blocks of the same size. And, the other matching approach is detecting the key points. According to these theories, some methods have used cloak texture to protect IDs in face images. In other words, people use printed textures with deceptive features to deceive the camera and place them on clothes [4], hats [2], eyeglass frames [10] and other parts [3] of the liveness body. This device can play a role in the early stage. Nevertheless, facial recognition systems try to protect themselves from being attacked. For example, they can determine human beings by analyzing the wavelength of reflected light [11]. Kose and Dugelay [12] use the method based on linear back projection to discriminate between real and fake faces, and they asserted 88% classification accuracy with a depth map. Face synthesis [13], deepfakes [14], attribute manipulation [15] and expression swap [16] are good ways to protect privacy. However, they may be easily exploited by criminal motives. Some new in-depth definition identification technologies have been proposed to deal with privacy protection methods, as shown in Figure 2. Therefore, liveness privacy protection becomes more difficult.
To solve the optimization problem, various multi-objective evolutionary algorithms have been proposed. We can improve them by leveraging domain-specific information in training signals for related tasks. We proposed a privacy framework and showed that solving such a game is equivalent to solving a one-to-many objective linear programming problem. Its antagonism is a complex problem because there are multiple ways to sense the generated attack image, whereas many previous methods have failed. The improved training network makes the machine automatically perceive external changes and adds a manual intervention mechanism. That can effectively improve the efficiency of the attack. All targets in mutual updating are black box algorithms. The key to this model is to preserve the trained parameters, accumulate new parameters at the inference level and maintain visibility at the image level as much as possible.
This paper focuses on protecting people's facial privacy in the real world. First, by studying the types and principles of FRAs, we prepare an attack method against commercial face detectors and improve their efficiency. We adopt the attention mechanism to keep the network stable and robust. Simultaneously, it is easy to fuse FRAs for multiple patterns. Second, we try to train some 2D images that can deceive any FRA. The difference from previous studies is that the protective texture can be compatible with most commercial FRAs. Finally, we design a projection network, which can project the attack texture from 2D to 3D. It will be easy to adapt the image to the mask. This 3D texture makes performance independent of angle and lighting. More importantly, these textures are natural from a visual point of view and will not make others feel suspicious and uncomfortable.
Protecting the private information in face images can be divided into two modes: one mode is by adding interference in the digital domain (digital attack), and another is by adding anti-disturbance to real faces in the physical world (physical attack). Because attackers generally cannot access or modify the digital domain input of the physical world face recognition system, physical attacks have more practical significance for evaluating the robustness. However, compared with digital attack methods [17], the physical attack is more challenging due to the complex conditions of the physical world.
We classify the principle of occluded face recognition of three types: facial reconstruction, occlusion discarding and occlusion dictionary [18]. A linear combination of gallery images rebuilt the probing facial picture in facial reconstruction. The occlusion discarding strategy seeks to delete characteristics in FRAs that correspond to the occluded component. It is on the notion that the features damaged by the occluded section have a detrimental influence on the FRA.
In reconstruction, Alyuz et al. [19] extended studies about occlusion removal and restoration techniques. They consider occlusion handling for surface registration and missing data handling for classification based on subspace analysis techniques. It is easy to use an adaptively selected model-based registration technique for the alignment problem. Occlusions are recognized and eliminated after registering to the model that has been validated by non-occluded patches. A masking approach known as masked projection is presented during the classification step to allow subspace analysis techniques with insufficient data. Drira et al. [20] attempted to expect and complete the incomplete face curves by using a statistical shape model. In particular, this technique employs the principal components analysis (PCA) algorithm on the training data to generate a training shape, which is then used to estimate and rebuild the entire curves. The approach of recovering occluded regions by predicting missing curves that incorporate critical form data dramatically improved identification accuracy.
Regarding occlusion discarding, Li et al. [21] presented a restoration step that employed a statistical estimate on curves to address missing data. In particular, the model created by PCA builds partially observed curves. Guo et al. [22] used inverse rendering to make many photo-realistic facial pictures with varying features. They established a fine-detailed facial picture collection by transferring multiple detail scales from one image to the next.
Regarding the occlusion dictionary, Hong et al. [23], Utomo and Kusuma [24] and Prinosil and May [25] have realized person re-identification from different angles and produced certain benefits. Even commercial face identification software development kit (SDK) such as Baidu, Aliyun, Tencent, ArcFace (not InsightFace) and Face++ have made the accuracy of masked face recognition over 99%. At present, no matter how we cover up our facial privacy in the physical world, we can be captured by advanced FRAs. Tolosana et al. [26] have focused on the newest generation of deepfakes, emphasizing its advancements and problems for fake detection.
Initiative protection mode is based on the detector's compliance with the privacy convention. FRAs actively conceal the privacy of the captured picture and transmit clean data through the network. Blind vision involves the anonymous processing of an image or video. It uses a secure multi-party computing (SMC) method applied to visual algorithms to solve the privacy problem during processing [26]. SMC is a subfield of cryptography that allows several people to compute a function while keeping their inputs and themselves hidden. Sun et al. [28] used dynamic keys for decryption during image transmission, thus avoiding the risk of disclosure of fixed keys. Zhou and Pun [29] developed a new method called face pixelation in video live streaming to generate automatic personal privacy filtering during unconstrained streaming activities. RGB cameras for active and assisted living applications [30] use object segmentation technology to process the images collected from the community in the back progress and hide the irrelevant face data in the pictures. The deepfake [14] mentioned above is also a way to protect privacy, although it is usually used for illegal purposes. Zheng et al. [31] used remote photo-plethysmography (RPPG) and region of interest with a high signal-to-noise ratio to forge physiological signals to protect the privacy of the subjects. Chen et al. provided evaluations of PulseEdit's [32] performance against RPPG-based liveness identification and RPPG-based deepfake detection, demonstrating its capacity to avoid these visual security techniques and its critical role in the design of attack-resilient systems. Fawkes algorithm proposed by Shan et al. [33] hid the small perturbation in the position where the image is difficult to be detected, resulting in the loss of focus on the face detector.
Passive protection has five categories: intervention, blind vision, secure processing, redaction and data hiding [34]. Although it often appears in static data protection, passive protection often comes with liveness data protection events in the physical world. The intervention approach addresses the problem of preventing someone from capturing private visual data from their surroundings. They intend to build environments that are resistant to capture. These methods interfere with the camera equipment by interfering with the special equipment of the camera's optical lens, thus hindering the acquisition of pictures. The BlindSpot system was created by Patel and colleagues, and it detects many retro-reflective CCD or CMOS camera lenses in a safe area and then focuses a pulsating light toward the identified lens [35], destroying any photos those cameras may have recorded. Adversarial patches [36], AdvHat [2] and federated privacy [3] offer real-world approaches to creating universal, resilient and targeted hostile picture patches. When these patches are placed with a living face, they can cause an FRA to ignore the face or report an error target.
Physical attack methods generally include face stickers, wearing adversarial glasses, wearing a hat, etc. We should also consider different physical world conditions, including the chromatic aberration of a sticker, face variations and environmental condition variations. These are closely related to lighting conditions, camera angle, etc. Obviously, here are two methods to protect the privacy of physical faces: dodging attacks and impersonation attacks. The principle of dodging attacks is to reduce the similarity between face images with the same ID, which generally refers to cosine similarity (Lsim=(1+cosf(x+δ),f(xa))/2), where x and xa come from the same ID and Lsim stands for adversary loss.
The principle of an impersonation attack is to increase the similarity between face images with different IDs. In contrast to avoiding attacks, x and xa are sampled from two unequal identity IDs and can be optimized by minimizing Lsim=(1−cosf(x+δ),f(xa))/2.
The principle of privacy protection is an attack recognition algorithm. The real meaning of privacy protection is algorithm fusion because the existing face privacy protection algorithms are specified recognition models. However, the face recognition extractors in the physical world are different. They may lead to failure in reality because of using an independent theory. Further, we cannot receive the practices and results consumed by the multi-deep network.
Because many precedents have described how to tease FRAs with image interferences, privacy attacks on multiple FRAs have become rule-based. If a gauze mask is printed with a texture with general attack attributes, people who wear it will look more natural. We use the encoder to map some opponent features and mask shapes so that these faces can be regarded as another living person by the FRAs. The encoder abstracts the eigenvalues of the synthesized image and inputs them into several spliced FRAs. Then, the decoder feeds back the classification results of these spliced FRAs to the generator to adjust the attack parameters. When the synthesized texture reaches the attack threshold, the parameters can be output to the printable network to make a mask texture. The structure of the fusion network is shown in Figure 3.
Machine learning, as everyone knows, has generalization performance that is poor, but it often produces more optimized results on the specific problem with sufficient training. So, keeping the model available when changing the input and output is a challenge. Some traditional stitching ideas can be applied in deep networks to simulate the generalization process, e.g., wiring together a collection of known algorithms. This smoother representation of the algorithm allows learning to adjust the internal mechanism of the algorithm itself through data feedback.
The biggest problem we encountered by fusing face recognition attack algorithms is comprehending the internal concerns of a commercial algorithm. All black-box-based algorithms should be paralleled into the attack network to achieve compatibility. Although visual attention [37] technology is often used for character recognition to simulate the human eyes, similarly, it will bring surprising results in algorithm fusion. If a network can sense key nodes, its speed must be faster, and its accuracy will be higher than that of the pruning method. Squeezing eigenvalues of the same person's face into small intervals is a good way of increasing the convergence speed of a network, as shown in Figure 4. However, with the accumulation of recognition algorithms, the capacity of feature space needs to be continuously adjusted, and gradient explosion may also occur in theory. Therefore, we should use the weighting function to interfere with the aggregation speed. See Eq (1), where w is the ith feature weight, l is the length of the face feature vector, x represents the attention distribution coefficient in the ith feature and y is used as the actual eigenvector estimation. Equation (2) defines the probability distribution of x, where s is the attention score [38].
Unlike in natural language recognition [39], the attention mechanism of facial features is a multi-vector parallel query process, and the vector length is non-fixable. So, based on the first FRA, the filters are sorted according to the filter norm (e.g., L1 or L2) [40,41]. Such processing will reduce the resources occupied by the decoder so that the network optimization will not be slow because of the cask effect. The decoder normalizes the cut feature map and feeds it back to the generator, and the feature mapping set D represents the decoder, which is composed of multiple vectors (A) with the weight w, as shown in Eq (3). On the one hand, the decoder outputs the recognition result of the polymerized algorithm. On the other hand, it feeds the area of interest back to the generator. When the texture structure generated by Gaussian noise reaches the preset threshold, it can automatically or manually convert vector data into 2D coordinates for printing. Moreover, the ideal result should be to shift the attention of any target recognition algorithm. The image based on the attention mechanism is shown in Figure 5.
wi=∑li=1xijyj | (1) |
xi=softmax(si)=exp(si)∑ljexp(sj) | (2) |
D=w1A1⨁w2A2⨁⋯⨁wnAn‖A‖ | (3) |
Although simulation stickers can use attacks to achieve the effect of privacy protection, considering the changes of light and angle in the wild world, it is easy to invalidate the planar texture pattern. Therefore, the generated texture must be projected onto the mask with three creases. The projection here includes two parts: one is the projection of the mask on the face, and the other is the projection of the texture on the mask. Further, we convert it from 3D to 2D, and then convert it to 3D again.
First, the discrete point elimination method [42] is used to record the 3D scattered point information of the human face in which the coordinate is p. We put the virtual mask onto a face image with the assistance of surface shape and curvature scales [43], where δ represents the network topology coefficient. To be sure, aligning the mask with the nose coordinates as the starting point makes the mapping between the 2D and the 3D plane more symmetrical. Locking the range of the geometric surface indices in [0.85, 1] can make the image fit with an object surface as much as possible [44], especially when mapping the nasal tip area. For this training, we chose to use the FRGCv2 database [45]. The 2D space shall conform to Eq (4), where the sequence comprises the L2 norm maximum of p between UV space and XYZ space [46]. The face after transposition is closer to the tension on the plane, as shown in Figure 6.
dx,y=maxδ∈{−1,0,1}‖pu,v−px+δ,y+δ,z+δ‖ | (4) |
Second, the mask needs to be laid flat on the 2D face and passed through a suitable position. Usually, the size of masks that meet the biological evaluation of medical devices (according to the ISO10993-1 standard) is 17.5 cm × 15.5 cm after deployment. So, the outspread mask must be larger than the area under the nose. We chose to apply the Dirichlet boundary condition [47] and the energy E defined in Eq (5), where Fm symbolizes the function of linear transformation constrained by piecewise constraints, sm represents the boundary of 3D to 2D mapping and μ is the unit slice of the 3D face surface. This convex mapping can constrain the discrete conformal graph (maximum angle hold). Therefore, it is only necessary to ensure that the nose and the first outer edge are mapped as shown in Figure 7. And, the area below the third inner edge can be ignored. So far, we can print the texture on the 2D mask according to the face shape.
Finally, considering that the mask will block some texture information after being folded, a grid training network needs to predict which features will fail when they are occluded. For positioning, we print 1.5 cm chessboard grids on the prefabricated masks. It should be noted that most of the parts cause large-scale texture distortion in blue areas, as shown in Figure 8. A 2D set gi={xti,yti} denotes the pixels of a regular grid, and xsi presents the source pixel in the expanded mask, as shown in Figure 7. By the four points of the ith cell and corresponding projected cell, it can be transformed to the matrix of the spatial Mθ, as shown in Eq (6). The class of transformations Tθ may be more constrained, such as that used for attention, allowing cropping, translation and isotropic scaling [46].
E=12∫sm|∇Fm|dμ | (5) |
(xsi,ysi)=Tθ(xti,yti)=Mθ(xtiyti1) | (6) |
In this work, the integer sampling kernel can improve the mapping performance from 2D to 3D, the relationship between input the feature map U and output map V is shown in Eq (7), where b rounds x to the nearest integer and δ{} is the Kronecker delta function [48], Ucn,m is the value at the location (n, m) in Channel c and we get a solid coordinate system of 90 cm units, as shown in Figure 9. At the same time, for the case that we need to restore the pixel information from the UV plane to the XY plane, that is, 3D to 2D, we propose a differentiable inverse transform. This sampling efficiency can improve the conversion efficiency of the camera according to the reference [49]. As shown in Eq (8), we described part of the mask fitting points in 428 keys. These key points are Delaunay-triangulated. Let the triangle set corresponding to the set P = {P1, ..., P2} on the plane be T, which must meet the following requirements: (a) the endpoint of the triangle exactly belongs to the set P; (b) the edges of any two triangles do not intersect or the edges of adjacent triangles coincide and (c) T forms the convex hull of P. At this time, the face and mask are composed of several blocks. The more triangle blocks that are connected, the more the depth of information affects robustness. When constructing the Delaunay triangulation network and using the local optimization procedure, combine two common triangles into a polygon, and use the maximum empty circle criterion to detect whether the fourth vertex of the polygon is within the triangle's circumscribed circle. If it is, adjust the diagonal as shown in Figure 10.
Vci=∑Hn∑WmUcn,mδ{([xsi+b]−m)×([ysi+b]−n)}{b=0,x,y<0.5b=1,x,y>0.5 | (7) |
∂Vci∂Ucn,m=∑Hn∑WmUcn,mmax(0,1−|xsi−m|)max(0,1−|ysi−n|) | (8) |
However, only local optimization cannot increase the accuracy of depth information. Thus, we used the interpolation method to increase the depth as shown in Figure 11: (a) Find an auxiliary window Rect containing the in-point set and connect the diagonal lines of Rect to form two triangles as the initial grid in P. (b) Insert a point P in T and determine the triangle where P is located to search for adjacent triangles and circumscribe circles. (c) Delete all triangles of the circumscribed circle containing P to form a polygonal cavity containing P, and then connect the vertices of P and the cavity to form a new grid. (d) Skip (c) and repeat (b).
Target recognition needs to map the extracted 2D features into the 3D point cloud template by combining 2D calibration and RGB projection. Here, a dataset marks the point cloud coordinates, labels, colors and correlation matrix data of the wrinkle area of the PrivacyMask for a variety of faces and angles. The application of the dataset can also effectively filter the irrelevant points in two-dimensional space, prune the mapping and only keep the view cone key point cloud data. Because the angles of the camera and the face are random, the camera coordinates need to have different initial values. Therefore, the UV plane and XYZ plane need to be constantly converted to rotate from the XYZ plane to the camera's orthogonal position. First, the camera establishes a virtual XYZ coordinate system and uses the UV image to map the cone coordinate system when the UV coordinates are shifted. Then, the training results and 3D templates are used to project the UV coordinates into the XYZ coordinate system. Then, the depth information of the Z axis is rotated through the T-Net network to get the 3D coordinates of the target, as shown in Figure 12. After being verified by a multi-task convolutional neural network [3], the generated countermeasure patch can be printed on the mask, as shown in Figure 13.
The printed mask did not appear as strange or uncomfortable images, nor did it have terrible effects. It is a relative obedience pattern that makes people have no sense of conflict, although the texture on the mask looks like a catfish. The lead (Pb)-containing coating is used in the experiment. In the actual production, please use printing materials that meet local standards.
The experiments were conducted to explore the effectiveness of algorithm fusion compatibility proof and liveness face privacy protection. We modified the Labeled Faces in the Wild (LFW) dataset and the Real World Masked Faces dataset [50] for training. The Andy_Lau dataset and masked-LFW dataset were used for testing. At the same time, 30 volunteers took part in the living test.
In the experiment, we selected Baidu (BD), Arcface (AF) and Face++ (FA) as the adversary FRAs. Because these algorithms open some facial feature anchors, it is easy to add observation windows in the encoder to detect whether the generated texture is in the predetermined position.
We picked 5000 faces for the training set and registered them to the adversary FRAs. In the first round, we fed 4000 faces in 4000 photos, and the remaining 1000 faces with over 4000 photos were trained in the second round. As an index of the training results, the false and non-match rate was evaluated; it represents the confidence in the FRA subtracted by 1. Two important findings in Figure 14 were confirmed: (1) for a single adversary FRA, the attention mechanism does not significantly increase the FNMR, but it keeps the network stable; (2) after the second training round (from 4500 minutes), the FNMR of the network with the attention mechanism increased faster.
The experimental results show that the Baidu FRA has a big jump; at the same time, the FALSE (0.0) burst when the confidence was less than 0.05. It brings about the FNMR up to 1.0 suddenly from the 7500th minutes; clearly, this result does not accord with the principle of statistics. So, it needs to set the expected average value according to each SDK or experimental performance of FRAs. And, the following target FNMR was defined as [0.80, 0.95] according to the Cannikin law [51].
We took the Baidu FRA with changeable training parameters as the baseline and connected several FRAs in parallel to the decoder. As shown in Figure 15, the training efficiency with the attention mechanism (solid line) is higher than unmodified ones (dotted line), and the training process is more rapid and stable. It makes the network more comfortable to deal with multiple FRAs. At the same time, we also confirm that it is difficult to train a good result for all closed-source FRAs using generative adversarial networks alone.
This experiment verifies whether our model has good robustness when dealing with multiple types of FRAs. Our goal is to make static face IDs invisible in Baidu, Azure face, Face++, ArcFace, Huawei, Aliyun and Tencent. The privacy protection methods compared are AdvHat (AH) [2], Pautov's eyeglasses (PE) [3], Simen's patches (SP) [4] and adversarial Patch (AP) [36].
AH uses a regular color printer to produce a rectangle sticker on the hat. An adversary sticker is created by using a unique algorithm that simulates the out-of-plane deformation of the picture of the sticker position on the hat. This approach claims that it can perplex the most sophisticated public face ID models. PE can print eyeglasses that make faces invisible in the LResNet100E-IR and ArcFace@ms1m-refine-v2 models. SP and AP cause detector classification error, so it cannot track the faces. We tested these state-of-the-art methods with the texture generated by our network to contrast the effect on the listed FRAs.
It can be inferred from Table 1 that some methods claiming to have efficient privacy protection show weaknesses in commercial FRAs. AH and PE need to train for a designative type of FRA. If they meet multiple FRAs, they cannot improve FNMRs. SP can only take effect for the target detection algorithm of a white-box model. The texture of AP cannot affect any FRA in the list. Obviously, our method is robust.
Method | Framework | FNMR | ||||||
Baidu | Azure | Face++ | ArcFace | Huawei | Aliyun | Tencent | ||
AH | LResNet100E-IR | 0.038 | 0.015 | 0.013 | 0.213 | 0.011 | 0.012 | 0.017 |
PE | LResNet100E-IR | 0.371 | 0.421 | 0.396 | 0.679 | 0.420 | 0.272 | 0.450 |
SP | YOLOv2 | 0.016 | 0.015 | 0.012 | 0.010 | 0.012 | 0.014 | 0.013 |
AP | EOT[52] | 0.013 | 0.015 | 0.011 | 0.011 | 0.012 | 0.014 | 0.013 |
PM(ours) | ArcFace-v2 | 0.912 | 0.973 | 0.902 | 0.923 | 0.988 | 0.918 | 0.972 |
We invited 30 volunteers to wear masks with over 100 textures to participate in the experiment. The adversary FRAs were Baidu, Azure face, Face++, ArcFace, Huawei, Aliyun, Tencent and Apple (IOS 15.3) face ID algorithms.
An experiment on recognizing occluded faces showed that all algorithms involved have high accuracy when people wear clear masks or wear common obstructing texture decorations. These FRAs have a high recognition rate when they store a blurred picture, as shown in Figure 16. All of the FRAs can resist the pattern interference on the mask, even if the pattern is half of a face.
Except for Apple face ID, all FRAs were installed on the same hardware platform, in which the camera resolution was 2K. The volunteers conducted two groups of experiments. First, we asked each volunteer to test 500 times in an FRA and replace the PrivacyMask one at a time. Second, an FRA identified 30 volunteers in turn, and each volunteer needed to wear different PrivacyMasks each time. Finally, the average confidence was recorded, as shown in Figure 17. The experiments show that the FRAs cannot identify the subjects. People wearing the PrivacyMask can cause the FRA to mismatch face IDs. It is an excellent way to protect faces in the physical world from being tracked or authenticated. The confidence of Huawei and the Apple IOS was 0 because Huawei cannot output confidence less than 0.6 and the Apple IOS is a complete black-box model and does not output confidence.
Our method is easy to commercialize and may be used by criminals to avoid monitoring equipment. Therefore, we did not release code and experimental data. The intact privacy protection contains three parts: static data privacy protection, physical world privacy protection and face recognition authorization. We have completed the first two works. The main content of the recognition authorization is that the generated facial texture carries keys and the discriminator allowed by the user will not be affected by these protective textures. After we complete the final work, there will be no way to hide face IDs illegally. Also, the public security-related camera will be able to recognize the people wearing the PrivacyMask.
PrivacyMask can generate some textures that can be printed on the mask, which makes the face detector lose its identification ability. In short, this method can protect the face in the physical world by using the attack principle. People can wear this mask to deal with face privacy snooping and face feature tracking in an unknown environment. The pattern of this mask will not put users in an awkward situation compared with the similar mask products. Our proposed texture mapping method can effectively solve the failure caused by the change of light and angle. The experimental results verified the robustness of PrivacyMask against the state-of-the-art face ID system of Baidu, Huawei and Apple, with a success rate of over 95%. Also, the attention mechanism can keep the network stable and reduce the gradient problems. It makes the idea of algorithm fusion easier to implement. Further, combined with the static data protection method we proposed before, a closed loop to protect face privacy has been formed.
The authors declare that there is no conflict of interest.
[1] | Akçaoğlu E (1998) Financial innovation in Turkish Banking. Capital Markets Board of Turkey. |
[2] |
Angbazo L (1997) Commercial Bank Net Interest Margins, Default Risk, Interest-Rate Risk, and Off-Balance Sheet Banking. J Bank Financ 21: 55-87. doi: 10.1016/S0378-4266(96)00025-8
![]() |
[3] |
Apătăchioae A (2014) Emerging markets queries in finance and business: New challenges in the management of banking risks. Procedia Econ Financ 15: 1364-1373. doi: 10.1016/S2212-5671(14)00600-5
![]() |
[4] |
Beck T, Demirguc-Kunt A, Levine R (2006) Bank concentration, competition, and crises: first results. J Bank Financ 30: 1581-1603. doi: 10.1016/j.jbankfin.2005.05.010
![]() |
[5] |
Berger A, Klapper L, Turk-Ariss R (2009) Bank competition and financial stability. J Financ Serv Res 35: 99-118. doi: 10.1007/s10693-008-0050-7
![]() |
[6] | Booth JR, Smith RL, Stolz RW (1984) Use of interest rate futures by financial institutions. J Bank Res 15: 15-20. |
[7] |
Boyd J, De Nicolo G (2005) The theory of bank risk taking and competition revisited. J Financ 60: 1329-1343. doi: 10.1111/j.1540-6261.2005.00763.x
![]() |
[8] |
Buston CS (2016) Active risk management and banking stability. J Bank Financ 72: S203-S215. doi: 10.1016/j.jbankfin.2015.02.004
![]() |
[9] |
Calmès C, Théoret R (2010) The impact of off-balance-sheet activities on banks returns: an application of the ARCH-M to Canadian data. J Bank Financ 34: 1719-1728. doi: 10.1016/j.jbankfin.2010.03.017
![]() |
[10] |
Carter DA, Sinkey JF (1998) The use of interest rate derivatives by end-users: The case of large community banks. J Financ Serv Res 14: 17-34. doi: 10.1023/A:1008057418368
![]() |
[11] | Claessens S, Dell'Ariccia G, Igan D, et al. (2010) Lessons and Policy Implications from the Global Financial Crisis. In IMF Working Paper. Washington, DC: International Monetary Fund. |
[12] |
Cyree KB, Huang P, Lindley JT (2012) The economic consequences of Banks' derivatives use in good times and Bad times. J Financ Serv Res 41: 121-144. doi: 10.1007/s10693-011-0106-y
![]() |
[13] |
Demirgüç-Kunt A, Huizinga H (2010) Bank activity and funding strategies: the impact on risk and return. J Financ Econ 98: 626-650. doi: 10.1016/j.jfineco.2010.06.004
![]() |
[14] |
De Nicoló G, Bartholomew P, Zaman J, et al. (2004) Bank consolidation, conglomeration and internationalization: Trends and implications for financial risk. Financ Markets Inst Instrum 13: 173-217. doi: 10.1111/j.0963-8008.2004.00076.x
![]() |
[15] | Denizer C (1998) Foreign entry in Turkey's banking sector, 1980-1997. World Bank Policy Research Paper, No:2462. |
[16] | Ghosh A (2017) How do derivative securities affect bank risk and profitability? Evidence from the US commercial banking industry. J Risk Financ 18: 186-213. |
[17] |
Gibson R, Murawski C (2013) Margining in derivatives markets and the stability of the banking sector. J Bank Financ 37: 1119-1132. doi: 10.1016/j.jbankfin.2012.10.005
![]() |
[18] | Gilkeson JH, Smith SD (2006) The impact of derivatives on commercial banks (2000-2004). Working Paper, University of Central Florida. |
[19] | Gorton G, Rosen R (1995) Banks and derivatives. National Bureau of Economic Research, Working Paper No. 5100. |
[20] |
Hentschel L, Kothari SP (2001) Are corporations reducing or taking risks with derivatives? J Financ Quant Anal 36: 93-118. doi: 10.2307/2676199
![]() |
[21] |
Instefjord N (2005) Risk and hedging: do credit derivatives increase bank risk? J Bank Financ 29: 333-345. doi: 10.1016/j.jbankfin.2004.05.008
![]() |
[22] | Jo H, Lee C, Munguia A, et al. (2009) Unethical Misuse of Derivatives and Market Volatility Around the Global Financial Crisis. J Acad Bus Ethics 2: 1-11. |
[23] |
Koppenhaver GD (1985) Bank funding risk, risk aversion, and the choice of futures hedging instrument. J Financ 40: 241-255. doi: 10.1111/j.1540-6261.1985.tb04947.x
![]() |
[24] |
Koppenhaver GD (1990) An empirical analysis of bank hedging in futures markets. J Futures Markets 10: 1-12. doi: 10.1002/fut.3990100102
![]() |
[25] |
Li L, Yu Z (2010) The Impact of Derivatives Activity on Commercial Banks: Evidence from U.S. Bank Holding Companies. Asia-Pacific Financia Markets 17: 303-322. doi: 10.1007/s10690-010-9117-1
![]() |
[26] |
Li S, Marinč M (2014) The use of financial derivatives and risks of U.S. bank holding companies. Int Rev Financ Anal 35: 46-71. doi: 10.1016/j.irfa.2014.07.007
![]() |
[27] |
Mayordomo S, Rodriguez-Moreno M, Peña JI (2014) Derivatives holdings and systemic risk in the U.S. banking sector. J Bank Financ 45: 84-104. doi: 10.1016/j.jbankfin.2014.03.037
![]() |
[28] |
Ntarmah AH, Kong Y, Gyan MK (2019) Banking system stability and economic sustainability: A panel data analysis of the effect of banking system stability on sustainability of some selected developing countries. Quant Financ Econ 3: 709-738. doi: 10.3934/QFE.2019.4.709
![]() |
[29] |
Oatley T, Winecoff W, Pennock A, et al. (2013) The political economy of global finance: a network model. Perspect Polit 11: 133-153. doi: 10.1017/S1537592712003593
![]() |
[30] | Said A (2011) Does the Use of Derivatives Impact Bank Performance? A Case Study of Relative Performance during 2002-2009. Middle East Financ Econ 11: 77-88. |
[31] |
Shanker L (1996) Derivatives usage and interest rate risk of large banking firms. J Futures Markets 16: 459-474. doi: 10.1002/(SICI)1096-9934(199606)16:4<459::AID-FUT6>3.0.CO;2-H
![]() |
[32] |
Shen X, Hartarska V (2013) Derivatives as Risk Management and Performance of Agricultural Banks. Agric Financ Rev 73: 290-309. doi: 10.1108/AFR-07-2012-0036
![]() |
[33] |
Shen X, Hartarska V (2018) Winners and losers from financial derivatives use: evidence from community banks. Appl Econ 50: 4402-4417. doi: 10.1080/00036846.2018.1450484
![]() |
[34] |
Stulz R (2010) Credit default swaps and the credit crisis. J Econ Perspect 24: 73-92. doi: 10.1257/jep.24.1.73
![]() |
[35] | Szunke A (2014) The role of financialization in banking sector instability. J Econ Manage 16: 96-111. |
[36] |
Turk Ariss R (2010) On the implications of market power in banking: evidence from developing countries. J Bank Financ 34: 765-775. doi: 10.1016/j.jbankfin.2009.09.004
![]() |
[37] |
Yeyati LE, Micco A (2007) Concentration and foreign penetration in Latin American banking sectors: Impact on competition and risk. J Bank Financ 31: 1633-1647. doi: 10.1016/j.jbankfin.2006.11.003
![]() |
[38] |
Yong HHA, Faff RW, Chalmers K (2009) Derivative activities and Asia-Pacific Banks' interest rate and exchange rate exposures. J Int Financ Markets Inst Money 19: 16-32. doi: 10.1016/j.intfin.2007.08.002
![]() |
1. | Liqiong Jian, Xinyu Bai, Shaojuan Ma, Minyu Feng, Stochastic dynamical analysis for the complex infectious disease model driven by multisource noises, 2024, 19, 1932-6203, e0296183, 10.1371/journal.pone.0296183 | |
2. | Rujie Yang, Hong Qiu, A Valid Transport Related SVEIHR Stochastic Epidemic Model with Coverage and Time Delays, 2024, 23, 2224-2880, 815, 10.37394/23206.2024.23.84 | |
3. | Munkaila Dasumani, Sianou Ezéckiel Houénafa, Gohouede Lionel Cédric, Binandam S. Lassong, Stephen E. Moore, Deterministic and stochastic models for analyzing the dynamics of diabetes mellitus, 2025, 26668181, 101202, 10.1016/j.padiff.2025.101202 |
Method | Framework | FNMR | ||||||
Baidu | Azure | Face++ | ArcFace | Huawei | Aliyun | Tencent | ||
AH | LResNet100E-IR | 0.038 | 0.015 | 0.013 | 0.213 | 0.011 | 0.012 | 0.017 |
PE | LResNet100E-IR | 0.371 | 0.421 | 0.396 | 0.679 | 0.420 | 0.272 | 0.450 |
SP | YOLOv2 | 0.016 | 0.015 | 0.012 | 0.010 | 0.012 | 0.014 | 0.013 |
AP | EOT[52] | 0.013 | 0.015 | 0.011 | 0.011 | 0.012 | 0.014 | 0.013 |
PM(ours) | ArcFace-v2 | 0.912 | 0.973 | 0.902 | 0.923 | 0.988 | 0.918 | 0.972 |
Method | Framework | FNMR | ||||||
Baidu | Azure | Face++ | ArcFace | Huawei | Aliyun | Tencent | ||
AH | LResNet100E-IR | 0.038 | 0.015 | 0.013 | 0.213 | 0.011 | 0.012 | 0.017 |
PE | LResNet100E-IR | 0.371 | 0.421 | 0.396 | 0.679 | 0.420 | 0.272 | 0.450 |
SP | YOLOv2 | 0.016 | 0.015 | 0.012 | 0.010 | 0.012 | 0.014 | 0.013 |
AP | EOT[52] | 0.013 | 0.015 | 0.011 | 0.011 | 0.012 | 0.014 | 0.013 |
PM(ours) | ArcFace-v2 | 0.912 | 0.973 | 0.902 | 0.923 | 0.988 | 0.918 | 0.972 |