Preserving privacy by de-identifying face images

@article{Newton2005PreservingPB,
  title={Preserving privacy by de-identifying face images},
  author={Elaine M. Newton and Latanya Sweeney and Bradley A. Malin},
  journal={IEEE Transactions on Knowledge and Data Engineering},
  year={2005},
  volume={17},
  pages={232-243}
}
In the context of sharing video surveillance data, a significant threat to privacy is face recognition software, which can automatically identify known people, such as from a database of drivers' license photos, and thereby track people regardless of suspicion. [...] Key Method The algorithm determines similarity between faces based on a distance metric and creates new faces by averaging image components, which may be the original image pixels (k-Same-Pixel) or eigenvectors (k-Same-Eigen). Results are presented…Expand
Preserving Privacy by De-identifying Facial Images
In the context of sharing video surveillance data, a significant threat to privacy is face recognition software, which can automatically identify known people, such as from a database of drivers’Expand
Puzzling face verification algorithms for privacy protection
TLDR
Inspired by oracle attacks, a new approach is presented for de-identifying face images, i.e. for preventing automatic matching with public face collections, by superimposing a collection of carefully designed noise patterns onto the original face by making these de-identified images robust to counter attacks such as blurring. Expand
Face de-identification using facial identity preserving features
  • He-hua Chi, Y. Hu
  • Computer Science
  • 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)
  • 2015
TLDR
This work proposes to achieve facial anonymity by slightly modifying existing facial images into "averaged faces" so that the corresponding identities are difficult to uncover, and explores a deep learning-based facial identity-preserving (FIP) features. Expand
GARP-face: Balancing privacy protection and utility preservation in face de-identification
TLDR
This paper uses modern facial analysis technologies to determine the Gender, Age, and Race attributes of facial images, and preserves these attributes by seeking corresponding representatives constructed through a gallery dataset, and shows that the proposed approach outperforms previous solutions in preserving data utility while achieving similar degree of privacy protection. Expand
Face de-identification for privacy protection
TLDR
A method to merge the isolated de-identified face region and its original image background is presented, which can increase the visual quality of a de- identified face image in this thesis and provide wrong-map protection to the k-Same-M face de-identification. Expand
Intelligent Frame Selection as a Privacy-Friendlier Alternative to Face Recognition
TLDR
This work proposes a privacy-friendly alternative to large scale facial recognition by automatically extracting a high quality snapshot of each detected person without revealing his or her identity through a novel unsupervised face image quality assessment method. Expand
Retaining Expression on De-identified Faces
TLDR
A new algorithm is proposed here to preserve data utility as well as protect privacy and is capable of preserving not only the category of the facial expression but also the intensity of the expression. Expand
Retaining Expression on De-identified Faces
The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in the recorded documents. A face de-identificationExpand
Privacy of Facial Soft Biometrics: Suppressing Gender But Retaining Identity
TLDR
This work focuses on masking the gender information in a face image with respect to an automated gender estimation scheme, while retaining its ability to be used by a face matcher. Expand
Efficient Privacy-Preserving Face Recognition ( Full Version ) ?
Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, the rapid improvement andExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 35 REFERENCES
Preserving Privacy by De-identifying Facial Images
In the context of sharing video surveillance data, a significant threat to privacy is face recognition software, which can automatically identify known people, such as from a database of drivers’Expand
Eigenfaces for Recognition
TLDR
A near-real-time computer system that can locate and track a subject's head, and then recognize the person by comparing characteristics of the face to those of known individuals, and that is easy to implement using a neural network architecture. Expand
Quo vadis Face Recognition
TLDR
Recognition accuracy was highly sensitive to variation in pose and fall off was more severe for non-frontal training images, while small but consistent differences were found for individual differences in subjects. Expand
Computational and Performance Aspects of PCA-Based Face-Recognition Algorithms
TLDR
Two most significant results are that changing the similarity measure produced the greatest change in performance, and that difference in performance of ±10% is needed to distinguish between algorithms. Expand
The FERET evaluation methodology for face-recognition algorithms
Two of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face RecognitionExpand
k-Anonymity: A Model for Protecting Privacy
  • L. Sweeney
  • Computer Science
  • Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
TLDR
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected. Expand
The FERET database and evaluation procedure for face-recognition algorithms
TLDR
The FERET evaluation procedure is an independently administered test of face-recognition algorithms to allow a direct comparison between different algorithms and to assess the state of the art in face recognition. Expand
On the design and quantification of privacy preserving data mining algorithms
TLDR
It is proved that the EM algorithm converges to the maximum likelihood estimate of the original distribution based on the perturbed data, and proposed metrics for quantification and measurement of privacy-preserving data mining algorithms are proposed. Expand
Privacy Preserving Data Mining
TLDR
This work considers a scenario in which two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information, and proposes a protocol that is considerably more efficient than generic solutions and demands both very few rounds of communication and reasonable bandwidth. Expand
Distortion tolerant pattern recognition based on self-organizing feature extraction
TLDR
A generic, modular, neural network-based feature extraction and pattern classification system is proposed for finding essentially two-dimensional objects or object parts from digital images in a distortion tolerant manner, and the feature space has sufficient resolution power for a moderate number of classes with rather strong distortions. Expand
...
1
2
3
4
...