OPOM: Customized Invisible Cloak towards Face Privacy Protection
- URL: http://arxiv.org/abs/2205.11981v1
- Date: Tue, 24 May 2022 11:29:37 GMT
- Title: OPOM: Customized Invisible Cloak towards Face Privacy Protection
- Authors: Yaoyao Zhong and Weihong Deng
- Abstract summary: We investigate the face privacy protection from a technology standpoint based on a new type of customized cloak.
We propose a new method, named one person one mask (OPOM), to generate person-specific (class-wise) universal masks.
The effectiveness of the proposed method is evaluated on both common and celebrity datasets.
- Score: 58.07786010689529
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: While convenient in daily life, face recognition technologies also raise
privacy concerns for regular users on the social media since they could be used
to analyze face images and videos, efficiently and surreptitiously without any
security restrictions. In this paper, we investigate the face privacy
protection from a technology standpoint based on a new type of customized
cloak, which can be applied to all the images of a regular user, to prevent
malicious face recognition systems from uncovering their identity.
Specifically, we propose a new method, named one person one mask (OPOM), to
generate person-specific (class-wise) universal masks by optimizing each
training sample in the direction away from the feature subspace of the source
identity. To make full use of the limited training images, we investigate
several modeling methods, including affine hulls, class centers, and convex
hulls, to obtain a better description of the feature subspace of source
identities. The effectiveness of the proposed method is evaluated on both
common and celebrity datasets against black-box face recognition models with
different loss functions and network architectures. In addition, we discuss the
advantages and potential problems of the proposed method. In particular, we
conduct an application study on the privacy protection of a video dataset,
Sherlock, to demonstrate the potential practical usage of the proposed method.
Datasets and code are available at https://github.com/zhongyy/OPOM.
Related papers
- ID-Cloak: Crafting Identity-Specific Cloaks Against Personalized Text-to-Image Generation [54.14901999875917]
We investigate the creation of identity-specific cloaks that safeguard all images belong to a specific identity.
We craft identity-specific cloaks with the proposed novel objective that encourages the cloak to guide the model away from its normal output.
Our method, along with the proposed identity-specific cloak setting, marks a notable advance in realistic privacy protection.
arXiv Detail & Related papers (2025-02-12T03:52:36Z) - Activity Recognition on Avatar-Anonymized Datasets with Masked Differential Privacy [64.32494202656801]
Privacy-preserving computer vision is an important emerging problem in machine learning and artificial intelligence.
We present anonymization pipeline that replaces sensitive human subjects in video datasets with synthetic avatars within context.
We also proposeMaskDP to protect non-anonymized but privacy sensitive background information.
arXiv Detail & Related papers (2024-10-22T15:22:53Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Diff-Privacy: Diffusion-based Face Privacy Protection [58.1021066224765]
In this paper, we propose a novel face privacy protection method based on diffusion models, dubbed Diff-Privacy.
Specifically, we train our proposed multi-scale image inversion module (MSI) to obtain a set of SDM format conditional embeddings of the original image.
Based on the conditional embeddings, we design corresponding embedding scheduling strategies and construct different energy functions during the denoising process to achieve anonymization and visual identity information hiding.
arXiv Detail & Related papers (2023-09-11T09:26:07Z) - CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via
Adversarial Latent Search [10.16904417057085]
Deep learning based face recognition systems can enable unauthorized tracking of users in the digital world.
Existing methods for enhancing privacy fail to generate naturalistic images that can protect facial privacy without compromising user experience.
We propose a novel two-step approach for facial privacy protection that relies on finding adversarial latent codes in the low-dimensional manifold of a pretrained generative model.
arXiv Detail & Related papers (2023-06-16T17:58:15Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.