2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018
DOI: 10.1109/ntms.2018.8328726
|View full text |Cite
|
Sign up to set email alerts
|

Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The initial privacy-preserving methods that were put forth relied on hiding the individual's face. This indicates that various techniques, such as masking [11]- [13], filtering [14]- [16], and transformation [17]- [19], eliminate personally identifiable information. The face region is covered with a shape in the masking approach so that the person's face is fully hidden; filtering and transformation reduce the face region's resolution; and blurring employs Gaussian filters with different standard deviation values to allow for varying degrees of blurring.…”
Section: B Face Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…The initial privacy-preserving methods that were put forth relied on hiding the individual's face. This indicates that various techniques, such as masking [11]- [13], filtering [14]- [16], and transformation [17]- [19], eliminate personally identifiable information. The face region is covered with a shape in the masking approach so that the person's face is fully hidden; filtering and transformation reduce the face region's resolution; and blurring employs Gaussian filters with different standard deviation values to allow for varying degrees of blurring.…”
Section: B Face Obfuscationmentioning
confidence: 99%
“…The original face image is rendered unrecognizable through quality reduction in traditional face privacy methods. They remove any information that might reveal someone's identity by using masking [11]- [13], filtering [14]- [16], and transformation [17]- [19]. Using facial details for specific applications or deriving meaningful insights is difficult when using traditional methods because they deteriorate the overall quality of the images.…”
Section: Introductionmentioning
confidence: 99%
“…The last subgroup of obfuscation-based B-PETs relies on various image transformations to conceal (remove or obscure) sensitive regions in facial images or video. These transformations include image subsampling [135], scrambling [137], [140], [154], [155], [163], mosaicing [110], [162], warping [143], morphing [145], foveation [153], halftoning [161], image puzzling [149], steganography, and others. Techniques from this group are often tied to various compression standards [147] and exploit selected characteristics of the standards for privacy enhancement.…”
Section: Image Transformationsmentioning
confidence: 99%
“…Dadkhah et al [161] studied possibilities for applying different half-toning algorithms with the goal of avoiding unwanted (automated) face detection and recognition. Halftoning transforms the standard grey-level pixel intensities of the input images into black and white dots in a way that preserves the intelligibility of images for human observes, TABLE 3: High-level comparison of the surveyed obfuscation privacy-enhancing techniques.…”
Section: Image Transformationsmentioning
confidence: 99%
“…PrivacyCam by Chattopadhyay and Boult [15] encrypted quantized DCT coefficients for reversible privacy enhancement, while Kobayashi et al [33] combined reversible mosaicing and watermarking in the Privacy Protection Surveillance Camera System. Other approaches include Korshunov and Ebrahimi's use of warping and morphing to reduce biometric utility [105], Ruchaud and Dugelay's combination of steganography and scrambling [165], Chriskos et al's face-detection hindering technique [32], and Dadkhah et al's exploration of de-identification algorithm called half-toning to impede automated face detection and recognition [41].…”
mentioning
confidence: 99%