Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks

被引:1
|
作者
Pan, Zhenxiong [1 ,2 ]
Sun, Junmei [1 ]
Li, Xiumei [1 ,2 ]
Zhang, Xin [1 ]
Bai, Huang [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou 311121, Peoples R China
[2] Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I | 2023年 / 14086卷
关键词
Adversarial examples; Face verification; Privacy protection; JPEG compression; RECOGNITION;
D O I
10.1007/978-981-99-4755-3_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The face image de-identification method commonly used to protect personal privacy on social networks faces the problem of not being able to assure the usability of image sharing. Although the privacy protection method based on adversarial examples meets this requirement, there are still potential hidden problems of information leakage and the compression processing of images by social networks will weaken the privacy protection effect. In this paper, we propose a collaborative privacy protection method based on adversarial examples for photo sharing services on social networks, called CSP3Adv(Collaborative Social Platform Privacy Protection Adversarial Example). We use the perturbation transfer module, which avoids the information leakage caused by accessing to the original image. Moreover, we use the frequency restriction module to guarantees the privacy of users' face images after social network compression. The experimental results show that CSP3Adv achieves better privacy protection for various face recognition models and commercial API interfaces on different datasets.
引用
收藏
页码:499 / 510
页数:12
相关论文
共 50 条
  • [1] Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples
    Li, Ming
    Yang, Zhaoli
    Wang, Tao
    Zhang, Yushu
    Wen, Wenying
    IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34 (12) : 13401 - 13412
  • [2] Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images
    Li, Ming
    Wang, Si
    SIGNAL PROCESSING, 2025, 230
  • [3] A novel privacy protection method based on node segmentation for social networks
    Wang, Zhongli
    Ju, Aiyun
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2022, 28 (04) : 459 - 475
  • [4] Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
    Zhang, Jiawei
    Wang, Jinwei
    Wang, Hao
    Luo, Xiangyang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (02) : 562 - 574
  • [5] Privacy Protection Method for Sensitive Weighted Edges in Social Networks
    Gong, Weihua
    Jin, Rong
    Li, Yanjun
    Yang, Lianghuai
    Mei, Jianping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (02): : 540 - 557
  • [6] Towards A Guided Perturbation for Privacy Protection through Detecting Adversarial Examples with Provable Accuracy and Precision
    Lin, Ying
    Qu, Yanzhen
    Zhang, Zhiyuan
    Su, Haorong
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 107 - 112
  • [7] Generative Adversarial Network Based Image Privacy Protection Algorithm
    He, Yuwen
    Zhang, Chunhong
    Zhu, Xinning
    Ji, Yang
    TENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2018), 2019, 11069
  • [8] A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks
    Niu, Shufen
    Ge, Peng
    Mi, Song
    Su, Yun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 847 - 855
  • [9] A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism
    Yang, Xirui
    Zhang, Chen
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (03): : 3781 - 3804
  • [10] View-based collaborative business process modeling method for privacy protection
    Xiang J.
    Mo Q.
    Xie Z.
    Wang Y.
    Wang J.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3187 - 3201