SCAPEGOAT GENERATION FOR PRIVACY PROTECTION FROM DEEPFAKE

被引:1
|
作者
Kato, Gido [1 ,2 ]
Fukuhara, Yoshihiro [1 ,2 ]
Isogawa, Mariko [1 ,2 ]
Tsunashima, Hideki [1 ,2 ]
Kataoka, Hirokatsu [2 ,3 ]
Morishima, Shigeo [4 ]
机构
[1] Waseda Univ, Tokyo, Japan
[2] Keio Univ, JST Presto, Tokyo, Japan
[3] AIST, Lausanne, Switzerland
[4] Waseda Res Inst Sci & Engn, Tokyo, Japan
来源
2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP | 2023年
关键词
Deepfake; Adversarial Examples; GAN; Privacy;
D O I
10.1109/ICIP49359.2023.10221904
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To protect privacy and prevent malicious use of deepfake, current studies propose methods that interfere with the generation process, such as detection and destruction approaches. However, these methods suffer from sub-optimal generalization performance to unseen models and add undesirable noise to the original image. To address these problems, we propose a new problem formulation for deepfake prevention: generating a "scapegoat image" by modifying the style of the original input in a way that is recognizable as an avatar by the user, but impossible to reconstruct the real face. Even in the case of malicious deepfake, the privacy of the users is still protected. To achieve this, we introduce an optimization-based editing method that utilizes GAN inversion to discourage deepfake models from generating similar scapegoats. We validate the effectiveness of our proposed method through quantitative and user studies.
引用
收藏
页码:3364 / 3368
页数:5
相关论文
共 50 条
  • [31] Protection Goals for Privacy Engineering
    Hansen, Marit
    Jensen, Meiko
    Rost, Martin
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 159 - 166
  • [32] Next generation privacy
    Omotubora, Adekemi
    Basu, Subhajit
    INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2020, 29 (02) : 151 - 173
  • [33] A Solution For Privacy Protection In MapReduce
    Quang Tran
    Sato, Hiroyuki
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 515 - 520
  • [34] Secure Estimation With Privacy Protection
    Liang, Shi
    Lam, James
    Lin, Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (08) : 4947 - 4961
  • [35] Fingerprint Combination for Privacy Protection
    Li, Sheng
    Kot, Alex C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 350 - 360
  • [36] Protection of Big Data Privacy
    Mehmood, Abid
    Natgunanathan, Iynkaran
    Xiang, Yong
    Hua, Guang
    Guo, Song
    IEEE ACCESS, 2016, 4 : 1821 - 1834
  • [37] PRIVACY PROTECTION FOR USER AUTHENTICATION
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 90 - 93
  • [38] Privacy protection for HealthGrid applications
    Claerhout, B
    De Moor, GJE
    METHODS OF INFORMATION IN MEDICINE, 2005, 44 (02) : 140 - 143
  • [39] Children and Online Privacy Protection: Empowerment from Cognitive Defense Strategies
    Andrews, J. Craig
    Walker, Kristen L.
    Kees, Jeremy
    JOURNAL OF PUBLIC POLICY & MARKETING, 2020, 39 (02) : 205 - 219
  • [40] THE PRIVACY PROTECTION OF THE SICK EMPLOYEE: THE DUTCH CASE FROM A COMPARATIVE PERSPECTIVE
    van der Helm, Ivo
    EUROPEAN JOURNAL OF SOCIAL SECURITY, 2013, 15 (03) : 273 - 296