Please use this identifier to cite or link to this item: http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/4555
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRana, K-
dc.contributor.authorPandey, A-
dc.contributor.authorGoyal, P-
dc.contributor.authorSingh, G-
dc.contributor.authorGoyal, P-
dc.date.accessioned2024-05-26T08:49:56Z-
dc.date.available2024-05-26T08:49:56Z-
dc.date.issued2024-05-26-
dc.identifier.urihttp://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/4555-
dc.description.abstractAbstract: Our generation is quite obsessed with technology and we like to share our personal information such as photos and videos on the internet via different social networking websites i.e. Facebook, Snapchat, Instagram, etc. Therefore, it becomes easier for others to breach our privacy and harm us in a direct or indirect way. Now, computerized systems have advanced due to the improvements in Machine Learning (ML) algorithms and Artificial Intelligence (AI). These algorithms can extract sensitive information such as face attributes, text information, etc. from images or videos and can be used for privacy breaching. In this paper, we propose a novel privacy protection method by adding intelligent noise to the image while preserving image aesthetics and attributes. We determine multiple attributes for an image such as baldness, smiling, gender, etc. and we intelligently add noise to particular regions of the image that define a particular attribute using the visual explanation technique i.e. GradCam++, thereby preserving the other attributes. The addition of noise is based on the idea of Fast Gradient Sign Method (FGSM) that maximizes the gradients of the loss of an input image to create a new adversarial image. We integrate FGSM adversarial image and GradCam++ output to affect particular attributes only and hence keeping the image human imperceptible. The experiment results show that our attack outperforms the existing attacks including naive FGSM, Projected Gradient Descent (PGD), Momentum Iterative Method (MIM), Shadow Attack (SA), and Fast Minimum Norm (FMN) in terms of preserving attributes and image visual quality, when evaluated on CelebA dataset.en_US
dc.language.isoen_USen_US
dc.subjectAdversarial perturbationen_US
dc.subjectVisual explanation techniquesen_US
dc.subjectSocial mediaen_US
dc.subjectConvolutional neural networksen_US
dc.titleA novel privacy protection approach with better human imperceptibilityen_US
dc.typeArticleen_US
Appears in Collections:Year-2023

Files in This Item:
File Description SizeFormat 
Full Text.pdf2.06 MBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.