Protecting facial images from recognition on social media: solution methods and their perspective
Annotation
The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.
Keywords
Постоянный URL
Articles in current issue
- Features of images of water, ice, snow, objects and a human formed by a hybrid television camera in the near-infrared range
- Analyzing periodical textured silicon solar cells by the TCAD modeling
- Scintillation gamma radiation sensors based on solid-state photomultipliers in wireless industrial internet networks
- Improving the quality of network management of technological processes
- Geometric approach to the solution of the Dubins car problem in the formation of program trajectories
- Drift of two-dimensional vacancy islands on the Si(100) surface under electromigration conditions
- A study of the photocatalytic properties of chitosan-TiO2 composites for pyrene decomposition
- Kinetics of transformation of the atomic step bunches shape under electromigration conditions on the Si(001) surface
- Abnormal diffusion profile of adatoms on extremely wide terraces of the Si(111) surface
- An experimental methodology for assessing the probability and danger of network attacks in automated systems
- A meta-feature selection method based on the Auto-sklearn framework
- Automatic construction of the dialog tree based on unmarked text corpora in Russian
- Generic programming with combinators and objects
- Machine learning of the Bayesian belief network as a tool for evaluating the process frequency on social network data
- Software restructuring models for object oriented programming languages using the fuzzy based clustering algorithm
- The concept of managing the network structure of intelligent devices in the digital transformation of the energy industry
- Redundant models of testable distributed real-time computing systems
- A study of the influence of the base thickness on photoelectric parameters of silicon solar cells with the new TCAD algorithms
- A balanced algorithm of the hybrid large-particle method and its verification on some test problems
- The architecture of a system for full-text search by speech data based on a global search index
- Assessment of cerebral circulation through an intact skull using imaging photoplethysmography