SCAPEGOAT GENERATION FOR PRIVACY PROTECTION FROM DEEPFAKE

被引:1
|
作者
Kato, Gido [1 ,2 ]
Fukuhara, Yoshihiro [1 ,2 ]
Isogawa, Mariko [1 ,2 ]
Tsunashima, Hideki [1 ,2 ]
Kataoka, Hirokatsu [2 ,3 ]
Morishima, Shigeo [4 ]
机构
[1] Waseda Univ, Tokyo, Japan
[2] Keio Univ, JST Presto, Tokyo, Japan
[3] AIST, Lausanne, Switzerland
[4] Waseda Res Inst Sci & Engn, Tokyo, Japan
来源
2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP | 2023年
关键词
Deepfake; Adversarial Examples; GAN; Privacy;
D O I
10.1109/ICIP49359.2023.10221904
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To protect privacy and prevent malicious use of deepfake, current studies propose methods that interfere with the generation process, such as detection and destruction approaches. However, these methods suffer from sub-optimal generalization performance to unseen models and add undesirable noise to the original image. To address these problems, we propose a new problem formulation for deepfake prevention: generating a "scapegoat image" by modifying the style of the original input in a way that is recognizable as an avatar by the user, but impossible to reconstruct the real face. Even in the case of malicious deepfake, the privacy of the users is still protected. To achieve this, we introduce an optimization-based editing method that utilizes GAN inversion to discourage deepfake models from generating similar scapegoats. We validate the effectiveness of our proposed method through quantitative and user studies.
引用
收藏
页码:3364 / 3368
页数:5
相关论文
共 50 条
  • [21] Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
    George, Ashok
    Sumathi, A.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1277 - 1288
  • [22] Dyadic product and crow lion algorithm based coefficient generation for privacy protection on cloud
    Ashok George
    A. Sumathi
    Cluster Computing, 2019, 22 : 1277 - 1288
  • [23] Legal Protection of Revenge and Deepfake Porn Victims in the European Union: Findings From a Comparative Legal Study
    Mania, Karolina
    TRAUMA VIOLENCE & ABUSE, 2024, 25 (01) : 117 - 129
  • [24] BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake
    Liu, Honggu
    Li, Xiaodan
    Zhou, Wenbo
    Fang, Han
    Bestagini, Paolo
    Zhang, Weiming
    Chen, Yuefeng
    Tubaro, Stefano
    Yu, Nenghai
    He, Yuan
    Xue, Hui
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 7075 - 7084
  • [25] OpenTag: Privacy Protection for RFID
    Holtzman, Henry
    Lee, Sanghoon
    Shen, Daniel
    IEEE PERVASIVE COMPUTING, 2009, 8 (02) : 71 - 77
  • [26] On Privacy Protection in Biometric Passports
    Kalman, Gyoergy
    Noll, Josef
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY: ICDS 2009, PROCEEDINGS, 2009, : 60 - 64
  • [27] Paralinguistic Privacy Protection at the Edge
    Aloufi, Ranya
    Haddadi, Hamed
    Boyle, David
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (02)
  • [28] Privacy Protection Framework for Android
    Mishra, Bharavi
    Agarwal, Aastha
    Goel, Ayush
    Ansari, Aman Ahmad
    Gaur, Pramod
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2022, 10 : 7973 - 7988
  • [29] Data protection: The future of privacy
    Wong, Rebecca
    COMPUTER LAW & SECURITY REVIEW, 2011, 27 (01) : 53 - 57
  • [30] Privacy Protection of Fingerprint Database
    Li, Sheng
    Kot, Alex C.
    IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 115 - 118