Protecting Face Privacy via Beautification

Face images distributed widely on social networks are vulnerable to inferring sensitive information by unauthorized automatic identification systems, which poses a threat to user privacy. To protect face privacy, several methods have been proposed to generate highly transferable adversarial faces to...

Full description

Bibliographic Details
Main Author: WANG Tao, ZHANG Yushu, ZHAO Ruoyu, WEN Wenying, ZHU Youwen
Format: Article
Language:zho
Published: Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 2024-01-01
Series:Jisuanji kexue yu tansuo
Subjects:
Online Access:http://fcst.ceaj.org/fileup/1673-9418/PDF/2210098.pdf