Skip to main content

A Cluster-Based Facial Image Anonymization Method Using Variational Autoencoder

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1796))

Included in the following conference series:

  • 351 Accesses

Abstract

Existing methods for face de-identification often cause inevitable damage to the utility of facial information. The anonymized facial images can hardly be applied in practical applications. In this work, we propose a cluster-based generative model that conceals the identity of images while preserving the utility of facial images. We extract facial features in the first stage, then classify images into several clusters. Four naive protection methods, blindfold, mosaic, cartoon and mosaic, are adopted to form facial image inputs without private information. Along with the four de-identified images, a random facial image in the same cluster is also chosen as another input for better preservation of facial features. We train a novel model with multiple inputs, called Multi-stage Utility Maintenance-Variational AutoEncoder (MsUM-VAE), generating a facial image using the mentioned multi-inputs. The output of the model retains a large portion of the facial characteristics, but cannot be distinguished from the original image dataset, avoiding the disclosure of privacy. We perform numerous evaluations on the CelebA dataset to showcase the effectiveness of our model, and the findings indicate that the model surpasses conventional techniques for obscuring identity and maintaining the utility of images.

The authors extend their appreciation to National Key Research and Development Program of China (International Technology Cooperation Project No.2021YFE014400) and National Science Foundation of China (No.42175194) for funding this work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qiu, Y., Niu, Z., Song, B., Ma, T., Al-Dhelaan, A., Al-Dhelaan, M.: A novel generative model for face privacy protection in video surveillance with utility maintenance. Appl. Sci. 12(14), 6962 (2022)

    Article  Google Scholar 

  2. Maximov, M., Elezi, I., Leal-Taixé, L.: CIAGAN: conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5447–5456 (2020)

    Google Scholar 

  3. Cao, J., Liu, B., Wen, Y., Xie, R., Song, L.: Personalized and invertible face de-identification by disentangled identity information manipulation. In: Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 3334–3342 (2021)

    Google Scholar 

  4. Sun, Q., Ma, L., Oh, S.J., Van Gool, L., Schiele, B., Fritz, M.: Natural and effective obfuscation by head inpainting. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5050–5059 (2018)

    Google Scholar 

  5. Chibelushi, C.C., Bourel, F.: Facial expression recognition: a brief tutorial overview. In: CVonline: On-Line Compendium of Computer Vision, vol. 9 (2003)

    Google Scholar 

  6. Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227–242. Springer, Heidelberg (2006). https://doi.org/10.1007/11767831_15

    Chapter  Google Scholar 

  7. Gross, R., Sweeney, L., De la Torre, F., Baker, S.: Model-based face de-identification. In: 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW 2006), p. 161. IEEE (2006)

    Google Scholar 

  8. Samarzija, B., Ribaric, S.: An approach to the de-identification of faces in different poses. In: 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1246–1251. IEEE (2014)

    Google Scholar 

  9. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  10. Sun, Z., Meng, L., Ariyaeeinia, A.: Distinguishable de-identified faces. In: 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), vol. 4, pp. 1–6. IEEE (2015)

    Google Scholar 

  11. Meng, L., Sun, Z., Ariyaeeinia, A., Bennett, K.L.: Retaining expressions on de-identified faces. In: 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1252–1257. IEEE (2014)

    Google Scholar 

  12. Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image Vis. Comput. 16(5), 295–306 (1998)

    Article  Google Scholar 

  13. Meden, B., Emeršič, Ž, Štruc, V., Peer, P.: k-Same-Net: k-Anonymity with generative deep neural networks for face deidentification. Entropy 20(1), 60 (2018)

    Article  Google Scholar 

  14. Liu., C., Wang, Y., Chi, H., Wang, S.: Utility preserved facial image de-identification using appearance subspace decomposition. Chin. J. Electron. 30(3), 413–418 (2021)

    Google Scholar 

  15. Cootes, T.F., Edwards, G.J., Taylor, C.J.: Active appearance models. In: Burkhardt, H., Neumann, B. (eds.) ECCV 1998. LNCS, vol. 1407, pp. 484–498. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054760

    Chapter  Google Scholar 

  16. Ian, G., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27, pp. 2672–2680 (2014)

    Google Scholar 

  17. Cai, Z., Xiong, Z., Xu, H., Wang, P., Li, W., Pan, Y.: Generative adversarial networks: a survey toward private and secure applications. ACM Comput. Surv. (CSUR) 54(6), 1–38 (2021)

    Article  Google Scholar 

  18. Han, C., Xue, R.: Differentially private GANs by adding noise to Discriminator’s loss. Comput. Secur. 107, 102322 (2021)

    Article  Google Scholar 

  19. Yang, R., Ma, X., Bai, X., Su, X.: Differential privacy images protection based on generative adversarial network. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1688–1695. IEEE (2020)

    Google Scholar 

  20. Hukkelås, H., Mester, R., Lindseth, F.: DeepPrivacy: a generative adversarial network for face anonymization. In: Bebis, G., et al. (eds.) ISVC 2019. LNCS, vol. 11844, pp. 565–578. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-33720-9_44

    Chapter  Google Scholar 

  21. Qi, G.: Loss-sensitive generative adversarial networks on lipschitz densities, CoRR abs/1701.06264. arXiv preprint arXiv:1701.06264 (2017)

  22. Liu, Y., Peng, J., James, J.Q., Wu, Y.: PPGAN: privacy-preserving generative adversarial network. In: 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), pp. 985–989. IEEE (2019)

    Google Scholar 

  23. Li, Y., Lu, Q., Tao, Q., Zhao, X., Yu, Y.: SF-GAN: face de-identification method without losing facial attribute information. IEEE Signal Process. Lett. 28, 1345–1349 (2021)

    Article  Google Scholar 

  24. Nguyen, H., Zhuang, D., Wu, P.Y., Chang, M.: Autogan-based dimension reduction for privacy preservation. Neurocomputing 384, 94–103 (2020)

    Article  Google Scholar 

  25. Lin, J., Li, Y., Yang, G.: FPGAN: face de-identification method with generative adversarial networks for social robots. Neural Netw. 133, 132–147 (2021)

    Article  Google Scholar 

  26. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1

    Chapter  MATH  Google Scholar 

  27. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    Google Scholar 

  28. Yu, J., Xue, H., Liu, B., Wang, Y., Zhu, S., Ding, M.: GAN-based differential private image privacy protection framework for the internet of multimedia things. Sensors 21(1), 58 (2020)

    Article  Google Scholar 

  29. Chamikara, M.A.P., Bertok, P., Khalil, I., Liu, D., Camtepe, S.: Privacy preserving face recognition utilizing differential privacy. Comput. Secur. 97, 101951 (2020)

    Article  Google Scholar 

  30. Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 739–753. IEEE (2019)

    Google Scholar 

  31. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3–18. IEEE (2017)

    Google Scholar 

  32. Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322–1333 (2015)

    Google Scholar 

  33. Qardaji, W., Yang, W., Li, N.: Differentially private grids for geospatial data. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 757–768. IEEE (2013)

    Google Scholar 

  34. Ho, S., Qu, Y., Gu, B., Gao, L., Li, J., Xiang, Y.: DP-GAN: differentially private consecutive data publishing using generative adversarial nets. J. Netw. Comput. Appl. 185, 103066 (2021)

    Article  Google Scholar 

  35. Kim, T., Yang, J.: Selective feature anonymization for privacy-preserving image data publishing. Electronics 9(5), 874 (2020)

    Article  Google Scholar 

  36. Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)

    Google Scholar 

  37. LeCun, Y., et al.: Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541–551 (1989)

    Article  Google Scholar 

  38. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533–536 (1986)

    Article  MATH  Google Scholar 

  39. Van Den Oord, A., Vinyals, O.: Neural discrete representation learning. In; Advances in Neural Information Processing Systems, vol. 30 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Biao Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, Y. et al. (2023). A Cluster-Based Facial Image Anonymization Method Using Variational Autoencoder. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3300-6_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3299-3

  • Online ISBN: 978-981-99-3300-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics