Achieving Anonymity against Major Face Recognition Algorithms

An ever-increasing number of personal photos is stored online. This trend can be problematic, because face recognition software can undermine user privacy in unexpected ways. Face de-identification aims to prevent automatic recognition of faces thus improving user privacy, but previous work alters the image in a way that makes them indistinguishable for both computers and humans, which prevents a wide-spread use.

[1]  Alex Pentland,et al.  Bayesian face recognition , 2000, Pattern Recognit..

[2]  Harry Wechsler,et al.  The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..

[3]  Sandor Z. Der,et al.  FERET (Face Recognition Technology) Recognition Algorithm Development and Test Results. , 1996 .

[4]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[5]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[6]  R. Gross,et al.  Towards Real-World Face De-Identification , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[7]  Rama Chellappa,et al.  Discriminant Analysis for Recognition of Human Face Images (Invited Paper) , 1997, AVBPA.

[8]  Narendra Ahuja,et al.  Detecting Faces in Images: A Survey , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Bruce A. Draper,et al.  Analyzing PCA-based Face Recognition Algorithms: Eigenvector Selection and Distance Measures , 2003 .

[10]  Norbert Krüger,et al.  Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.

[11]  L. Sweeney,et al.  Preserving Privacy by De-identifying Facial Images , 2003 .

[12]  P. Jonathon Phillips Privacy Operating Characteristic for Privacy Protection in Surveillance Applications , 2005, AVBPA.

[13]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[14]  R. Chellappa,et al.  Subspace Linear Discriminant Analysis for Face Recognition , 1999 .

[15]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[16]  Rolf P. Würtz,et al.  Elastic Bunch Graph Matching , 2014, Scholarpedia.

[17]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[18]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[19]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[20]  Hyeonjoon Moon,et al.  The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[21]  Touradj Ebrahimi,et al.  Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[22]  Hartmut Neven,et al.  The Bochum/USC Face Recognition System And How it Fared in the FERET Phase III Test , 1998 .

[23]  Ralph Gross,et al.  Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[24]  Rama Chellappa,et al.  Discriminant analysis of principal components for face recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[25]  Philip Miller The Effect of Distance Measures on the Recognition Rates of PCA and LDA Based Facial Recognition , 2008 .

[26]  J. Ross Beveridge,et al.  Fall 2001 Update to CSU PCA Versus PCA+LDA Comparison , 2001 .

[27]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[28]  Xiaoou Tang,et al.  Dual-space linear discriminant analysis for face recognition , 2004, CVPR 2004.

[29]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[30]  Bruce A. Draper,et al.  The CSU Face Identification Evaluation System: Its Purpose, Features, and Structure , 2003, ICVS.

[31]  Laurent Amsaleg,et al.  Deluding image recognition in sift-based cbir systems , 2010, MiFor '10.

[32]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[33]  Sören Preibusch,et al.  Unwillingness to Pay for Privacy: A Field Experiment , 2011, SSRN Electronic Journal.

[34]  B. Draper,et al.  The CSU Face Identification Evaluation System User ’ s Guide : Version 4 . 0 , 2002 .

[35]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[36]  John T. Stasko,et al.  Evaluating image filtering based techniques in media space applications , 1998, CSCW '98.