Face image de-identification based on feature embedding

被引:0
作者
Hanawa, Goki [1 ]
Ito, Koichi [1 ]
Aoki, Takafumi [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, 6-6-05,Aramaki Aza Aoba,Aoba ku, Sendai, Miyagi 9808579, Japan
基金
日本学术振兴会;
关键词
De-identification; Face recognition; Biometrics; Privacy protection; PRIVACY;
D O I
10.1186/s13640-024-00646-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A large number of images are available on the Internet with the growth of social networking services, and many of them are face photos or contain faces. It is necessary to protect the privacy of face images to prevent their malicious use by face image de-identification techniques that make face recognition difficult, which prevent the collection of specific face images using face recognition. In this paper, we propose a face image de-identification method that generates a de-identified image from an input face image by embedding facial features extracted from that of another person into the input face image. We develop the novel framework for embedding facial features into a face image and loss functions based on images and features to de-identify a face image preserving its appearance. Through a set of experiments using public face image datasets, we demonstrate that the proposed method exhibits higher de-identification performance against unknown face recognition models than conventional methods while preserving the appearance of the input face images.
引用
收藏
页数:24
相关论文
共 44 条
[31]   De-identification for privacy protection in multimedia content: A survey [J].
Ribaric, Slobodan ;
Ariyaeeinia, Aladdin ;
Pavesic, Nikola .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 47 :131-151
[32]   U-Net: Convolutional Networks for Biomedical Image Segmentation [J].
Ronneberger, Olaf ;
Fischer, Philipp ;
Brox, Thomas .
MEDICAL IMAGE COMPUTING AND COMPUTER-ASSISTED INTERVENTION, PT III, 2015, 9351 :234-241
[33]  
Schroff F, 2015, PROC CVPR IEEE, P815, DOI 10.1109/CVPR.2015.7298682
[34]  
Shan S, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1589
[35]  
Simonyan K, 2015, Arxiv, DOI [arXiv:1409.1556, DOI 10.48550/ARXIV.1409.1556, 10.3390/s21082852]
[36]  
Szegedy C, 2017, AAAI CONF ARTIF INTE, P4278
[37]   DeDiM: De-identification using a diffusion model [J].
Uchida, Hidetsugu ;
Abe, Narishige ;
Yamada, Shigefumi .
PROCEEDINGS OF THE 21ST 2022 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2022), 2022, P-329
[38]   CosFace: Large Margin Cosine Loss for Deep Face Recognition [J].
Wang, Hao ;
Wang, Yitong ;
Zhou, Zheng ;
Ji, Xing ;
Gong, Dihong ;
Zhou, Jingchao ;
Li, Zhifeng ;
Liu, Wei .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :5265-5274
[39]   Image quality assessment: From error visibility to structural similarity [J].
Wang, Z ;
Bovik, AC ;
Sheikh, HR ;
Simoncelli, EP .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (04) :600-612
[40]   KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting [J].
Xu, Weitao ;
Lan, Guohao ;
Lin, Qi ;
Khalifa, Sara ;
Bergmann, Neil ;
Hassan, Mahbub ;
Hu, Wen .
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,