Efficient Video Privacy Protection Against Malicious Face Recognition Models

被引:2
作者
Guo, Enting [1 ]
Li, Peng [1 ]
Yu, Shui [2 ]
Wang, Hao [3 ]
机构
[1] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu 9658580, Japan
[2] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[3] Norwegian Univ Sci & Technol, Dept Comp Sci, N-7034 Trondheim, Norway
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2022年 / 3卷
关键词
Computation reuse; deep learning; video privacy;
D O I
10.1109/OJCS.2022.3218559
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of powerful facial recognition systems poses a serious threat to user privacy. Attackers could train highly accurate facial recognition models using public data on social platforms. Therefore, recent works have proposed image pre-processing techniques to protect user privacy. Without affecting people's normal viewing, these techniques add special noises into images, so that it would be difficult for attackers to train models with high accuracy. However, existing protection techniques are mainly designed for image data protection, and they cannot be directly applied for video data because of high computational overhead. In this paper, we propose an efficient protection method for video privacy that exploits unique features of video protection to eliminate computation redundancy for computational acceleration. The evaluation results under various benchmarks demonstrate that our method significantly outperforms the traditional methods by reducing computation overhead by 35.5%.
引用
收藏
页码:271 / 280
页数:10
相关论文
共 38 条
  • [1] Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
  • [2] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [3] MIRIS: Fast Object Track Queries in Video
    Bastani, Favyen
    He, Songtao
    Balasingam, Arjun
    Gopalakrishnan, Karthik
    Alizadeh, Mohammad
    Balakrishnan, Hari
    Cafarella, Michael
    Kraska, Tim
    Madden, Sam
    [J]. SIGMOD'20: PROCEEDINGS OF THE 2020 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2020, : 1907 - 1921
  • [4] Learning Complexity-Aware Cascades for Deep Pedestrian Detection
    Cai, Zhaowei
    Saberian, Mohammad
    Vasconcelos, Nuno
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, : 3361 - 3369
  • [5] Cangialosi F, 2022, PROCEEDINGS OF THE 19TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '22), P209
  • [6] Carlini N., 2017, P 10 ACM WORKSH ART, P3
  • [7] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [8] Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
  • [9] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
  • [10] Fan Mo, 2020, MobiSys '20: Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services, P161, DOI 10.1145/3386901.3388946