You can buy thousands of photos for 2 yuan. How is the face information leaked?

  "Swipe your face" to pay when shopping, "swipe your face" to unlock when you use your mobile phone, and "swipe your face" to open the door when you enter the community... Nowadays, more and more things can be "swiped" and solved with facial recognition technology.

  A report released recently showed that more than 90% of the respondents have used face recognition, but 60% of the respondents believe that face recognition technology has a tendency to abuse, and 30% of the respondents said that they have been Facial information leakage, abuse and loss of privacy or property.

So in the era of "face-sweeping", is our face information safe?

The suspect "AI changes face"

Cheat to commit crimes by face recognition

  For face recognition, most people love and hate it. What they love is its convenience and speed, and what they hate is security risks.

In the two cases of embezzlement of citizens’ personal information uncovered by the police this year, it is worth noting that the suspects used “AI face-changing technology” to illegally obtain citizen photos for certain preprocessing, and then generate dynamics through “photo activation” software. The video deceived the face verification mechanism and was able to commit a crime.

  Can the mask replace the face to unlock the phone?

In the test, the researchers put a mask on the opposite side of the mobile phone, and then adjusted the light, color temperature and angle.

After several comparisons, the phone was successfully unlocked.

  Experts said that the cost of making this mask is not high, and 3D printing technology can produce a face mask or headgear with acceptable accuracy.

As long as it is not in a very dark or very bright background, the success rate of face recognition through a mask or headgear is as high as 30%.

  Experts said that the simplest face recognition at present can be realized by collecting and extracting 6 or 8 feature points on the face.

However, complex face recognition requires collecting and extracting dozens or even hundreds of feature points on the face.

Compared with unlocking the mobile phone, "swiping face" payment, "swiping face" entering the community and other applications, more facial feature points are collected, and the security is naturally higher.

  In addition, a biometric-specific live detection technology has been developed, which can effectively identify the vital signs of the scanned object, greatly reducing the risk of the recognition system using photos or masks as faces.

  The investigation found that on some online trading platforms, you can buy thousands of face photos for only 2 yuan, and more than 5,000 face photos are priced at less than 10 yuan.

  The material library of the business is full of personal life photos, selfies and other photos full of personal privacy.

When the reporter asked the customer service whether these pictures involved copyright, the customer service denied it, but could not provide any materials that could prove the copyright of the photos.

  If these face photos containing personal information fall into the hands of criminals, the owner of the photo may not only encounter precision fraud and suffer property losses, but also may be used for money laundering, criminal gangs and other illegal crimes due to their own face information. Activities while being involved in criminal proceedings.

  In the opinion of experts, the current risk of face recognition technology is more concentrated in the storage link.

Due to the variety of face recognition applications and there is no uniform industry standard, a large amount of face data is stored in the centralized database of each application operator or technology provider.

  The outside world knows whether the data is desensitized, whether security is in place, which is used for algorithm training, and which will be shared by partners.

Moreover, once the server is compromised, highly sensitive facial data will be exposed to the risk of leakage.

Request for comments on the draft personal information protection law

Face information protection is more standardized

  In order to plug this loophole, experts proposed a variety of technical improvements, and further pointed out that face data storage should establish more stringent standards and specifications, and technology developers and APP operators should implement more stringent supervision, laws, and industry specifications. Collect, use, and store data.

  In response to the abuse, misappropriation, and random collection of facial information, legal experts pointed out that the "Network Security Law" clearly includes personal biometric information in the scope of personal information.

my country’s "Civil Code" stipulates that the collection and processing of personal information of a natural person shall follow the principles of lawfulness, fairness, and necessity, obtain the consent of the natural person or his guardian, and the person who has adopted it shall have the right to withdraw it.

  At present, the "Personal Information Protection Law of the People's Republic of China (Draft)" is seeking public opinions from the public.

The draft proposes that the installation of image collection and personal identification equipment in public places should be necessary to maintain public safety, comply with relevant state regulations, and set up prominent reminders.

The collected personal images and personal identification information can only be used for the purpose of maintaining public security, and shall not be disclosed or provided to others; unless the individual consent is obtained or the laws and administrative regulations provide otherwise.

According to CCTV News