Key point differential privacy-driven face image privacy protection method

A face image and differential privacy technology, which is applied in the field of face image privacy protection driven by key point differential privacy, can solve the problems of infringing on the privacy of others, the image is not realistic enough, and the original face image is changed, so as to achieve the high quality of the generated image, Efficient and beautiful privacy protection, good data availability and visual effects

Pending Publication Date: 2022-03-11
HANGZHOU DIANZI UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] All the problems and dilemmas mentioned above can be boiled down to one question: given an image of a face, how can we create another image with a similar appearance and the same background, while the real identity is hidden, and the face detector can still Work? Traditional anonymization techniques are mainly based on obfuscation and always significantly change the original face image
Most of its current deep learning methods generate images that are not realistic enough or use other people's ids to fuse with their own non-identity information to achieve anonymity, but there will be suspicion of violating other people's privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key point differential privacy-driven face image privacy protection method
  • Key point differential privacy-driven face image privacy protection method
  • Key point differential privacy-driven face image privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The present invention will be further described below in conjunction with drawings and embodiments.

[0072] Face key point identification privacy protection technology based on generative confrontation network. For the specific overall architecture flow chart, please refer to figure 1 As shown in the anonymization flow chart, please refer to figure 2 Shown, define the key point identification of the face refer to image 3 Shown:

[0073] The technical solution adopted by the present invention to solve its technical problems comprises the following steps:

[0074] Step 1: Data preprocessing;

[0075] 1-1. Data preparation.

[0076] Select the face data sets CelebA-HQ and VGGFACE2, and use the face key point detector (such as facealignment, dlib) to detect the face data set images to obtain the face key points.

[0077] 1-2. Construct key point identification anonymous space.

[0078] Analyze the key points to get 16 identity-related components that may contain id...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key point differential privacy-driven face image privacy protection method, which comprises the following steps of: firstly, carrying out data preprocessing, and constructing a key point identification anonymous space; then constructing an anonymous face generative adversarial network structure, and determining an anonymous face generative adversarial network optimization objective function; obtaining an improved differential privacy algorithm applied to anonymous face key point identification; and finally, training the anonymous face generative adversarial network through the preprocessed data set, and outputting a final result. According to the method, the face key point structure of the face in the image is modified to realize face identity anonymity, better data availability and visual effect are obtained, the quality of the generated image is higher, the original non-identity attribute can be kept, and any attribute tag is not needed.

Description

technical field [0001] The invention belongs to the field of image privacy protection, and in particular relates to a face image privacy protection method driven by key point differential privacy. With the rapid development of the big data era, face data is one of the most easily leaked personal data, and its privacy security is seriously threatened. The present invention proposes a face image privacy protection technology driven by face key points. By using the differential privacy theory to anonymize the face key point identification, changing its facial geometric structure to realize the anonymization of face images to protect Identity Information. Background technique [0002] With the explosive growth of diversified Internet services and social network platforms, large-scale users interact with massive amounts of information on social network platforms, resulting in a huge amount of shared data mainly based on visual media in social networks. With the explosive growth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06N3/04G06N3/08
CPCG06F21/6254G06N3/08G06N3/045
Inventor 匡振中沈英杰俞俊
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products