2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2014
DOI: 10.1109/mipro.2014.6859756
|View full text |Cite
|
Sign up to set email alerts
|

Face De-identification with perfect privacy protection

Abstract: The rising concern for privacy protection and the associated legal and social responsibilities have led to extensive research into the field of face de-identification over the last decade. To date, the most successful algorithms developed for face de-identification are those based on the k-Same deidentification, which guarantee a recognition rate lower than 1/k. However, the current k-Same solutions such as k-Same-Eigen and k-Same-M all rely on a decent value of k to deliver a good privacy protection. This pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…The recognition rates of k-Same-M-Select faces stay slightly below the theoretical maximum of 1/݇. As proved and tested in [9], k-Same-furthest without the FET process produces a recognition rate of zero regardless of the value of k. The recognition rates of the k-Same-furthest-FET faces is nearly zero regardless of k, indicating that the expression transfer process after k-Same-furthest de-identification has hardly any impact on the privacy protection performance.…”
Section: B Evaluation Of Privacy Protectionmentioning
confidence: 55%
See 3 more Smart Citations
“…The recognition rates of k-Same-M-Select faces stay slightly below the theoretical maximum of 1/݇. As proved and tested in [9], k-Same-furthest without the FET process produces a recognition rate of zero regardless of the value of k. The recognition rates of the k-Same-furthest-FET faces is nearly zero regardless of k, indicating that the expression transfer process after k-Same-furthest de-identification has hardly any impact on the privacy protection performance.…”
Section: B Evaluation Of Privacy Protectionmentioning
confidence: 55%
“…The newly introduced member of the k-Same family, kSame-furthest [9], is a model-based approach, representing faces as AAM features to avoid ghosting artefacts. It identifies the k faces that are furthest away from a given probe face image, calculates the average of these faces, and returns this average as the de-identified face of the probe.…”
Section: B the K-same-furthest Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…For both algorithms, there are two main problems: they operate on a closed set I, and the determination of the proper privacy constraint k. In order to produce de-identified images of much better quality and preserve the data utility, the Model-based k-Same algorithms [70] are proposed -one of which is based on Active Appearance Models (AAMs) [72] and another based on the model that is the result of mixtures of identity and non-identity components obtained by factorizing the input images. Modifications to the k-Same Select algorithm, in order to improve the naturalness of the deidentified face images (by retaining face expression) and privacy protection, are proposed in [73,74].…”
Section: Face De-identification In Still Imagesmentioning
confidence: 99%