Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks

被引:1
|
作者
Pan, Zhenxiong [1 ,2 ]
Sun, Junmei [1 ]
Li, Xiumei [1 ,2 ]
Zhang, Xin [1 ]
Bai, Huang [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou 311121, Peoples R China
[2] Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
关键词
Adversarial examples; Face verification; Privacy protection; JPEG compression; RECOGNITION;
D O I
10.1007/978-981-99-4755-3_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The face image de-identification method commonly used to protect personal privacy on social networks faces the problem of not being able to assure the usability of image sharing. Although the privacy protection method based on adversarial examples meets this requirement, there are still potential hidden problems of information leakage and the compression processing of images by social networks will weaken the privacy protection effect. In this paper, we propose a collaborative privacy protection method based on adversarial examples for photo sharing services on social networks, called CSP3Adv(Collaborative Social Platform Privacy Protection Adversarial Example). We use the perturbation transfer module, which avoids the information leakage caused by accessing to the original image. Moreover, we use the frequency restriction module to guarantees the privacy of users' face images after social network compression. The experimental results show that CSP3Adv achieves better privacy protection for various face recognition models and commercial API interfaces on different datasets.
引用
收藏
页码:499 / 510
页数:12
相关论文
共 50 条
  • [1] Personality Privacy Protection Method of Social Users Based on Generative Adversarial Networks
    Sui, Yi
    Wang, Xiujuan
    Zheng, Kangfeng
    Shi, Yutong
    Cao, Siwei
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [2] A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks
    Zhu, Wenqiu
    Wang, Xiaoyi
    Wu, Yuezhong
    Zou, Guang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [3] Rethinking Adversarial Examples for Location Privacy Protection
    Trung-Nghia Le
    Gu, Ta
    Nguyen, Huy H.
    Echizen, Isao
    2022 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2022,
  • [4] A novel privacy protection method based on node segmentation for social networks
    Wang, Zhongli
    Ju, Aiyun
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2022, 28 (04) : 459 - 475
  • [5] Social Location Privacy Protection Method in Vehicular Social Networks
    Ying, Bidi
    Nayak, Amiya
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2017, : 1288 - 1292
  • [6] An Image Privacy Protection Algorithm Based on Adversarial Perturbation Generative Networks
    Tong, Chao
    Zhang, Mengze
    Lang, Chao
    Zheng, Zhigao
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [7] Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks
    Zhang, Jiawei
    Wang, Jinwei
    Wang, Hao
    Luo, Xiangyang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (02) : 562 - 574
  • [8] Gender-Adversarial Networks for Face Privacy Preserving
    Tang, Deyan
    Zhou, Siwang
    Jiang, Hongbo
    Chen, Haowen
    Liu, Yonghe
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 17568 - 17576
  • [9] Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples
    Li, Ming
    Yang, Zhaoli
    Wang, Tao
    Zhang, Yushu
    Wen, Wenying
    IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34 (12) : 13401 - 13412
  • [10] Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images
    Li, Ming
    Wang, Si
    SIGNAL PROCESSING, 2025, 230