Development of a Privacy-Preserving UAV System With Deep Learning-Based Face Anonymization

被引:15
作者
Lee, Harim [1 ]
Kim, Myeung Un [2 ]
Kim, Yeongjun [3 ]
Lyu, Hyeonsu [4 ]
Yang, Hyun Jong [4 ]
机构
[1] Kumoh Natl Inst Technol, Sch Elect Engn, Gumi 39177, Gyungbuk, South Korea
[2] Korea Aerosp Res Inst KARI, Daejoen 34133, South Korea
[3] Ulsan Natl Inst Sci & Technol UNIST, Dept Elect Engn, Ulsan 44919, South Korea
[4] Pohang Univ Sci & Technol POSTECH, Dept Elect Engn, Pohang 37673, South Korea
关键词
Face recognition; Faces; Videos; Training; Privacy; Unmanned aerial vehicles; Semantics; Privacy infringement; privacy-preserving vision; deep learning; security robot; UAV patrol system;
D O I
10.1109/ACCESS.2021.3113186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we develop a privacy-preserving UAV system that does not infringe on the privacy of people in the videos taken by UAVs. Instead of blurring or masking the face parts of the videos, we want to exquisitely modify only the face parts so that the people in the modified videos still look like humans, but they become anonymous. Doing so, the semantic information of the videos can be preserved even with the anonymization. Specifically, based on the latest generative adversarial network architecture, we propose a deep learning-based face-anonymization scheme so that each modified face part looks like the face of a person who does not actually exist. The trained face-anonymizer is then mounted on the UAV system we have implemented. Through experiments, we confirm that the developed privacy-preserving UAV system anonymizes UAV's first-person videos so that the people in the video are not recognized as anyone in the dataset used. In addition, we show that even with such anonymized videos, the perception performance required for performing UAV's essential functions such as simultaneous localization and mapping is not degraded.
引用
收藏
页码:132652 / 132662
页数:11
相关论文
共 36 条
[1]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[2]   Live Face De-Identification in Video [J].
Gafni, Oran ;
Wolf, Lior ;
Taigman, Yaniv .
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, :9377-9386
[3]   A Survey on Differentially Private Machine Learning [Review Article] [J].
Gong, Maoguo ;
Xie, Yu ;
Pan, Ke ;
Feng, Kaiyuan ;
Qin, A. K. .
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2020, 15 (02) :49-88
[4]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[5]   Multimodal Unsupervised Image-to-Image Translation [J].
Huang, Xun ;
Liu, Ming-Yu ;
Belongie, Serge ;
Kautz, Jan .
COMPUTER VISION - ECCV 2018, PT III, 2018, 11207 :179-196
[6]   Image-to-Image Translation with Conditional Adversarial Networks [J].
Isola, Phillip ;
Zhu, Jun-Yan ;
Zhou, Tinghui ;
Efros, Alexei A. .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :5967-5976
[7]   Perceptual Losses for Real-Time Style Transfer and Super-Resolution [J].
Johnson, Justin ;
Alahi, Alexandre ;
Li Fei-Fei .
COMPUTER VISION - ECCV 2016, PT II, 2016, 9906 :694-711
[8]  
Juefei-Xu Felix, 2021, ARXIV210300218
[9]  
Karacan L., 2016, Learning to generate images of outdoor scenes from attributes and semantic layouts. arXiv preprint arXiv:1612.00215
[10]  
Karacan Levent, 2018, ARXIV180807413