Facial RECognition Prevention

F-REC

Scheduled

BE-LUX Cooperation

January 2025 December 2027

36 months

Thibault Debatty

Beyond the national defense, the army is the mirror image of the country, its defense, and as such, professionalism, credibility, and reputation are of utmost importance. A public show of force are official ceremonies, parades, and the celebration of the national day, and many other events. These appearances symbolize the nation’s strength, resilience, and commitment to its values.

During public events such as parades and ceremonies, army members are often photographed. The photos are then published in newspapers, magazines, and on social media. Although this practice is good for publicity, it creates a risk for the members of the army and the army’s activities in general.

How members of the army personnel can be identified? Military members can be present on social media platforms (with their own private profile or through profiles of family members or friends). With new advances in artificial intelligence, an adversary could identify a large number of military personnel in an automated fashion. An adversary could take official pictures of army members that are publicly shared and match them with social media profiles to retrieve additional information (e.g., name, address, friends, and family details).

If malicious actors retrieve such private information, the army personnel can face several apparent risks, such as:

  1. Personal Security Risks: Military members and their families are vulnerable to targeted threats, harassment, blackmailing, or even physical harm from malicious actors;
  2. Cybersecurity Threats: Spear phishing, social engineering, and other cyberattacks may be directed at individuals through their social media profiles
  3. Influence Operations: Adversarial nations or groups may attempt to influence or manipulate military members through social media, spreading misinformation, propaganda, or extremist ideologies.

The primary objective of this project is to devise new adversarial AI methods to make the facial recognition of members of the army more difficult. To that end, the following research directions will be explored:

  • Apparel accessories recommendation to fool AI-based models: a first direction to explore is to propose and assess the impact of using accessories such as scarves, glasses, caps, or makeup to make the use of AI facial recognition techniques harder.
  • Automated alert system via AI-based monitoring of social media: A second direction to explore is to provide advice and recommendations to the army and its members regarding their presence on social media. The goal is to develop an automated inspection tool for social media to detect pictures that could allow the identification of the members of the army.
  • Invisible “blurring” of pictures: A third research direction is more exploratory. The goal is to develop a tool that could be shared with army members (and their families) for systematically post-processing their private photos before sharing them online. The idea of the post-processing is to modify (e.g. a sort of “blurring”) them in a way that makes automated face recognition with AI very challenging.
Run your own local LLM with Ollama

AI

Ollama is an innovative tool designed to simplify the way you work with AI models on your local machine. Much like Docker revolutionized containerized applications, Ollama provides a seamless experience for downloading, managing, and running pre-trained AI models.

Read
Run a local instance of Stable Diffusion and use AI to generate images

AI

Next to ChatGPT, the apparition of image generation AI was a real breakthrough. These algorithms are able to create stunning and detailed images from textual descriptions. In this field, Stable Diffusion stands out by the quality of the images, but also by its open and accessible nature. Unlike many proprietary AI tools, Stable Diffusion makes its source code and models freely available.

Read
CYLAB at the ARES conference 2024

AI Cyber Situation Awareness Conference

Members of the Cyber Defence Lab attended this year’s edition of the “International Conference on Availability, Reliability and Security ARES 2024” that was held in Vienna, Austria. They presented two papers in the field of AI and Cyber Situation Awareness.

Read
AI powered knowledge exploration with Globe Explorer

AI Teaching

Next to the very popular ChatGPT, a lot of other AI powered applications have sparked on the web recently. Globe Explorer https://explorer.globe.engineer/ is one of these, specially developed to explore knowledge and discover new domains.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept