2018
DOI: 10.3390/e20010060
|View full text |Cite
|
Sign up to set email alerts
|

k-Same-Net: k-Anonymity with Generative Deep Neural Networks for Face Deidentification

Abstract: ; Tel.: +386-1-479-8245 † This paper is an extended version of our paper published in Meden B.; Emeršič Ž.; Štruc V.; Peer P.k-Same-Net: Neural-Network-Based Face Deidentification. In the Proceedings of the International Conference and Workshop on Bioinspired Intelligence (IWOBI), Funchal Madeira, Portugal, 10-12 July 2017.Received: 1 December 2017 ; Accepted: 9 January 2018; Published: 13 January 2018Abstract: Image and video data are today being shared between government entities and other relevant stakehold… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 63 publications
(31 citation statements)
references
References 76 publications
(103 reference statements)
0
30
0
Order By: Relevance
“…One possibility to address these issues is to completely remove all information that could be used by biometric recognition techniques. At the image-level, for example, early privacy protection methods tried to hide sensitive information by placing black patches over individuals or replacing image regions corresponding to individuals by uninformative surrogate images [10], [15], [61]. While such approaches ensure perfect privacy protection, they also completely destroy the utility of the data.…”
Section: Biometric Privacy Enhancementmentioning
confidence: 99%
See 1 more Smart Citation
“…One possibility to address these issues is to completely remove all information that could be used by biometric recognition techniques. At the image-level, for example, early privacy protection methods tried to hide sensitive information by placing black patches over individuals or replacing image regions corresponding to individuals by uninformative surrogate images [10], [15], [61]. While such approaches ensure perfect privacy protection, they also completely destroy the utility of the data.…”
Section: Biometric Privacy Enhancementmentioning
confidence: 99%
“…Meden et al [9], for example, designed a face deidentification pipeline around Generative Neural Networks (GNN) consisting of the Viola-Jones face detector, a VGG16-based feature extractor and a GNN based face renderer -for surrogate face generation. This ad-hoc pipeline was then extended to the k-Same-Net model, which incorporated elements from the k-Same family of algorithms and was empirically shown to offer a solid compromise between privacy protection and data utility -preserving facial expressions without visual artifacts [33], [61]. While k-Same-Net was inspired by the kanonymity model, a formal proof of the privacy guarantees associated with the model was not provided.…”
Section: Deep Learning Approachesmentioning
confidence: 99%
“…The results may not necessarily be natural or sufficiently anonymized [16]- [19]. The concept of k-anonymity [20] provides a theoretical guarantee of privacy [21]- [25]. Neural networks or, more specifically, generative adversarial networks (GANs), offer a new approach to anonymizing faces by synthesizing realistic yet anonymous faces [17], [26]- [29], which can be used together with k-anonymity or other theoretical criteria [25], [30].…”
Section: Cyber Worldmentioning
confidence: 99%
“…Much prior work on achieving privacy with such data, especially with images and videos, has relied on domain knowledge and hand-crafted approaches-such as pixelation, blurring, face/object replacement, etc.-to degrade sensitive information [1,2,4,6,13,27]. These methods can be effective in many practical settings when it is clear what to censor, and some variants are even able to make the resulting image look natural and possess chosen attributese.g., replacing faces with generated ones [3,5,17] of different individuals with the same expression, pose, etc. However, we consider the general case when all cues in an image towards the private attribute can not be enumerated, and that an adversary seeking to recover that attribute will learn an estimator specifically for our encoding.…”
Section: Related Workmentioning
confidence: 99%