Semi-adversarial Networks: Convolutional Autoencoders for Imparting Privacy to Face Images

In this paper, we design and evaluate a convolutional autoencoder that perturbs an input face image to impart privacy to a subject. Specifically, the proposed autoencoder transforms an input face image such that the transformed image can be successfully used for face recognition but not for gender classification. In order to train this autoencoder, we propose a novel training scheme, referred to as semi-adversarial training in this work. The training is facilitated by attaching a semi-adversarial module consisting of an auxiliary gender classifier and an auxiliary face matcher to the autoencoder. The objective function utilized for training this network has three terms: one to ensure that the perturbed image is a realistic face image; another to ensure that the gender attributes of the face are confounded; and a third to ensure that biometric recognition performance due to the perturbed image is not impacted. Extensive experiments confirm the efficacy of the proposed architecture in extending gender privacy to face images.

[1]  Ralph Gross,et al.  Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[2]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[3]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[4]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[5]  Tieniu Tan,et al.  Demographic Analysis from Biometric Data: Achievements, Challenges, and New Frontiers , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Arun Ross,et al.  Privacy of Facial Soft Biometrics: Suppressing Gender But Retaining Identity , 2014, ECCV Workshops.

[7]  Wen Gao,et al.  High-Resolution Face Fusion for Gender Conversion , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Arun Ross,et al.  Soft biometric privacy: Retaining biometric utility of face images while perturbing gender , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[9]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[10]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[11]  Sebastian Raschka,et al.  Python Machine Learning , 2015 .

[12]  Els J. Kindt,et al.  Privacy and Data Protection Issues of Biometric Applications , 2013 .

[13]  Arun Ross,et al.  What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Edoardo M. Airoldi,et al.  Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.

[15]  Xiaoming Liu,et al.  Attribute preserved face de-identification , 2015, 2015 International Conference on Biometrics (ICB).

[16]  Li Zhang,et al.  Controllable Face Privacy , 2015, 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG).

[17]  Yong Xiang,et al.  Protection of Privacy in Biometric Data , 2016, IEEE Access.

[18]  Duncan Rowland,et al.  Manipulating facial appearance through shape and color , 1995, IEEE Computer Graphics and Applications.

[19]  David A. McAllester,et al.  Cascade object detection with deformable part models , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[20]  Aleix M. Martinez,et al.  The AR face database , 1998 .

[21]  Martín Abadi,et al.  TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.

[22]  Stephen Milborrow The MUCT Landmarked Face Database , 2010 .

[23]  Aleksander Madry,et al.  Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.

[24]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[25]  Xiaogang Wang,et al.  Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).

[26]  Terrance E. Boult,et al.  Are facial attributes adversarially robust? , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[27]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.