Protecting facial images from recognition on social media: solution methods and their perspective
The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses...
| Published in: | Научно-технический вестник информационных технологий, механики и оптики |
|---|---|
| Main Authors: | Georgy A. Kukharev, Kalybek S. Maulenov, Nadezhda L. Shchegoleva |
| Format: | Article |
| Language: | English |
| Published: |
ITMO University
2021-10-01
|
| Subjects: | |
| Online Access: | https://ntv.ifmo.ru/file/article/20755.pdf |
Similar Items
Guy Fawkes: el personaje
by: Diana Cortés
Published: (2014-01-01)
by: Diana Cortés
Published: (2014-01-01)
V For Vendetta Novel Grafis sebagai Ikon Revolusi
by: Nadia Aghnia Fadhillah
Published: (2016-06-01)
by: Nadia Aghnia Fadhillah
Published: (2016-06-01)
Guy Fawkes y "Veja": las máscaras y los sentimientos de un relato transmediático
by: Carlos Jáuregui, et al.
Published: (2014-01-01)
by: Carlos Jáuregui, et al.
Published: (2014-01-01)
Comparative Analysis of AI-Based Facial Identification and Expression Recognition Using Upper and Lower Facial Regions
by: Seunghyun Kim, et al.
Published: (2023-05-01)
by: Seunghyun Kim, et al.
Published: (2023-05-01)
Privacy, personal data protection and the digital age: A (criminal) law "omnibus"
by: Banović Jovana M., et al.
Published: (2025-01-01)
by: Banović Jovana M., et al.
Published: (2025-01-01)
Development of an imitation model of information protection system from unauthorized access using the cpn tools software
by: Oksana I. Bokova, et al.
Published: (2019-09-01)
by: Oksana I. Bokova, et al.
Published: (2019-09-01)
Analysis of the architecture and functions of protected automated systems installed at internal affairs facilities
by: Yu. M. Barkalov, et al.
Published: (2020-08-01)
by: Yu. M. Barkalov, et al.
Published: (2020-08-01)
Feature’s Classification of Hardware-Software Unites of Trusted Boot
by: Elizaveta Aleksandrovna Belyaeva, et al.
Published: (2013-09-01)
by: Elizaveta Aleksandrovna Belyaeva, et al.
Published: (2013-09-01)
Just(ice) Smiling? Masks and Masking in the Occupy-Wall Street Protests
by: Andreas Beer
Published: (2019-03-01)
by: Andreas Beer
Published: (2019-03-01)
COUNCIL OF EUROPE STANDARDS ON THE USE OF FACIAL RECOGNITION TECHNOLOGIES IN CRIMINAL PROCEEDINGS OR WHO IS THE EYE OF SAURON LOOKING AT
by: Akhtyrska N.
Published: (2023-03-01)
by: Akhtyrska N.
Published: (2023-03-01)
Exploration of the use of temporary computer system resources by anti-virus tools
by: Alexey V. Astrakhov, et al.
Published: (2023-02-01)
by: Alexey V. Astrakhov, et al.
Published: (2023-02-01)
PEOPLE RETRIEVAL BY MEANS OF COMPOSITE PICTURES: PROBLEM STATE-OF-THE-ART AND TECHNOLOGIES
by: Georgy A. Kukharev, et al.
Published: (2014-11-01)
by: Georgy A. Kukharev, et al.
Published: (2014-11-01)
Valuation Method for Hardware-Software Unites of Trusted Boot
by: Aleksey Albertovich Modestov, et al.
Published: (2015-03-01)
by: Aleksey Albertovich Modestov, et al.
Published: (2015-03-01)
Recognition of Face and Emotional Facial Expressions in Autism
by: Muhammed Tayyib Kadak, et al.
Published: (2013-03-01)
by: Muhammed Tayyib Kadak, et al.
Published: (2013-03-01)
Verifiable Facial De-Identification in Video Surveillance
by: Sungjune Park, et al.
Published: (2024-01-01)
by: Sungjune Park, et al.
Published: (2024-01-01)
Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies
by: Anna V. Batskih, et al.
Published: (2020-06-01)
by: Anna V. Batskih, et al.
Published: (2020-06-01)
The Effects of AI-Driven Face Restoration on Forensic Face Recognition
by: Mengxuan Yang, et al.
Published: (2024-04-01)
by: Mengxuan Yang, et al.
Published: (2024-04-01)
Facial Memory: The Role of the Pre-Existing Knowledge in Face Processing and Recognition
by: Alejandro J. Estudillo
Published: (2012-05-01)
by: Alejandro J. Estudillo
Published: (2012-05-01)
Facial Recognition Databases: Recent Developments and Review of Methods
by: Waleed Ayad, et al.
Published: (2023-12-01)
by: Waleed Ayad, et al.
Published: (2023-12-01)
Evaluation of the IT-security level of network videosurveillance
by: V. V. Malikov
Published: (2019-06-01)
by: V. V. Malikov
Published: (2019-06-01)
APPLICATION OF DIGITAL FACIAL ANTHROPOMETRY (Review paper)
by: G. A. Kukharev, et al.
Published: (2019-03-01)
by: G. A. Kukharev, et al.
Published: (2019-03-01)
A Comprehensive Survey of Masked Faces: Recognition, Detection, and Unmasking
by: Mohamed Mahmoud, et al.
Published: (2024-09-01)
by: Mohamed Mahmoud, et al.
Published: (2024-09-01)
Susceptibility to Image Resolution in Face Recognition and Training Strategies to Enhance Robustness
by: Knoche, Martin, et al.
Published: (2022-11-01)
by: Knoche, Martin, et al.
Published: (2022-11-01)
Problems of management of multiobject systems of unmanned aerial vehicles and the ways of their solution
by: S. M. Dymkov, et al.
Published: (2019-06-01)
by: S. M. Dymkov, et al.
Published: (2019-06-01)
An Experimental Investigation about the Integration of Facial Dynamics in Video-Based Face Recognition
by: Abdenour Hadid, et al.
Published: (2005-08-01)
by: Abdenour Hadid, et al.
Published: (2005-08-01)
Face image de-identification based on feature embedding
by: Goki Hanawa, et al.
Published: (2024-09-01)
by: Goki Hanawa, et al.
Published: (2024-09-01)
Still Image Face Recognition in Hungary
by: Gergely Gárdonyi
Published: (2020-11-01)
by: Gergely Gárdonyi
Published: (2020-11-01)
Capgras syndrome and poor facial emotion recognition
by: M. Zrelli, et al.
Published: (2022-06-01)
by: M. Zrelli, et al.
Published: (2022-06-01)
Security of Sensitive Data in Face Recognition System Applications: A Novel Encryption Approach
by: S. Hemalatha, et al.
Published: (2025-01-01)
by: S. Hemalatha, et al.
Published: (2025-01-01)
MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS"
by: O. I. Bokova, et al.
Published: (2019-07-01)
by: O. I. Bokova, et al.
Published: (2019-07-01)
Methodical approach to quantitative assessment of the risks of the implementation of threats unauthorized access to an information resource automated systems of internal affairs bodies
by: T. V. Meshcheryakova, et al.
Published: (2022-11-01)
by: T. V. Meshcheryakova, et al.
Published: (2022-11-01)
A New Approach to Unauthorized Contract and Its Comparison to Iranian Civil Code
by: Sajjad Davarpanah Moghaddam, et al.
Published: (2023-05-01)
by: Sajjad Davarpanah Moghaddam, et al.
Published: (2023-05-01)
Measuring the potential risk of re-identification of imaging research participants from open-source automated face recognition software
by: Carl M. Prakaashana, et al.
Published: (2025-10-01)
by: Carl M. Prakaashana, et al.
Published: (2025-10-01)
Face Recognition and Tracking Framework for Human–Robot Interaction
by: Aly Khalifa, et al.
Published: (2022-05-01)
by: Aly Khalifa, et al.
Published: (2022-05-01)
Front-to-Side Hard and Soft Biometrics for Augmented Zero-Shot Side Face Recognition
by: Ahuod Hameed Alsubhi, et al.
Published: (2025-03-01)
by: Ahuod Hameed Alsubhi, et al.
Published: (2025-03-01)
Open-Source Face Recognition Frameworks: A Review of the Landscape
by: David Wanyonyi, et al.
Published: (2022-01-01)
by: David Wanyonyi, et al.
Published: (2022-01-01)
Does Deep Learning-Based Super-Resolution Help Humans With Face Recognition?
by: Erik Velan, et al.
Published: (2022-04-01)
by: Erik Velan, et al.
Published: (2022-04-01)
Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition With Privacy Protection
by: Pawel Drozdowski, et al.
Published: (2021-01-01)
by: Pawel Drozdowski, et al.
Published: (2021-01-01)
More than a sum of parts: robust face recognition by integrating variation
by: Nadia Menon, et al.
Published: (2018-01-01)
by: Nadia Menon, et al.
Published: (2018-01-01)
Analysis and classification of the main threats to information security of automated systems at the objects of informatization of internal affairs bodies
by: Anna V. Batskih, et al.
Published: (2020-03-01)
by: Anna V. Batskih, et al.
Published: (2020-03-01)
Similar Items
-
Guy Fawkes: el personaje
by: Diana Cortés
Published: (2014-01-01) -
V For Vendetta Novel Grafis sebagai Ikon Revolusi
by: Nadia Aghnia Fadhillah
Published: (2016-06-01) -
Guy Fawkes y "Veja": las máscaras y los sentimientos de un relato transmediático
by: Carlos Jáuregui, et al.
Published: (2014-01-01) -
Comparative Analysis of AI-Based Facial Identification and Expression Recognition Using Upper and Lower Facial Regions
by: Seunghyun Kim, et al.
Published: (2023-05-01) -
Privacy, personal data protection and the digital age: A (criminal) law "omnibus"
by: Banović Jovana M., et al.
Published: (2025-01-01)
