ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2020
DOI: 10.1109/icassp40776.2020.9054046
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Image Sharing Via Sparsifying Layers on Convolutional Groups

Abstract: We propose a practical framework to address the problem of privacy-aware image sharing in large-scale setups. We argue that, while compactness is always desired at scale, this need is more severe when trying to furthermore protect the privacy-sensitive content. We therefore encode images, such that, from one hand, representations are stored in the public domain without paying the huge cost of privacy protection, but ambiguated and hence leaking no discernible content from the images, unless a combinatorially-e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…Table I provides a quantitative comparison on reconstructed images using normalized MSE and SSIM (Structural Similarity Index) on MNIST [28], Fashion-MNIST [29], and CIFAR-10 [30] databases, where we applied the proposed method on latent representation of a designed convolutional autoencoder in [12], setting L = 128 and considering one code-map for MNIST and Fashion-MNIST databases and four code-maps for CIFAR-10 database. Finally, note that based on these results, our model follows the notion of (β, γ)-recoverable privacy mechanism, which we defined in Section II.…”
Section: A Reconstruction Leakagementioning
confidence: 99%
See 3 more Smart Citations
“…Table I provides a quantitative comparison on reconstructed images using normalized MSE and SSIM (Structural Similarity Index) on MNIST [28], Fashion-MNIST [29], and CIFAR-10 [30] databases, where we applied the proposed method on latent representation of a designed convolutional autoencoder in [12], setting L = 128 and considering one code-map for MNIST and Fashion-MNIST databases and four code-maps for CIFAR-10 database. Finally, note that based on these results, our model follows the notion of (β, γ)-recoverable privacy mechanism, which we defined in Section II.…”
Section: A Reconstruction Leakagementioning
confidence: 99%
“…3e-3f depict the recall measure for the CelebA database. The ground-truth was the pixel domain Euclidean distances and the latent code of the network in [12] is used to measure the approximate distances.…”
Section: A Reconstruction Leakagementioning
confidence: 99%
See 2 more Smart Citations
“…A privacy-preserving method to which our method has some resemblance was recently described in [20]. In the method of [20], the images are first processed through a parallel group of trained auto-encoders, each generating its own sufficiently diversified sparse code.…”
Section: Introductionmentioning
confidence: 99%