Protecting facial images from recognition on social media: solution methods and their perspective

The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses...

詳細記述

書誌詳細
出版年:Научно-технический вестник информационных технологий, механики и оптики
主要な著者: Georgy A. Kukharev, Kalybek S. Maulenov, Nadezhda L. Shchegoleva
フォーマット: 論文
言語:英語
出版事項: ITMO University 2021-10-01
主題:
オンライン・アクセス:https://ntv.ifmo.ru/file/article/20755.pdf
_version_ 1848652625304616960
author Georgy A. Kukharev
Kalybek S. Maulenov
Nadezhda L. Shchegoleva
author_facet Georgy A. Kukharev
Kalybek S. Maulenov
Nadezhda L. Shchegoleva
author_sort Georgy A. Kukharev
collection DOAJ
container_title Научно-технический вестник информационных технологий, механики и оптики
description The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.
format Article
id doaj-cf899db4ee8a4b04bce157b042c79538
institution Directory of Open Access Journals
issn 2226-1494
2500-0373
language English
publishDate 2021-10-01
publisher ITMO University
record_format Article
spelling doaj-cf899db4ee8a4b04bce157b042c795382025-11-02T22:17:25ZengITMO UniversityНаучно-технический вестник информационных технологий, механики и оптики2226-14942500-03732021-10-0121575576610.17586/2226-1494-2021-21-5-755-766Protecting facial images from recognition on social media: solution methods and their perspectiveGeorgy A. Kukharev0https://orcid.org/0000-0003-2188-2172Kalybek S. Maulenov1https://orcid.org/0000-0003-4147-3843Nadezhda L. Shchegoleva2https://orcid.org/0000-0003-1087-2833D.Sc., Full Professor, Saint Petersburg State Electrotechnical University (LETI), Saint Petersburg, 197376, Russian FederationDoctoral Student, Non-profit limited company “A. Baitursynov Kostanay Regional University”, Kostanay, 110000, Republic of KazakhstanD.Sc., Associate Professor, Professor, Saint Petersburg State University, Saint Petersburg, 199034, Russian FederationThe paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.https://ntv.ifmo.ru/file/article/20755.pdfsocial networksunauthorized accessdeep learningface image protectionde-identificationfawkes proceduredeterministic recognition methods
spellingShingle Georgy A. Kukharev
Kalybek S. Maulenov
Nadezhda L. Shchegoleva
Protecting facial images from recognition on social media: solution methods and their perspective
social networks
unauthorized access
deep learning
face image protection
de-identification
fawkes procedure
deterministic recognition methods
title Protecting facial images from recognition on social media: solution methods and their perspective
title_full Protecting facial images from recognition on social media: solution methods and their perspective
title_fullStr Protecting facial images from recognition on social media: solution methods and their perspective
title_full_unstemmed Protecting facial images from recognition on social media: solution methods and their perspective
title_short Protecting facial images from recognition on social media: solution methods and their perspective
title_sort protecting facial images from recognition on social media solution methods and their perspective
topic social networks
unauthorized access
deep learning
face image protection
de-identification
fawkes procedure
deterministic recognition methods
url https://ntv.ifmo.ru/file/article/20755.pdf
work_keys_str_mv AT georgyakukharev protectingfacialimagesfromrecognitiononsocialmediasolutionmethodsandtheirperspective
AT kalybeksmaulenov protectingfacialimagesfromrecognitiononsocialmediasolutionmethodsandtheirperspective
AT nadezhdalshchegoleva protectingfacialimagesfromrecognitiononsocialmediasolutionmethodsandtheirperspective