Standard

Protecting facial images from recognition on social media: Solution methods and their perspective. / Kukharev, Georgy A.; Maulenov, Kalybek S.; Shchegoleva, Nadezhda L.

In: Scientific and Technical Journal of Information Technologies, Mechanics and Optics, Vol. 21, No. 5, 01.09.2021, p. 755-766.

Research output: Contribution to journalArticlepeer-review

Harvard

Kukharev, GA, Maulenov, KS & Shchegoleva, NL 2021, 'Protecting facial images from recognition on social media: Solution methods and their perspective', Scientific and Technical Journal of Information Technologies, Mechanics and Optics, vol. 21, no. 5, pp. 755-766. https://doi.org/10.17586/2226-1494-2021-21-5-755-766

APA

Kukharev, G. A., Maulenov, K. S., & Shchegoleva, N. L. (2021). Protecting facial images from recognition on social media: Solution methods and their perspective. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 21(5), 755-766. https://doi.org/10.17586/2226-1494-2021-21-5-755-766

Vancouver

Kukharev GA, Maulenov KS, Shchegoleva NL. Protecting facial images from recognition on social media: Solution methods and their perspective. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2021 Sep 1;21(5):755-766. https://doi.org/10.17586/2226-1494-2021-21-5-755-766

Author

Kukharev, Georgy A. ; Maulenov, Kalybek S. ; Shchegoleva, Nadezhda L. / Protecting facial images from recognition on social media: Solution methods and their perspective. In: Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2021 ; Vol. 21, No. 5. pp. 755-766.

BibTeX

@article{f51183bd768348c18c7d51efac013d4f,
title = "Protecting facial images from recognition on social media: Solution methods and their perspective",
abstract = "The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.",
keywords = "De-identification, Deep learning, Face image protection, Fawkes procedurdeterministic recognition methods, Social networks, Unauthorized access",
author = "Kukharev, {Georgy A.} and Maulenov, {Kalybek S.} and Shchegoleva, {Nadezhda L.}",
year = "2021",
month = sep,
day = "1",
doi = "10.17586/2226-1494-2021-21-5-755-766",
language = "English",
volume = "21",
pages = "755--766",
journal = "Scientific and Technical Journal of Information Technologies, Mechanics and Optics",
issn = "2226-1494",
publisher = "НИУ ИТМО",
number = "5",

}

RIS

TY - JOUR

T1 - Protecting facial images from recognition on social media: Solution methods and their perspective

AU - Kukharev, Georgy A.

AU - Maulenov, Kalybek S.

AU - Shchegoleva, Nadezhda L.

PY - 2021/9/1

Y1 - 2021/9/1

N2 - The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.

AB - The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them — the “Fawkes” procedure. The proposed solution uses a comparative analysis of images subjected to the Fawkes-transformation procedure, representation and description of textural changes and features of structural damage in facial images. Multilevel parametric estimates of these damages were applied for their formal and numerical assessment. The reasons for the impossibility of using images of faces destroyed by the Fawkes procedure in deep learning tasks are explained. It has been theoretically proven and experimentally shown that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. It is argued that the use of simple preprocessing methods for facial images (subjected to the Fawkes procedure) at the entrance to convolutional neural networks can lead to their recognition with high efficiency, which destroys the myth about the importance of protecting facial images with the Fawkes-procedure.

KW - De-identification

KW - Deep learning

KW - Face image protection

KW - Fawkes procedurdeterministic recognition methods

KW - Social networks

KW - Unauthorized access

UR - http://www.scopus.com/inward/record.url?scp=85120991216&partnerID=8YFLogxK

U2 - 10.17586/2226-1494-2021-21-5-755-766

DO - 10.17586/2226-1494-2021-21-5-755-766

M3 - Article

AN - SCOPUS:85120991216

VL - 21

SP - 755

EP - 766

JO - Scientific and Technical Journal of Information Technologies, Mechanics and Optics

JF - Scientific and Technical Journal of Information Technologies, Mechanics and Optics

SN - 2226-1494

IS - 5

ER -

ID: 107582892