Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks

被引:1
|
作者
Pan, Zhenxiong [1 ,2 ]
Sun, Junmei [1 ]
Li, Xiumei [1 ,2 ]
Zhang, Xin [1 ]
Bai, Huang [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou 311121, Peoples R China
[2] Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I | 2023年 / 14086卷
关键词
Adversarial examples; Face verification; Privacy protection; JPEG compression; RECOGNITION;
D O I
10.1007/978-981-99-4755-3_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The face image de-identification method commonly used to protect personal privacy on social networks faces the problem of not being able to assure the usability of image sharing. Although the privacy protection method based on adversarial examples meets this requirement, there are still potential hidden problems of information leakage and the compression processing of images by social networks will weaken the privacy protection effect. In this paper, we propose a collaborative privacy protection method based on adversarial examples for photo sharing services on social networks, called CSP3Adv(Collaborative Social Platform Privacy Protection Adversarial Example). We use the perturbation transfer module, which avoids the information leakage caused by accessing to the original image. Moreover, we use the frequency restriction module to guarantees the privacy of users' face images after social network compression. The experimental results show that CSP3Adv achieves better privacy protection for various face recognition models and commercial API interfaces on different datasets.
引用
收藏
页码:499 / 510
页数:12
相关论文
共 50 条
  • [41] Frequency domain-based reversible adversarial attacks for privacy protection in Internet of Things
    Lu, Yang
    Ma, Tianfeng
    Pang, Zilong
    Chai, Xiuli
    Chen, Zhen
    Tang, Zongwei
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (04)
  • [42] Iris Deidentification With High Visual Realism for Privacy Protection on Websites and Social Networks
    Barni, Mauro
    Labati, Ruggero Donida
    Genovese, Angelo
    Piuri, Vincenzo
    Scotti, Fabio
    IEEE ACCESS, 2021, 9 : 131995 - 132010
  • [43] Learning Effective Feature Representation against User Privacy Protection on Social Networks
    Li, Cheng-Te
    Zeng, Zi-Yun
    APPLIED SCIENCES-BASEL, 2020, 10 (14):
  • [44] Transferable face image privacy protection based on federated learning and ensemble models
    Jingjing Yang
    Jiaxing Liu
    Runkai Han
    Jinzhao Wu
    Complex & Intelligent Systems, 2021, 7 : 2299 - 2315
  • [45] Transferable face image privacy protection based on federated learning and ensemble models
    Yang, Jingjing
    Liu, Jiaxing
    Han, Runkai
    Wu, Jinzhao
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2299 - 2315
  • [46] MultiPAD: A Multivariant Partition-Based Method for Audio Adversarial Examples Detection
    Guo, Qingli
    Ye, Jing
    Hu, Yu
    Zhang, Guohe
    Li, Xiaowei
    Li, Huawei
    IEEE ACCESS, 2020, 8 (08): : 63368 - 63380
  • [47] Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples
    Asadi, Behzad
    Varadharajan, Vijay
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 793 - 801
  • [48] Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings
    YU Tingyue
    WANG Shen
    ZHANG Chunrui
    WANG Zhenbang
    LI Yetian
    YU Xiangzhan
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (05) : 866 - 875
  • [49] A PAYMENT MECHANISM WITH MULTI-AUTHORITY AND PRIVACY PROTECTION IN MOBILE SOCIAL NETWORKS
    Yang, Xiaodong
    Yang, Miaomiao
    An, Faying
    Leng, Qi
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 258 - 262
  • [50] ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints
    Xue, Mingfu
    Sun, Shichang
    He, Can
    Gu, Dujuan
    Zhang, Yushu
    Wang, Jian
    Liu, Weiqiang
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2023, 17 (3-4) : 111 - 126