Controllable Face Privacy
Title | Controllable Face Privacy |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Sim, T., Zhang, L. |
Conference Name | 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG) |
Publisher | IEEE |
ISBN Number | 978-1-4799-6026-2 |
Keywords | Cameras, Computer vision, computer vision analysis, controllable face privacy concept, data privacy, Detectors, Face, face de-identification, face encoding scheme, face images, face recognition, facial attributes, identity alteration control, Image coding, k-anonymity mechanism, L-diversity mechanism, mutually orthogonal subspaces, privacy, privacy-protection mechanisms, pubcrawl170113, Shape, subspace decomposition, t-closeness mechanism, Training, visual analytics |
Abstract | We present the novel concept of Controllable Face Privacy. Existing methods that alter face images to conceal identity inadvertently also destroy other facial attributes such as gender, race or age. This all-or-nothing approach is too harsh. Instead, we propose a flexible method that can independently control the amount of identity alteration while keeping unchanged other facial attributes. To achieve this flexibility, we apply a subspace decomposition onto our face encoding scheme, effectively decoupling facial attributes such as gender, race, age, and identity into mutually orthogonal subspaces, which in turn enables independent control of these attributes. Our method is thus useful for nuanced face de-identification, in which only facial identity is altered, but others, such gender, race and age, are retained. These altered face images protect identity privacy, and yet allow other computer vision analyses, such as gender detection, to proceed unimpeded. Controllable Face Privacy is therefore useful for reaping the benefits of surveillance cameras while preventing privacy abuse. Our proposal also permits privacy to be applied not just to identity, but also to other facial attributes as well. Furthermore, privacy-protection mechanisms, such as k-anonymity, L-diversity, and t-closeness, may be readily incorporated into our method. Extensive experiments with a commercial facial analysis software show that our alteration method is indeed effective. |
URL | https://ieeexplore.ieee.org/document/7285018 |
DOI | 10.1109/FG.2015.7285018 |
Citation Key | sim_controllable_2015 |
- identity alteration control
- visual analytics
- Training
- t-closeness mechanism
- subspace decomposition
- Shape
- pubcrawl170113
- privacy-protection mechanisms
- privacy
- mutually orthogonal subspaces
- L-diversity mechanism
- k-anonymity mechanism
- Image coding
- Cameras
- facial attributes
- face recognition
- face images
- face encoding scheme
- face de-identification
- Face
- Detectors
- data privacy
- controllable face privacy concept
- computer vision analysis
- computer vision