Visible to the public Controllable Face Privacy

TitleControllable Face Privacy
Publication TypeConference Paper
Year of Publication2015
AuthorsSim, T., Zhang, L.
Conference Name2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)
PublisherIEEE
ISBN Number978-1-4799-6026-2
KeywordsCameras, Computer vision, computer vision analysis, controllable face privacy concept, data privacy, Detectors, Face, face de-identification, face encoding scheme, face images, face recognition, facial attributes, identity alteration control, Image coding, k-anonymity mechanism, L-diversity mechanism, mutually orthogonal subspaces, privacy, privacy-protection mechanisms, pubcrawl170113, Shape, subspace decomposition, t-closeness mechanism, Training, visual analytics
Abstract

We present the novel concept of Controllable Face Privacy. Existing methods that alter face images to conceal identity inadvertently also destroy other facial attributes such as gender, race or age. This all-or-nothing approach is too harsh. Instead, we propose a flexible method that can independently control the amount of identity alteration while keeping unchanged other facial attributes. To achieve this flexibility, we apply a subspace decomposition onto our face encoding scheme, effectively decoupling facial attributes such as gender, race, age, and identity into mutually orthogonal subspaces, which in turn enables independent control of these attributes. Our method is thus useful for nuanced face de-identification, in which only facial identity is altered, but others, such gender, race and age, are retained. These altered face images protect identity privacy, and yet allow other computer vision analyses, such as gender detection, to proceed unimpeded. Controllable Face Privacy is therefore useful for reaping the benefits of surveillance cameras while preventing privacy abuse. Our proposal also permits privacy to be applied not just to identity, but also to other facial attributes as well. Furthermore, privacy-protection mechanisms, such as k-anonymity, L-diversity, and t-closeness, may be readily incorporated into our method. Extensive experiments with a commercial facial analysis software show that our alteration method is indeed effective.

URLhttps://ieeexplore.ieee.org/document/7285018
DOI10.1109/FG.2015.7285018
Citation Keysim_controllable_2015