2021
DOI: 10.15803/ijnc.11.1_102
|View full text |Cite
|
Sign up to set email alerts
|

Face-Image Anonymization as an Application of Multidimensional Data k-anonymizer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Facial anonymization is a common practice for preserving personal privacy. Recently, generative adversarial network-(GAN-) based deep learning (DL) models have been widely used for face swapping and anonymization [31][32][33][34]. In our previous study [31], we demonstrated a robust approach to preserving the facial identity of the occupants in a FAV cabin.…”
Section: Facial Privacy Versus Facial Recognition In Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…Facial anonymization is a common practice for preserving personal privacy. Recently, generative adversarial network-(GAN-) based deep learning (DL) models have been widely used for face swapping and anonymization [31][32][33][34]. In our previous study [31], we demonstrated a robust approach to preserving the facial identity of the occupants in a FAV cabin.…”
Section: Facial Privacy Versus Facial Recognition In Monitoringmentioning
confidence: 99%
“…Anonymization of faces is an easier and more robust solution to personal privacyrelated threats in the digital domain [35]. Blurring, masking faces, or creating a patch over faces is slightly easier than any other face anonymization approach; however, those methods suffer from significant loss of facial information [32,36]. erefore, face swapping has attracted significant attention for facial anonymization purposes.…”
Section: Face Anonymizationmentioning
confidence: 99%
“…sensitivity(l) = ||max( p i l ) − min( p j l )|| 1 , i and j ∈ {1, 2, ..., n}, i = j (10) where p i l and p j l mean the value for the l-th attribute in the i-th and j-th reduced image data, respectively, and sensitivity(l) describes the range that the value of the l-th attribute can differ in the database. With the distribution of the noise n l settled, noise can be generated and injected to obtain the differentially private image database D r dp = {I dp 1 , I dp 2 , ..., I dp n }, where…”
Section: B Differential Privacy For the Dimension-reduced Image Datamentioning
confidence: 99%
“…Among varieties of techniques to protect privacy, e.g., anonymization [10], encryption [11], data access control [12], data outsourcing [13], digital forgetting [14], and data summarization [15], differential privacy (DP) offers a promising approach to make the contribution of individual data items hardly distinguishable toward given data analyzing tasks [16]. Such a feature leads to a provable privacy guarantee with a quantitative privacy measurement called privacy budget [17], making DP the de-facto standard for privacy preservation in data analysis both in academia and industry [18,19].…”
Section: Introductionmentioning
confidence: 99%
“…GAN-Encoders aims to find out w corresponding to the input X In , and w itself also has semantic sense [6]. It is meaningful in image manipulation [7,8,9], compression, restoration, editing and enhancement tasks.…”
Section: Introduction and Previous Workmentioning
confidence: 99%