• Title/Summary/Keyword: Face privacy

Search Result 80, Processing Time 0.034 seconds

Face Detection Using Multi-level Features for Privacy Protection in Large-scale Surveillance Video (대규모 비디오 감시 환경에서 프라이버시 보호를 위한 다중 레벨 특징 기반 얼굴검출 방법에 관한 연구)

  • Lee, Seung Ho;Moon, Jung Ik;Kim, Hyung-Il;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1268-1280
    • /
    • 2015
  • In video surveillance system, the exposure of a person's face is a serious threat to personal privacy. To protect the personal privacy in large amount of videos, an automatic face detection method is required to locate and mask the person's face. However, in real-world surveillance videos, the effectiveness of existing face detection methods could deteriorate due to large variations in facial appearance (e.g., facial pose, illumination etc.) or degraded face (e.g., occluded face, low-resolution face etc.). This paper proposes a new face detection method based on multi-level facial features. In a video frame, different kinds of spatial features are independently extracted, and analyzed, which could complement each other in the aforementioned challenges. Temporal domain analysis is also exploited to consolidate the proposed method. Experimental results show that, compared to competing methods, the proposed method is able to achieve very high recall rates while maintaining acceptable precision rates.

Examining Factors that Determine the Use of Social Media Privacy Settings: Focused on the Mediating Effect of Implementation Intention to Use Privacy Settings

  • Jongki Kim;Jianbo Wang
    • Asia pacific journal of information systems
    • /
    • v.30 no.4
    • /
    • pp.919-945
    • /
    • 2020
  • Social media platforms such as Instagram and Facebook lead to potential security risks, which consequently raise public concerns about privacy. However, most people rarely make active efforts to protect their personal data, even though they have shown increasing concerns about privacy. Therefore, this study examines the factors that determine social media users' behavior of using privacy settings and testifies the existence of privacy paradox in such a context. In addition, it investigates the mediating effects of implementation intentions on the relationship between intentions and behaviors. In the study, we collected data through questionnaires, and the respondents were undergraduate and graduate students in South Korea. After a pilot test (n = 92) and a set of face-to-face interviews, 266 usable responses were retrieved for data analysis finally. The results confirmed the existence of the privacy paradox regarding the use of social media privacy settings. And the implication intention did positively mediate the relationship between intention and behavior in the context of social media privacy settings. To the best of our knowledge, our study is the first in the information privacy literature to introduce the notion of implementation intention which is a much more powerful explanation and prediction of actual behavior than the (behavioral) intention.

Implementation of Real-Time Image Blurring System for User Privacy Support (사용자 보호를 위한 실시간 이미지 모자이크 처리 시스템 개발)

  • Minyeong Kim;Suah Jeon;Jihoon Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.39-42
    • /
    • 2023
  • Recently, with the explosive increase of video streaming services, real-time live broadcasting has also increased, which leads to an infringement problem for user privacy. So, to solve such problems, we proposed the real image blurring system using dlib face-recognition library. 68 face landmarks are extracted and convert into 128 vector values. After that the proposed system tries to compare this value with the image in the database, and if it is over 0.45, it is considered as different person and image blurring processing is performed. With the proposed system, it is possible to solve the problem of user privacy infringement, and also to be utilized to detect the specific person. Through experimental results, the proposed system has an accuracy of more than 90% in terms of face recognition.

  • PDF

Multi-attribute Face Editing using Facial Masks (얼굴 마스크 정보를 활용한 다중 속성 얼굴 편집)

  • Ambardi, Laudwika;Park, In Kyu;Hong, Sungeun
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.619-628
    • /
    • 2022
  • Although face recognition and face generation have been growing in popularity, the privacy issues of using facial images in the wild have been a concurrent topic. In this paper, we propose a face editing network that can reduce privacy issues by generating face images with various properties from a small number of real face images and facial mask information. Unlike the existing methods of learning face attributes using a lot of real face images, the proposed method generates new facial images using a facial segmentation mask and texture images from five parts as styles. The images are then trained with our network to learn the styles and locations of each reference image. Once the proposed framework is trained, we can generate various face images using only a small number of real face images and segmentation information. In our extensive experiments, we show that the proposed method can not only generate new faces, but also localize facial attribute editing, despite using very few real face images.

CNN Based Face Tracking and Re-identification for Privacy Protection in Video Contents (비디오 컨텐츠의 프라이버시 보호를 위한 CNN 기반 얼굴 추적 및 재식별 기술)

  • Park, TaeMi;Phu, Ninh Phung;Kim, HyungWon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.63-68
    • /
    • 2021
  • Recently there is sharply increasing interest in watching and creating video contents such as YouTube. However, creating such video contents without privacy protection technique can expose other people in the background in public, which is consequently violating their privacy rights. This paper seeks to remedy these problems and proposes a technique that identifies faces and protecting portrait rights by blurring the face. The key contribution of this paper lies on our deep-learning technique with low detection error and high computation that allow to protect portrait rights in real-time videos. To reduce errors, an efficient tracking algorithm was used in this system with face detection and face recognition algorithm. This paper compares the performance of the proposed system with and without the tracking algorithm. We believe this system can be used wherever the video is used.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.

A Method of Generating Changeable Face Template for Statistical Appearance-Based Face Recognition (통계적 형상 기반의 얼굴인식을 위한 가변얼굴템플릿 생성방법)

  • Lee, Chul-Han;Jung, Min-Yi;Kim, Jong-Sun;Choi, Jeung-Yoon;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.27-36
    • /
    • 2007
  • Changeable biometrics identify a person using transformed biometric data instead of original biometric data in order to enhance privacy and security in biometrics when biometric data is compromised. In this paper, a novel scheme which generates changeable face templates for statistical appearance-based face recognition is proposed. Two different original face feature vectors are extracted from two different appearance-based approaches, respectively, each original feature vector is normalized, and its elements are re-ordered. Finally a changeable face template is generated by weighted addition between two normalized and scrambled feature vectors. Since the two feature vectors are combined into one by a two to one mapping, the original two feature vectors are not easily recovered from the changeable face template even if the combining rule is known. Also, when we need to make new changeable face template for a person, we change the re-ordering rule for the person and make a new feature vector for the person. Therefore, the security and privacy in biometric system can be enhanced by using the proposed changeable face templates. In our experiments, we analyze the proposed method with respect to performance and security using an AR-face database.

A Study of Generation for Changeable Face Template (가변 얼굴 생체템플릿 생성 방법에 대한 연구)

  • Jeong, Min-Yi;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.391-392
    • /
    • 2007
  • Changeable biometries has been suggested as a solution to the problems of enhancing privacy. In this paper, we proposed changeable biometrics for face recognition using on ICA based approach. ICA coefficient vector extracted from an input face image. The vector is scrambled randomly and a new face template is generated by addition of a couple of scrambled coefficients. When a transformed template is compromised, it is replaced by a new scrambling rule and addition.

  • PDF

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.