Protecting facial images from recognition on social media: solution methods and their perspective
The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses...
| 出版年: | Научно-технический вестник информационных технологий, механики и оптики |
|---|---|
| 主要な著者: | , , |
| フォーマット: | 論文 |
| 言語: | 英語 |
| 出版事項: |
ITMO University
2021-10-01
|
| 主題: | |
| オンライン・アクセス: | https://ntv.ifmo.ru/file/article/20755.pdf |
| _version_ | 1848652625304616960 |
|---|---|
| author | Georgy A. Kukharev Kalybek S. Maulenov Nadezhda L. Shchegoleva |
| author_facet | Georgy A. Kukharev Kalybek S. Maulenov Nadezhda L. Shchegoleva |
| author_sort | Georgy A. Kukharev |
| collection | DOAJ |
| container_title | Научно-технический вестник информационных технологий, механики и оптики |
| description | The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure. |
| format | Article |
| id | doaj-cf899db4ee8a4b04bce157b042c79538 |
| institution | Directory of Open Access Journals |
| issn | 2226-1494 2500-0373 |
| language | English |
| publishDate | 2021-10-01 |
| publisher | ITMO University |
| record_format | Article |
| spelling | doaj-cf899db4ee8a4b04bce157b042c795382025-11-02T22:17:25ZengITMO UniversityНаучно-технический вестник информационных технологий, механики и оптики2226-14942500-03732021-10-0121575576610.17586/2226-1494-2021-21-5-755-766Protecting facial images from recognition on social media: solution methods and their perspectiveGeorgy A. Kukharev0https://orcid.org/0000-0003-2188-2172Kalybek S. Maulenov1https://orcid.org/0000-0003-4147-3843Nadezhda L. Shchegoleva2https://orcid.org/0000-0003-1087-2833D.Sc., Full Professor, Saint Petersburg State Electrotechnical University (LETI), Saint Petersburg, 197376, Russian FederationDoctoral Student, Non-profit limited company “A. Baitursynov Kostanay Regional University”, Kostanay, 110000, Republic of KazakhstanD.Sc., Associate Professor, Professor, Saint Petersburg State University, Saint Petersburg, 199034, Russian FederationThe paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.https://ntv.ifmo.ru/file/article/20755.pdfsocial networksunauthorized accessdeep learningface image protectionde-identificationfawkes proceduredeterministic recognition methods |
| spellingShingle | Georgy A. Kukharev Kalybek S. Maulenov Nadezhda L. Shchegoleva Protecting facial images from recognition on social media: solution methods and their perspective social networks unauthorized access deep learning face image protection de-identification fawkes procedure deterministic recognition methods |
| title | Protecting facial images from recognition on social media: solution methods and their perspective |
| title_full | Protecting facial images from recognition on social media: solution methods and their perspective |
| title_fullStr | Protecting facial images from recognition on social media: solution methods and their perspective |
| title_full_unstemmed | Protecting facial images from recognition on social media: solution methods and their perspective |
| title_short | Protecting facial images from recognition on social media: solution methods and their perspective |
| title_sort | protecting facial images from recognition on social media solution methods and their perspective |
| topic | social networks unauthorized access deep learning face image protection de-identification fawkes procedure deterministic recognition methods |
| url | https://ntv.ifmo.ru/file/article/20755.pdf |
| work_keys_str_mv | AT georgyakukharev protectingfacialimagesfromrecognitiononsocialmediasolutionmethodsandtheirperspective AT kalybeksmaulenov protectingfacialimagesfromrecognitiononsocialmediasolutionmethodsandtheirperspective AT nadezhdalshchegoleva protectingfacialimagesfromrecognitiononsocialmediasolutionmethodsandtheirperspective |
