attack 2026

FaceLinkGen: Rethinking Identity Leakage in Privacy-Preserving Face Recognition with Identity Extraction

Wenqi Guo 1,2, Shan Du 1

0 citations · 49 references · arXiv (Cornell University)

α

Published on arXiv

2602.02914

Model Inversion Attack

OWASP ML Top 10 — ML03

Key Finding

FaceLinkGen achieves over 98.5% identity matching accuracy and above 96% face regeneration success against three recent PPFR systems, and retains above 92% matching and 94% regeneration in a near-zero-knowledge setting.

FaceLinkGen

Novel technique introduced


Transformation-based privacy-preserving face recognition (PPFR) aims to verify identities while hiding facial data from attackers and malicious service providers. Existing evaluations mostly treat privacy as resistance to pixel-level reconstruction, measured by PSNR and SSIM. We show that this reconstruction-centric view fails. We present FaceLinkGen, an identity extraction attack that performs linkage/matching and face regeneration directly from protected templates without recovering original pixels. On three recent PPFR systems, FaceLinkGen reaches over 98.5\% matching accuracy and above 96\% regeneration success, and still exceeds 92\% matching and 94\% regeneration in a near zero knowledge setting. These results expose a structural gap between pixel distortion metrics, which are widely used in PPFR evaluation, and real privacy. We show that visual obfuscation leaves identity information broadly exposed to both external intruders and untrusted service providers.


Key Contributions

  • FaceLinkGen attack that extracts usable identity embeddings from protected face templates without pixel-level reconstruction, enabling both identity linkage (>98.5% matching accuracy) and face regeneration (>96% success) against three PPFR systems.
  • Demonstration that PSNR/SSIM pixel-distortion metrics fundamentally misalign with real privacy risk, as visual obfuscation does not prevent identity-level leakage.
  • Near-zero-knowledge attack variant that still achieves >92% matching and >94% regeneration success without knowledge of the PPFR conversion process.

🛡️ Threat Analysis

Model Inversion Attack

FaceLinkGen extracts usable face identity embeddings from supposedly protected face templates (embedding inversion), then uses those to regenerate realistic identity-consistent faces (data reconstruction) — an adversary is actively recovering private biometric information from the outputs of a privacy-preserving transformation system, matching ML03's embedding inversion and training-data-reconstruction sub-cases.


Details

Domains
vision
Model Types
cnngenerative
Threat Tags
black_boxgrey_boxinference_time
Datasets
Face++Amazon Rekognition API
Applications
privacy-preserving face recognitionbiometric authentication