Abstract
The face image de-identification method commonly used to protect personal privacy on social networks faces the problem of not being able to assure the usability of image sharing. Although the privacy protection method based on adversarial examples meets this requirement, there are still potential hidden problems of information leakage and the compression processing of images by social networks will weaken the privacy protection effect. In this paper, we propose a collaborative privacy protection method based on adversarial examples for photo sharing services on social networks, called CSP3Adv(Collaborative Social Platform Privacy Protection Adversarial Example). We use the perturbation transfer module, which avoids the information leakage caused by accessing to the original image. Moreover, we use the frequency restriction module to guarantees the privacy of users' face images after social network compression. The experimental results show that CSP3Adv achieves better privacy protection for various face recognition models and commercial API interfaces on different datasets.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Othman, A., Ross, A.: Privacy of facial soft biometrics: suppressing gender but retaining identity. In: Agapito, L., Bronstein, M.M., Rother, C. (eds.) ECCV 2014. LNCS, vol. 8926, pp. 682–696. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16181-5_52
Hyvärinen, A., Oja, E.: Independent component analysis: algorithms and applications. Neural Netw. 13(4–5), 411–430 2000. https://doi.org/10.1016/s0893-6080(00)00026-5
Gross, R., Airoldi, E., Malin, B., Sweeney, L.: Integrating utility into face de-identification. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 227–242. Springer, Heidelberg (2006). https://doi.org/10.1007/11767831_15
Vakhshiteh, F., Nickabadi, A., Ramachandra, R.: Adversarial attacks against face recognition: a comprehensive study. IEEE Access 9, 92735–92756 (2021). https://doi.org/10.1109/access.2021.3092646
Wilber M J., Shmatikov, V, Belongie, S.: Can we still avoid automatic face detection. In: 2016 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1–9. IEEE. New York (2016). https://doi.org/10.1109/wacv.2016.7477452
Goodfellow, I., Pouget-Abadie, J., Mirza, M.: Generative adversarial networks. Commun. ACM 63(11), 139–144 (2020)
He, Y., Zhang, C., Zhu, X.: Generative adversarial network-based image privacy protection algorithm. In: Tenth International Conference on Graphics and Image Processing (ICGIP 2018), pp. 635–645. SPIE, Chengdu (2019). https://doi.org/10.1117/12.2524274
Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234–241. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24574-4_28
Wu, Y., Yang, F., Xu, Y., Ling, H.: Privacy-protective-gan for privacy preserving face de-identification. J. Comput. Sci. Technol. 34(1), 47–60 (2019). https://doi.org/10.1007/s11390-019-1898-8
Shan, S., Wenger, E., Zhang, J.: Fawkes: protecting privacy against unauthorized deep learning models. In: Proceedings of the 29th USENIX Security Symposium, p. 16. USENIX Association, Berkeley (2020)
Zhang, J., Sang, J., Zhao, X.: Adversarial privacy-preserving filter. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 1423–1431. Association for Computing Machinery, Seattle (2020). https://doi.org/10.1145/3394171.3413906
Prangnell, L.: Visible Light-Based Human Visual System Conceptual Model. arXiv preprint arXiv:1609.04830 (2016)
Das, N., Shanbhogue, M., Chen, S.T.: Shield: Fast, practical defense and vaccination for deep learning using jpeg compression. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 196–204. Association for Computing Machinery, New York (2018)
Das, N., Shanbhogue, M., Chen, S.T.: Keeping the bad guys out: Protecting and vaccinating deep learning with jpeg compression. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 196–204. Association for Computing Machinery, New York (2017). https://doi.org/10.1145/3219819.3219910
Shin, R., Song, D.: Jpeg-resistant adversarial images. In: NIPS 2017 Workshop on Machine Learning and Computer Security, pp. 1–8. Long Beach (2017)
Zhang, J., Yi, Q., Sang, J.: JPEG compression-resistant low-mid adversarial perturbation against unauthorized face recognition system. arXiv preprint arXiv:2206.09410 (2022)
Li, S., Zhang, H., Jia, G., Yang, J.: Finger vein recognition based on weighted graph structural feature encoding. In: Zhou, J., et al. (eds.) CCBR 2018. LNCS, vol. 10996, pp. 29–37. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97909-0_4
Xie, C., Zhang, Z., Zhou, Y.: Improving transferability of adversarial examples with input diversity. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2730–2739. IEEE, Long Beach (2019). https://doi.org/10.1109/cvpr.2019.00284
Deng, J., Guo, J., Xue, N.: Arcface: Additive angular margin loss for deep face recognition. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690–4699. IEEE, Long Beach (2019). https://doi.org/10.1109/cvpr.2019.00482
Hou, Q., Zhou, D., Feng, J.: Coordinate attention for efficient mobile network design. In: 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 13713–13722. IEEE, Nashville (2021). https://doi.org/10.1109/cvpr46437.2021.01350
Guo, Y., Zhang, L., Hu, Y., He, X., Gao, J.: MS-Celeb-1M: a dataset and benchmark for large-scale face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9907, pp. 87–102. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46487-9_6
Huang, G.B., Mattar, M., Berg, T.T.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. In: Workshop on faces in ‘Real-Life’ Images: detection, alignment, and recognition. Marseille (2008)
Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815–823. IEEE, Boston (2015). https://doi.org/10.1109/cvpr.2015.7298682
Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: Proceedings of the British Machine Vision Conference (BMVC), pp. 41.1–41.12. BMVA Press, Swansea (2015). https://doi.org/10.5244/C.29.41
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pan, Z., Sun, J., Li, X., Zhang, X., Bai, H. (2023). Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks. In: Huang, DS., Premaratne, P., Jin, B., Qu, B., Jo, KH., Hussain, A. (eds) Advanced Intelligent Computing Technology and Applications. ICIC 2023. Lecture Notes in Computer Science, vol 14086. Springer, Singapore. https://doi.org/10.1007/978-981-99-4755-3_43
Download citation
DOI: https://doi.org/10.1007/978-981-99-4755-3_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-4754-6
Online ISBN: 978-981-99-4755-3
eBook Packages: Computer ScienceComputer Science (R0)