Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks

被引:1
|
作者
Pan, Zhenxiong [1 ,2 ]
Sun, Junmei [1 ]
Li, Xiumei [1 ,2 ]
Zhang, Xin [1 ]
Bai, Huang [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Technol, Hangzhou 311121, Peoples R China
[2] Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
关键词
Adversarial examples; Face verification; Privacy protection; JPEG compression; RECOGNITION;
D O I
10.1007/978-981-99-4755-3_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The face image de-identification method commonly used to protect personal privacy on social networks faces the problem of not being able to assure the usability of image sharing. Although the privacy protection method based on adversarial examples meets this requirement, there are still potential hidden problems of information leakage and the compression processing of images by social networks will weaken the privacy protection effect. In this paper, we propose a collaborative privacy protection method based on adversarial examples for photo sharing services on social networks, called CSP3Adv(Collaborative Social Platform Privacy Protection Adversarial Example). We use the perturbation transfer module, which avoids the information leakage caused by accessing to the original image. Moreover, we use the frequency restriction module to guarantees the privacy of users' face images after social network compression. The experimental results show that CSP3Adv achieves better privacy protection for various face recognition models and commercial API interfaces on different datasets.
引用
收藏
页码:499 / 510
页数:12
相关论文
共 50 条
  • [21] Privacy-preserving collaborative social networks
    Zhan, Justin
    Blosser, Gary
    Yang, Chris
    Singh, Lisa
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 114 - +
  • [22] Collaborative Privacy Management in Online Social Networks
    Ulusoy, Onuralp
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS (AAMAS' 18), 2018, : 1788 - 1790
  • [23] A Graph Data Privacy-Preserving Method Based on Generative Adversarial Networks
    Li, Aiping
    Fang, Junbin
    Jiang, Qianye
    Zhou, Bin
    Jia, Yan
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2020, PT II, 2020, 12343 : 227 - 239
  • [24] Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks
    Zhang, Xueqin
    Zhou, Yue
    Pei, Songwen
    Zhuge, Jingjing
    Chen, Jiahao
    IEEE ACCESS, 2020, 8 (08): : 10989 - 10996
  • [25] A Privacy Protection Scheme Based on Attribute Encryption in Mobile Social Networks
    Niu, Shufen
    Ge, Peng
    Mi, Song
    Su, Yun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 847 - 855
  • [26] Joint Obfuscation for Privacy Protection in Location-Based Social Networks
    Bostanipour, Behnaz
    Theodorakopoulos, George
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2020, DPM 2020, CBT 2020, 2020, 12484 : 111 - 127
  • [27] Context-based influence maximization with privacy protection in social networks
    Jing, Dong
    Liu, Ting
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [28] Context-based influence maximization with privacy protection in social networks
    Dong Jing
    Ting Liu
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [29] View-based collaborative business process modeling method for privacy protection
    Xiang J.
    Mo Q.
    Xie Z.
    Wang Y.
    Wang J.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3187 - 3201
  • [30] Danger Theory-based Privacy Protection Model for Social Networks
    Lo, Nai-Wei
    Yohan, Alexander
    FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1397 - 1406