Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks

被引:1
|
作者
Pan, Zhenxiong [1 ,2 ]
Sun, Junmei [1 ]
Li, Xiumei [1 ,2 ]
Zhang, Xin [1 ]
Bai, Huang [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou 311121, Peoples R China
[2] Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I | 2023年 / 14086卷
关键词
Adversarial examples; Face verification; Privacy protection; JPEG compression; RECOGNITION;
D O I
10.1007/978-981-99-4755-3_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The face image de-identification method commonly used to protect personal privacy on social networks faces the problem of not being able to assure the usability of image sharing. Although the privacy protection method based on adversarial examples meets this requirement, there are still potential hidden problems of information leakage and the compression processing of images by social networks will weaken the privacy protection effect. In this paper, we propose a collaborative privacy protection method based on adversarial examples for photo sharing services on social networks, called CSP3Adv(Collaborative Social Platform Privacy Protection Adversarial Example). We use the perturbation transfer module, which avoids the information leakage caused by accessing to the original image. Moreover, we use the frequency restriction module to guarantees the privacy of users' face images after social network compression. The experimental results show that CSP3Adv achieves better privacy protection for various face recognition models and commercial API interfaces on different datasets.
引用
收藏
页码:499 / 510
页数:12
相关论文
共 50 条
  • [31] Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
    Mohammadi, A.
    Hamidi, H.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2018, 31 (08): : 1267 - 1273
  • [32] EnsembleFool: A method to generate adversarial examples based on model fusion strategy
    Peng, Wenyu
    Liu, Renyang
    Wang, Ruxin
    Cheng, Taining
    Wu, Zifeng
    Cai, Li
    Zhou, Wei
    COMPUTERS & SECURITY, 2021, 107
  • [33] A method for filtering the attack pairs of adversarial examples based on attack distance
    Liu H.
    Fang Y.
    Wen W.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 339 - 347
  • [34] Adversarial Examples Generation Method Based on Texture and Perceptual Color Distance
    Xu M.
    Jiang B.-C.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2021, 50 (04): : 558 - 564
  • [35] Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks
    Li, Mianjie
    Liu, Yuan
    Tian, Zhihong
    Shan, Chun
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (03): : 1462 - 1471
  • [36] Location privacy protection method based on attribute-based privacy information retrieval
    Du G.
    Zhang L.
    Ma C.
    Zhang G.
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (05): : 680 - 686
  • [37] Counter Deanonymization Query: H -index Based k-Anonymization Privacy Protection for Social Networks
    Gao, Jianliang
    Song, Bo
    Chen, Zheng
    Ke, Weimao
    Ding, Wanying
    Hu, Xiaohua
    SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 809 - 812
  • [38] Location privacy protection method based on random mesh
    Yang S.
    Wang H.
    Ma C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2018, 40 (02): : 422 - 426
  • [39] Differential Privacy Data Protection Method Based on Clustering
    Li Li-xin
    Ding Yong-shan
    Wang Jia-yan
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 11 - 16
  • [40] Trust based privacy protection method in pervasive computing
    Gao, Feng
    He, Jingsha
    Ma, Shunan
    Journal of Networks, 2012, 7 (02) : 322 - 328