Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools

Sophie Hawkes,Christian Weinert,Teresa Almeida,Maryam Mehrnezhad
DOI: https://doi.org/10.1109/MSEC.2024.3485497
2024-12-09
Abstract:We show that perceptual hashing, crucial for detecting and removing image-based sexual abuse (IBSA) online, faces vulnerabilities from low-budget inversion attacks based on generative AI. This jeopardizes the privacy of users, especially vulnerable groups. We advocate to implement secure hash matching in IBSA removal tools to mitigate potentially fatal consequences.
Cryptography and Security
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is the vulnerability to low - budget reverse attacks faced by Perceptual Hash when detecting and removing image - based sexual abuse materials (IBSA, such as child sexual abuse materials CSAM). Specifically, the research reveals that generative adversarial networks (GANs) can use consumer - level hardware to conduct reverse attacks on four mainstream Perceptual Hash functions (aHash, PDQ, NeuralHash, and PhotoDNA), thereby reconstructing the original image or its approximation. This not only endangers user privacy, especially for vulnerable groups, but may also lead to the leakage of sensitive information. ### Core Problems of the Paper 1. **Security of Perceptual Hash**: When Perceptual Hash is used to detect and remove IBSA materials, there is a risk of being reverse - attacked, especially low - budget attacks based on generative AI. 2. **User Privacy Protection**: Existing Perceptual Hash techniques cannot fully protect user privacy, especially when these hash values are obtained by malicious service providers or attackers. 3. **Need for Technological Improvement**: More secure hash - matching methods are required to prevent reverse attacks and ensure that the Perceptual Hash values submitted by users do not leak sensitive information. ### Specific Problems - **Vulnerability of Perceptual Hash**: Research shows that commonly used Perceptual Hash functions (such as aHash, PDQ, NeuralHash, and PhotoDNA) are vulnerable to reverse attacks, and attackers can reconstruct the original image from the hash values through techniques such as GAN. - **Privacy Risks**: Once the Perceptual Hash values are maliciously obtained, attackers can use these hash values to reconstruct the original sensitive images, thereby violating user privacy. - **Legal and Technological Challenges**: As more and more online platforms adopt Perceptual Hash techniques to detect and remove illegal content, how to ensure the security and privacy of these techniques has become an urgent problem to be solved. ### Suggested Solutions The paper proposes that more secure hash - matching methods should be implemented, such as protecting user privacy through cryptographic protocols such as Private Set Intersection (PSI), and proposes alternative solutions to implement privacy - protected IBSA content removal tools. ### Conclusion Although Perceptual Hash is effective in detecting and removing IBSA materials, the current design and implementation methods have security risks, especially in terms of privacy protection. Therefore, further research and development of more secure techniques are required to ensure that user privacy is not violated.