SCAPEGOAT GENERATION FOR PRIVACY PROTECTION FROM DEEPFAKE

被引:1
|
作者
Kato, Gido [1 ,2 ]
Fukuhara, Yoshihiro [1 ,2 ]
Isogawa, Mariko [1 ,2 ]
Tsunashima, Hideki [1 ,2 ]
Kataoka, Hirokatsu [2 ,3 ]
Morishima, Shigeo [4 ]
机构
[1] Waseda Univ, Tokyo, Japan
[2] Keio Univ, JST Presto, Tokyo, Japan
[3] AIST, Lausanne, Switzerland
[4] Waseda Res Inst Sci & Engn, Tokyo, Japan
来源
2023 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP | 2023年
关键词
Deepfake; Adversarial Examples; GAN; Privacy;
D O I
10.1109/ICIP49359.2023.10221904
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To protect privacy and prevent malicious use of deepfake, current studies propose methods that interfere with the generation process, such as detection and destruction approaches. However, these methods suffer from sub-optimal generalization performance to unseen models and add undesirable noise to the original image. To address these problems, we propose a new problem formulation for deepfake prevention: generating a "scapegoat image" by modifying the style of the original input in a way that is recognizable as an avatar by the user, but impossible to reconstruct the real face. Even in the case of malicious deepfake, the privacy of the users is still protected. To achieve this, we introduce an optimization-based editing method that utilizes GAN inversion to discourage deepfake models from generating similar scapegoats. We validate the effectiveness of our proposed method through quantitative and user studies.
引用
收藏
页码:3364 / 3368
页数:5
相关论文
共 50 条
  • [41] Privacy Cost Analysis and Privacy Protection Based on Big Data
    周蔷
    岳开旭
    段垚
    JournalofDonghuaUniversity(EnglishEdition), 2019, 36 (01) : 96 - 105
  • [42] User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
    Isaak, Jim
    Hanna, Mina J.
    COMPUTER, 2018, 51 (08) : 56 - 59
  • [43] Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing
    Zhang, Qiong
    Wang, Taochun
    Tao, Yuan
    Chen, Fulong
    Xie, Dong
    Zhao, Chuanxin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4423 - 4435
  • [44] Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection
    Chen, Chin-Ling
    Deng, Yong-Yuan
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2009, 22 (08) : 1284 - 1291
  • [45] Biometric Privacy Protection: Guidelines and Technologies
    Labati, Rugger Donida
    Piuri, Vincenzo
    Scotti, Fabio
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 3 - 19
  • [46] Privacy protection for public directory services
    Berger, A
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (16-18): : 1521 - 1529
  • [47] Privacy Protection through Pseudonymisation in eHealth
    De Meyer, F.
    De Moor, G.
    Reed-Fourquet, L.
    COLLABORATIVE PATIENT CENTRED EHEALTH, 2008, 141 : 111 - +
  • [48] A Privacy Protection Layer for Wearable Devices
    Mohzary, Muhammad
    Tadisetty, Srikanth
    Ghazinour, Kambiz
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 363 - 370
  • [49] Legal Protection of Employee Privacy in the Workplace
    Yaroshenko, Oleg M.
    Vitvitskyi, Sergey S.
    Nesterovych, Oleksii S.
    Sereda, Olena H.
    Yakovlyev, Oleksandr A.
    JOURNAL OF LEGAL AFFAIRS AND DISPUTE RESOLUTION IN ENGINEERING AND CONSTRUCTION, 2025, 17 (02)
  • [50] FACE RECOGNITION WITH ENHANCED PRIVACY PROTECTION
    Wang, Yongjin
    Hatzinakos, Dimitrios
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 885 - 888