Standard

CAN I PROTECT MY FACE IMAGE from RECOGNITION? / Kukharev, Georgy; Maulenov, Kalybek; Shchegoleva, Nadezhda.

в: CEUR Workshop Proceedings, Том 3041, 01.01.2021, стр. 514-518.

Результаты исследований: Научные публикации в периодических изданияхстатья в журнале по материалам конференцииРецензирование

Harvard

Kukharev, G, Maulenov, K & Shchegoleva, N 2021, 'CAN I PROTECT MY FACE IMAGE from RECOGNITION?', CEUR Workshop Proceedings, Том. 3041, стр. 514-518.

APA

Kukharev, G., Maulenov, K., & Shchegoleva, N. (2021). CAN I PROTECT MY FACE IMAGE from RECOGNITION? CEUR Workshop Proceedings, 3041, 514-518.

Vancouver

Kukharev G, Maulenov K, Shchegoleva N. CAN I PROTECT MY FACE IMAGE from RECOGNITION? CEUR Workshop Proceedings. 2021 Янв. 1;3041:514-518.

Author

Kukharev, Georgy ; Maulenov, Kalybek ; Shchegoleva, Nadezhda. / CAN I PROTECT MY FACE IMAGE from RECOGNITION?. в: CEUR Workshop Proceedings. 2021 ; Том 3041. стр. 514-518.

BibTeX

@article{142ac4832e3b4b04a8ee1e7a3b538726,
title = "CAN I PROTECT MY FACE IMAGE from RECOGNITION?",
abstract = "The {"}Fawkes{"} procedure is discussed as a method of protection against unauthorized use and recognition of facial images from social networks. As an example, the results of an experiment are given, confirming the fact of a low result of face image recognition within CNN, when the Fawkes procedure is applied with the parameter mode = {"}high{"}. Based on a comparative analysis with the original images of faces, textural changes and graphical features of the structural destruction of images subjected to the Fawkes procedure are shown. In addition to this analysis, multilevel parametric estimates of these destructions are given and, on their basis, the reason for the impossibility of recognizing images of faces subjected to the Fawkes procedure, as well as their use in deep learning problems, is explained. The structural similarity index (ISSIM) and phase correlation of images are used as quantitative assessment tools. It is also noted that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. For this purpose, models of two simple systems for recognizing face images subjected to the Fawkes procedure are proposed, and the results of the experiments performed are presented. It is argued that the use of simple face image recognition systems in a computer complex with CNN will make it possible to train such complexes and destroy the myth about the possibility of protecting face images. In conclusion, the question is posed as to whether it is possible to protect your face from recognition.",
keywords = "De-identification, Deep learning, Deterministic recognition methods, Face image protection, Fawkes procedure, Social networks, Unauthorized access to photo",
author = "Georgy Kukharev and Kalybek Maulenov and Nadezhda Shchegoleva",
year = "2021",
month = jan,
day = "1",
language = "English",
volume = "3041",
pages = "514--518",
journal = "CEUR Workshop Proceedings",
issn = "1613-0073",
publisher = "RWTH Aahen University",
note = "9th International Conference {"}Distributed Computing and Grid Technologies in Science and Education{"}, GRID 2021 ; Conference date: 05-07-2021 Through 09-07-2021",
url = "https://indico.jinr.ru/event/1086/overview",

}

RIS

TY - JOUR

T1 - CAN I PROTECT MY FACE IMAGE from RECOGNITION?

AU - Kukharev, Georgy

AU - Maulenov, Kalybek

AU - Shchegoleva, Nadezhda

N1 - Conference code: 9

PY - 2021/1/1

Y1 - 2021/1/1

N2 - The "Fawkes" procedure is discussed as a method of protection against unauthorized use and recognition of facial images from social networks. As an example, the results of an experiment are given, confirming the fact of a low result of face image recognition within CNN, when the Fawkes procedure is applied with the parameter mode = "high". Based on a comparative analysis with the original images of faces, textural changes and graphical features of the structural destruction of images subjected to the Fawkes procedure are shown. In addition to this analysis, multilevel parametric estimates of these destructions are given and, on their basis, the reason for the impossibility of recognizing images of faces subjected to the Fawkes procedure, as well as their use in deep learning problems, is explained. The structural similarity index (ISSIM) and phase correlation of images are used as quantitative assessment tools. It is also noted that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. For this purpose, models of two simple systems for recognizing face images subjected to the Fawkes procedure are proposed, and the results of the experiments performed are presented. It is argued that the use of simple face image recognition systems in a computer complex with CNN will make it possible to train such complexes and destroy the myth about the possibility of protecting face images. In conclusion, the question is posed as to whether it is possible to protect your face from recognition.

AB - The "Fawkes" procedure is discussed as a method of protection against unauthorized use and recognition of facial images from social networks. As an example, the results of an experiment are given, confirming the fact of a low result of face image recognition within CNN, when the Fawkes procedure is applied with the parameter mode = "high". Based on a comparative analysis with the original images of faces, textural changes and graphical features of the structural destruction of images subjected to the Fawkes procedure are shown. In addition to this analysis, multilevel parametric estimates of these destructions are given and, on their basis, the reason for the impossibility of recognizing images of faces subjected to the Fawkes procedure, as well as their use in deep learning problems, is explained. The structural similarity index (ISSIM) and phase correlation of images are used as quantitative assessment tools. It is also noted that facial images subjected to the Fawkes procedure are well recognized outside of deep learning methods. For this purpose, models of two simple systems for recognizing face images subjected to the Fawkes procedure are proposed, and the results of the experiments performed are presented. It is argued that the use of simple face image recognition systems in a computer complex with CNN will make it possible to train such complexes and destroy the myth about the possibility of protecting face images. In conclusion, the question is posed as to whether it is possible to protect your face from recognition.

KW - De-identification

KW - Deep learning

KW - Deterministic recognition methods

KW - Face image protection

KW - Fawkes procedure

KW - Social networks

KW - Unauthorized access to photo

UR - http://www.scopus.com/inward/record.url?scp=85121577140&partnerID=8YFLogxK

M3 - Conference article

AN - SCOPUS:85121577140

VL - 3041

SP - 514

EP - 518

JO - CEUR Workshop Proceedings

JF - CEUR Workshop Proceedings

SN - 1613-0073

T2 - 9th International Conference "Distributed Computing and Grid Technologies in Science and Education", GRID 2021

Y2 - 5 July 2021 through 9 July 2021

ER -

ID: 107583706