Differentially Private Obfuscation of Facial Images

The pervasiveness of camera technology in every-day life begets a modern reality in which images of individuals are routinely captured on a daily basis. Although this has enabled many benefits, it also infringes on personal privacy. To mitigate the loss of privacy, researchers have investigated methods of facial obfuscation in images. A promising direction has been the work in the k-same family of methods which employ the concept of k-anonymity from database privacy. However, there are a number of deficiencies of k-anonymity which carry over to the k-same methods, detracting from their usefulness in practice. In this paper, we first outline several of these deficiencies and discuss their implications in the context of facial obfuscation. We then develop the first framework to apply the formal privacy guarantee of differential privacy to facial obfuscation in generative machine learning models for images. Next, we discuss the theoretical improvements in the privacy guarantee which make this approach more appropriate for practical usage. Our approach provides a provable privacy guarantee which is not susceptible to the outlined deficiencies of k-same obfuscation and produces photo-realistic obfuscated output. Finally, while our approach provides a stronger privacy guarantee, we demonstrate through experimental comparisons that it can achieve comparable utility to k-same approaches in the context of preservation of demographic information in the images. The preservation of such information is of particular importance for enabling effective data mining on the obfuscated images.

[1]  Blaz Meden,et al.  κ-Same-Net: Neural-Network-Based Face Deidentification , 2017, 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI).

[2]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[3]  Liyue Fan,et al.  Image Pixelization with Differential Privacy , 2018, DBSec.

[4]  Shree K. Nayar,et al.  Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.

[5]  Thomas Brox,et al.  Learning to Generate Chairs, Tables and Cars with Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Adam D. Smith,et al.  Composition attacks and auxiliary information in data privacy , 2008, KDD.

[7]  A. Brand,et al.  European Best Practice Guidelines for Quality Assurance, Provision and Use of Genome-based Information and Technologies: the 2012 Declaration of Rome , 2012, Drug metabolism and drug interactions.

[8]  L. D. Harmon The recognition of faces. , 1973, Scientific American.

[9]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[10]  Yu Hen Hu,et al.  Face de-identification using facial identity preserving features , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[11]  Fan Chen,et al.  How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control , 2017, Multimedia Tools and Applications.

[12]  Marco Zennaro,et al.  Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[13]  B Julesz,et al.  Masking in Visual Recognition: Effects of Two-Dimensional Filtered Noise , 1973, Science.

[14]  Touradj Ebrahimi,et al.  Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[15]  Anirban Basu,et al.  k-anonymity: Risks and the Reality , 2015, TrustCom 2015.

[16]  D. Lundqvist,et al.  Karolinska Directed Emotional Faces , 2015 .

[17]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[18]  Edoardo M. Airoldi,et al.  Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.

[19]  Touradj Ebrahimi,et al.  Using face morphing to protect privacy , 2013, 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance.

[20]  Andrea Cavallaro,et al.  Privacy in Video Surveillance [In the Spotlight] , 2007 .

[21]  Skyler T. Hawk,et al.  Presentation and validation of the Radboud Faces Database , 2010 .

[22]  Tal Hassner,et al.  Age and gender classification using convolutional neural networks , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[23]  Erik Blasch,et al.  GARP-face: Balancing privacy protection and utility preservation in face de-identification , 2014, IEEE International Joint Conference on Biometrics.

[24]  Ting Yu,et al.  What are customers looking at? , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[25]  Ralph Gross,et al.  Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[26]  Timothy F. Cootes,et al.  Active Appearance Models , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[27]  Catuscia Palamidessi,et al.  Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.

[28]  Katie Shilton,et al.  Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices , 2016, Inf. Soc..

[29]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[30]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[31]  Mahadev Satyanarayanan,et al.  OpenFace: A general-purpose face recognition library with mobile applications , 2016 .

[32]  Craig A. Knoblock,et al.  A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..

[33]  Bernhard Rinner,et al.  Security and Privacy Protection in Visual Sensor Networks , 2014, ACM Comput. Surv..

[34]  P. L. Venetianer,et al.  Video verification of point of sale transactions , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[35]  Hongxin Hu,et al.  Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..

[36]  Jean-Philippe Domenger,et al.  Face de-identification with expressions preservation , 2015, 2015 IEEE International Conference on Image Processing (ICIP).

[37]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..