Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2021

12-03-2021

Obfuscation of images via differential privacy: From facial images to general images

Authors: William L. Croft, Jörg-Rüdiger Sack, Wei Shi

Published in: Peer-to-Peer Networking and Applications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the pervasiveness of image capturing devices in every-day life, images of individuals are routinely captured. Although this has enabled many benefits, it also infringes on personal privacy. A promising direction in research on obfuscation of facial images has been the work in the k-same family of methods which employ the concept of k-anonymity from database privacy. However, there are a number of deficiencies of k-anonymity that carry over to the k-same methods, detracting from their usefulness in practice. In this paper, we first outline several of these deficiencies and discuss their implications in the context of facial obfuscation. We then develop a framework through which we obtain a formal differentially private guarantee for the obfuscation of facial images in generative machine learning models. Our approach provides a provable privacy guarantee that is not susceptible to the outlined deficiencies of k-same obfuscation and produces photo-realistic obfuscated output. In addition, we demonstrate through experimental comparisons that our approach can achieve comparable utility to k-same obfuscation in terms of preservation of useful features in the images. Furthermore, we propose a method to achieve differential privacy for any image (i.e., without restriction to facial images) through the direct modification of pixel intensities. Although the addition of noise to pixel intensities does not provide the high visual quality obtained via generative machine learning models, it offers greater versatility by eliminating the need for a trained model. We demonstrate that our proposed use of the exponential mechanism in this context is able to provide superior visual quality to pixel-space obfuscation using the Laplace mechanism.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
28.
go back to reference Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: 13th international conference on artificial intelligence and statistics, vol 9, pp 249–256 Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: 13th international conference on artificial intelligence and statistics, vol 9, pp 249–256
32.
go back to reference Harmon L (1973) The recognition of faces. Scientific American 229(5):71–82CrossRef Harmon L (1973) The recognition of faces. Scientific American 229(5):71–82CrossRef
44.
go back to reference Li Y, Vishwamitra N, Knijnenburg BP, Hu H, Caine K (2017) Blur vs. Block: Investigating the effectiveness of privacy-enhancing obfuscation for images. In: IEEE conference on computer vision and pattern recognition workshops, pp 1343–1351, https://doi.org/10.1109/CVPRW.2017.176 Li Y, Vishwamitra N, Knijnenburg BP, Hu H, Caine K (2017) Blur vs. Block: Investigating the effectiveness of privacy-enhancing obfuscation for images. In: IEEE conference on computer vision and pattern recognition workshops, pp 1343–1351, https://​doi.​org/​10.​1109/​CVPRW.​2017.​176
47.
go back to reference Lundqvist D, Flykt A, Öhman A (1998) The Karolinska directed emotional faces – KDEF. ISBN 91-630-7164-9 Lundqvist D, Flykt A, Öhman A (1998) The Karolinska directed emotional faces – KDEF. ISBN 91-630-7164-9
58.
go back to reference Nissim K, Bembenek A, Wood A, Bun M, Gaboardi M, Gasser U, O’Brien DR, Vadhan S (2018) Bridging the gap between computer science and legal approaches to privacy. Harvard Journal of Law & Technology 31:687–780 Nissim K, Bembenek A, Wood A, Bun M, Gaboardi M, Gasser U, O’Brien DR, Vadhan S (2018) Bridging the gap between computer science and legal approaches to privacy. Harvard Journal of Law & Technology 31:687–780
61.
go back to reference Parkhi O M, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference Parkhi O M, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference
66.
go back to reference Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression. Tech.rep., Computer Science Laboratory, SRI International Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression. Tech.rep., Computer Science Laboratory, SRI International
71.
go back to reference Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: 3rd international conference on learning representations
72.
go back to reference Song C, Shmatikov V (2020) Overlearning reveals sensitive attributes. In: 8th international conference on learning representations Song C, Shmatikov V (2020) Overlearning reveals sensitive attributes. In: 8th international conference on learning representations
74.
go back to reference Tian YL, Kanade T, Cohn JF (2005) Facial expression analysis. In: Li S., Jain A. (eds) Handbook of face recognition, chap. 11, pp 247–275. Springer Science+Business Media Inc Tian YL, Kanade T, Cohn JF (2005) Facial expression analysis. In: Li S., Jain A. (eds) Handbook of face recognition, chap. 11, pp 247–275. Springer Science+Business Media Inc
75.
go back to reference Triastcyn A, Faltings B (2018) Generating differentially private datasets using GANs CoRR Triastcyn A, Faltings B (2018) Generating differentially private datasets using GANs CoRR
80.
go back to reference Xie L, Lin K, Wang S, Wang F, Zhou J (2018) Differentially private generative adversarial network CoRR Xie L, Lin K, Wang S, Wang F, Zhou J (2018) Differentially private generative adversarial network CoRR
81.
go back to reference Zhang X, Ji S, Wang T (2018) Differentially private releasing via deep generative model CoRR Zhang X, Ji S, Wang T (2018) Differentially private releasing via deep generative model CoRR
Metadata
Title
Obfuscation of images via differential privacy: From facial images to general images
Authors
William L. Croft
Jörg-Rüdiger Sack
Wei Shi
Publication date
12-03-2021
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2021
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01091-9

Other articles of this Issue 3/2021

Peer-to-Peer Networking and Applications 3/2021 Go to the issue

Premium Partner