A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks
The device group based on the Internet of Things (IoT) has been used in face recognition in real life, so it is more necessary to discuss the current data security issues and social hot issues. The Internet of Things device combines edge conditions and many recognizers to generative adversarial netw...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2021/6948293 |
id |
doaj-b22d9b056eda4cf9956400343ef93fc1 |
---|---|
record_format |
Article |
spelling |
doaj-b22d9b056eda4cf9956400343ef93fc12021-07-12T02:12:38ZengHindawi-WileyWireless Communications and Mobile Computing1530-86772021-01-01202110.1155/2021/6948293A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial NetworksWenqiu Zhu0Xiaoyi Wang1Yuezhong Wu2Guang Zou3School of Computer ScienceSchool of Computer ScienceSchool of Computer ScienceSchool of Computer ScienceThe device group based on the Internet of Things (IoT) has been used in face recognition in real life, so it is more necessary to discuss the current data security issues and social hot issues. The Internet of Things device combines edge conditions and many recognizers to generative adversarial networks. On the premise of meeting the needs of partial occlusion of users, face recovery is completed through information reorganization. CelebA training set is used to simulate face occlusion, and the model is trained and tested. The results show that the method can recover the complete image of the protection for the facial privacy of specific people. At the same time, the IoT device using this method ensures that the face information is not easy to have tampered with when attacked.http://dx.doi.org/10.1155/2021/6948293 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Wenqiu Zhu Xiaoyi Wang Yuezhong Wu Guang Zou |
spellingShingle |
Wenqiu Zhu Xiaoyi Wang Yuezhong Wu Guang Zou A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks Wireless Communications and Mobile Computing |
author_facet |
Wenqiu Zhu Xiaoyi Wang Yuezhong Wu Guang Zou |
author_sort |
Wenqiu Zhu |
title |
A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks |
title_short |
A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks |
title_full |
A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks |
title_fullStr |
A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks |
title_full_unstemmed |
A Face Occlusion Removal and Privacy Protection Method for IoT Devices Based on Generative Adversarial Networks |
title_sort |
face occlusion removal and privacy protection method for iot devices based on generative adversarial networks |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8677 |
publishDate |
2021-01-01 |
description |
The device group based on the Internet of Things (IoT) has been used in face recognition in real life, so it is more necessary to discuss the current data security issues and social hot issues. The Internet of Things device combines edge conditions and many recognizers to generative adversarial networks. On the premise of meeting the needs of partial occlusion of users, face recovery is completed through information reorganization. CelebA training set is used to simulate face occlusion, and the model is trained and tested. The results show that the method can recover the complete image of the protection for the facial privacy of specific people. At the same time, the IoT device using this method ensures that the face information is not easy to have tampered with when attacked. |
url |
http://dx.doi.org/10.1155/2021/6948293 |
work_keys_str_mv |
AT wenqiuzhu afaceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT xiaoyiwang afaceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT yuezhongwu afaceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT guangzou afaceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT wenqiuzhu faceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT xiaoyiwang faceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT yuezhongwu faceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks AT guangzou faceocclusionremovalandprivacyprotectionmethodforiotdevicesbasedongenerativeadversarialnetworks |
_version_ |
1721308044498829312 |