Результаты исследований: Научные публикации в периодических изданиях › статья в журнале по материалам конференции › Рецензирование
CAN I PROTECT MY FACE IMAGE from RECOGNITION? / Kukharev, Georgy; Maulenov, Kalybek; Shchegoleva, Nadezhda.
в: CEUR Workshop Proceedings, Том 3041, 01.01.2021, стр. 514-518.Результаты исследований: Научные публикации в периодических изданиях › статья в журнале по материалам конференции › Рецензирование
}
TY - JOUR
T1 - CAN I PROTECT MY FACE IMAGE from RECOGNITION?
AU - Kukharev, Georgy
AU - Maulenov, Kalybek
AU - Shchegoleva, Nadezhda
N1 - Conference code: 9
PY - 2021/1/1
Y1 - 2021/1/1
N2 - The "Fawkes" procedure is discussed as a method of protection against unauthorized use and recognition of facial images from social networks. As an example, the results of an experiment are given, confirming the fact of a low result of face image recognition within CNN, when the Fawkes procedure is applied with the parameter mode = "high". Based on a comparative analysis with the original images of faces, textural changes and graphical features of the structural destruction of images subjected to the Fawkes procedure are shown. In addition to this analysis, multilevel parametric estimates of these destructions are given and, on their basis, the reason for the impossibility of recognizing images of faces subjected to the Fawkes procedure, as well as their use in deep learning problems, is explained. The structural similarity index (ISSIM) and phase correlation of images are used as quantitative assessment tools. It is also noted that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. For this purpose, models of two simple systems for recognizing face images subjected to the Fawkes procedure are proposed, and the results of the experiments performed are presented. It is argued that the use of simple face image recognition systems in a computer complex with CNN will make it possible to train such complexes and destroy the myth about the possibility of protecting face images. In conclusion, the question is posed as to whether it is possible to protect your face from recognition.
AB - The "Fawkes" procedure is discussed as a method of protection against unauthorized use and recognition of facial images from social networks. As an example, the results of an experiment are given, confirming the fact of a low result of face image recognition within CNN, when the Fawkes procedure is applied with the parameter mode = "high". Based on a comparative analysis with the original images of faces, textural changes and graphical features of the structural destruction of images subjected to the Fawkes procedure are shown. In addition to this analysis, multilevel parametric estimates of these destructions are given and, on their basis, the reason for the impossibility of recognizing images of faces subjected to the Fawkes procedure, as well as their use in deep learning problems, is explained. The structural similarity index (ISSIM) and phase correlation of images are used as quantitative assessment tools. It is also noted that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. For this purpose, models of two simple systems for recognizing face images subjected to the Fawkes procedure are proposed, and the results of the experiments performed are presented. It is argued that the use of simple face image recognition systems in a computer complex with CNN will make it possible to train such complexes and destroy the myth about the possibility of protecting face images. In conclusion, the question is posed as to whether it is possible to protect your face from recognition.
KW - De-identification
KW - Deep learning
KW - Deterministic recognition methods
KW - Face image protection
KW - Fawkes procedure
KW - Social networks
KW - Unauthorized access to photo
UR - http://www.scopus.com/inward/record.url?scp=85121577140&partnerID=8YFLogxK
M3 - Conference article
AN - SCOPUS:85121577140
VL - 3041
SP - 514
EP - 518
JO - CEUR Workshop Proceedings
JF - CEUR Workshop Proceedings
SN - 1613-0073
T2 - 9th International Conference "Distributed Computing and Grid Technologies in Science and Education", GRID 2021
Y2 - 5 July 2021 through 9 July 2021
ER -
ID: 107583706