Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3512576.3512609acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicitConference Proceedingsconference-collections
research-article

Face Privacy Protection Based on Attribute Manipulation

Published: 11 April 2022 Publication History

Abstract

Recent studies have shown the possibility of inferring soft biometric attributes from individual facial images, such as age, gender, and race. This has aroused people's concern about privacy. To solve this problem, we designed a generation confrontation network to achieve the purpose of privacy protection by confusing or preserving the soft biometrics of face images and preserving the identity matching function of the original face. Our method can complete the conversion between multiple facial attributes by using only one generation model. Users can flexibly select the retention or modification of facial attributes without affecting the accuracy of identity matching. A large number of experiments show the effectiveness of our method.

References

[1]
B. Kamgar-Parsi, W. Lawson, and B. Kamgar-Parsi, “Toward development of a face recognition system for watchlist surveillance,”IEEE Transactions on Pattern Analysis and Machine Intelligence,vol. 33, no. 10, pp. 1925–1937, 2011.
[2]
H. Qezavati, B. Majidi, and M. T. Manzuri, “Partially covered face detection in presence of headscarf for surveillance applications,” in 2019 4th International Conference on Pattern Recognition and Image Analysis (IPRIA). IEEE, 2019, pp. 195–199.
[3]
T. Kwon and H. Moon, “Biometric authentication for border control applications,”IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1091–1096, 2008.
[4]
V . Mirjalili, S. Raschka, A. Namboodiri, and A. Ross, “Semi-Adversarial Networks: Convolutional autoencoders for imparting privacy to face images,” inProceedings of 11th IAPR International Conference on Biometrics (ICB). Gold Coast, Australia: IEEE, 2018.
[5]
Choi, Yunjey, "Stargan: Unified generative adversarial networks for multi-domain image-to-image translation." Proceedings of the IEEE conference on computer vision and pattern recognition. 2018.
[6]
V . Mirjalili and A. Ross. Soft biometric privacy: Retaining biometric utility of face images while perturbing gender. InProc. of International Joint Conference on Biometrics(IJCB), 2017.
[7]
A. Othman and A. Ross. Privacy of facial soft biometrics: Suppressing gender but retaining identity. InEuropean Conference on Computer Vision Workshop, pages 682–696.Springer, 2014.
[8]
A. Jourabloo, X. Yin, and X. Liu. Attribute preserved face de-identification. InInternational Conference on Biometrics (ICB), pages 278–285, 2015.
[9]
E. M. Newton, L. Sweeney, and B. Malin. Preserving privacy by de-identifying face images.IEEE Transactions on Knowledge and Data Engineering, 17(2):232–243, 2005.
[10]
A. Othman and A. Ross. Privacy of facial soft biometrics: Suppressing gender but retaining identity. InEuropean Conference on Computer Vision Workshop, pages 682–696.Springer, 2014.
[11]
T. Sim and L. Zhang. Controllable face privacy. In11th IEEE International Conference on Automatic Face and Gesture Recognition (FG), volume 4, pages 1–8, 2015.
[12]
Goodfellow I, Pouget-Abadie J, Mirza M, Generative adversarial nets[J]. Advances in neural information processing systems, 2014, 27.
[13]
Mirza M, Osindero S. Conditional generative adversarial nets[J]. arXiv preprint arXiv:1411.1784, 2014.
[14]
Zhu, Jun-Yan, "Unpaired image-to-image translation using cycle-consistent adversarial networks." Proceedings of the IEEE international conference on computer vision. 2017.
[15]
D. Ulyanov, A. V edaldi, and V . Lempitsky. Instance normalization: The missing ingredient for fast stylization.arXiv preprint arXiv:1607.08022, 2016.5
[16]
P . Isola, J.-Y . Zhu, T. Zhou, and A. A. Efros. Image-to-image translation with conditional adversarial networks. InProceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.1,2,3,5
[17]
A. Odena, C. Olah, and J. Shlens. Conditional image synthesis with auxiliary classifier gans.arXiv preprint arXiv:1610.09585, 2016.3,5
[18]
Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. Arcface: Additive angular margin loss for deep face recognition. InProc. CVPR, pages 4690–4699, 2019.3
[19]
Z. Liu, P . Luo, X. Wang, and X. Tang. Deep learning face attributes in the wild. InProceedings of the IEEE International Conference on Computer Vision (ICCV), 2015.2,4,6
[20]
Liyuan Liu, Haoming Jiang, Pengcheng He, Weizhu Chen,Xiaodong Liu, Jianfeng Gao, and Jiawei Han. On the variance of the adaptive learning rate and beyond.arXiv preprint arXiv:1908.03265, 2019
[21]
Michael Zhang, James Lucas, Jimmy Ba, and Geoffrey EHinton. Lookahead optimizer: k steps forward, 1 step back. InAdvances in Neural Information Processing Systems, pages 9597–9608, 2019.
[22]
He, Kaiming, "Deep residual learning for image recognition." Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
[23]
Hao Wang, Yitong Wang, Zheng Zhou, Xing Ji, Dihong Gong, Jingchao Zhou,Zhifeng Li, and Wei Liu. Cosface: Large margin cosine loss for deep face recognition. InProceedings of the IEEE conference on computer vision and pattern recognition, pages 5265–5274, 2018.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIT '21: Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City
December 2021
584 pages
ISBN:9781450384971
DOI:10.1145/3512576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Generative Adversarial Network
  2. Identity matching
  3. Privacy protection
  4. Soft biometrics

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Yunnan Innovation Team of Education Informatization for Nationalities, and Yunnan ExpertWorkstation of Xiaochun Cao
  • postgraduate scientific research innovation project of Yunnan Normal University

Conference

ICIT 2021
ICIT 2021: IoT and Smart City
December 22 - 25, 2021
Guangzhou, China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 74
    Total Downloads
  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media