Safeguarding Identities with GAN-based Face Anonymization

Authors

  • Mahmoud Ahmad Al-Khasawneh School of Computing, Skyline University College, University City Sharjah, 1797, Sharjah, UAE | Jadara University Research Center, Jadara University, Jordan
  • Marwan Mahmoud The Applied College, King Abdulaziz University, Saudi Arabia
Volume: 14 | Issue: 4 | Pages: 15581-15589 | August 2024 | https://doi.org/10.48084/etasr.7527

Abstract

Effective anonymous facial registration techniques are critical to address privacy concerns arising from facial recognition technology. This study presents an intelligent anonymity platform that incorporates blockchain with advanced privacy and uses a CIAGAN-powered approach. This solution addresses the immediate need for privacy in facial recognition technology. The proposed system uses advanced techniques to anonymously generate highly realistic and effective facial images. The widespread use of facial recognition systems places greater emphasis on privacy concerns, emphasizing the need for strong enrollment mechanisms. The proposed system uses CIAGAN to address this challenge and generate facial images while preserving important attributes. Blockchain storage ensures that data integrity and security are maintained. The process begins with detailed image preprocessing steps to improve data quality and eliminate unwanted noise. CIAGAN can generate anonymous face images with important facial attributes to complicate the recognition of specific objects. A dataset of 202,599 facial images was used. Performance metrics such as PSNR and SSIM indicate image quality and uniformity. The PSNR obtained was 35.0516, indicating a unique image anonymization process.

Keywords:

facial recognition, CIAGAN, blockchain

Downloads

Download data is not yet available.

References

M. Haider AbdAlkreem, R. Sadoon Salman, and F. Khiled Al-Jibory, "Detect People’s Faces and Protect Them by Providing High Privacy Based on Deep Learning," Tehnički glasnik, vol. 18, no. 1, pp. 92–99, Feb. 2024.

Y. Said, M. Barr, and H. E. Ahmed, "Design of a Face Recognition System based on Convolutional Neural Network (CNN)," Engineering, Technology & Applied Science Research, vol. 10, no. 3, pp. 5608–5612, Jun. 2020.

D. Virmani, P. Girdhar, P. Jain, and P. Bamdev, "FDREnet: Face Detection and Recognition Pipeline," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 3933–3938, Apr. 2019.

Y. Kortli, M. Jridi, A. Al Falou, and M. Atri, "Face Recognition Systems: A Survey," Sensors, vol. 20, no. 2, Jan. 2020, Art. no. 342.

H. M. Al-Dabbas, R. A. Azeez, and A. E. Ali, "Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13706–13713, Apr. 2024.

S. Jana, A. Narayanan, and V. Shmatikov, "A Scanner Darkly: Protecting User Privacy from Perceptual Applications," in 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, Feb. 2013, pp. 349–363.

A. I. Awad, A. Babu, E. Barka, and K. Shuaib, "AI-powered biometrics for Internet of Things security: A review and future vision," Journal of Information Security and Applications, vol. 82, May 2024, Art. no. 103748.

E. Kavoliūnaitė-Ragauskienė, "Right to Privacy and Data Protection Concerns Raised by the Development and Usage of Face Recognition Technologies in the European Union," Journal of Human Rights Practice, Jan. 2024.

L. Yang et al., "Exploring the role of computer vision in product design and development: a comprehensive review," International Journal on Interactive Design and Manufacturing (IJIDeM), Mar. 2024.

R. K. Shukla and A. K. Tiwari, "Security Analysis of the Cyber Crime," in The Ethical Frontier of AI and Data Analysis, IGI Global, 2024, pp. 257–271.

G. Kaur et al., "Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime," Engineering Proceedings, vol. 62, no. 1, 2024, Art. no. 6.

A. Kammoun, R. Slama, H. Tabia, T. Ouni, and M. Abid, "Generative Adversarial Networks for Face Generation: A Survey," ACM Computing Surveys, vol. 55, no. 5, Sep. 2022, Art. no. 94.

S. Arman, T. Yang, S. Shahed, A. Mazroa, A. Attiah, and L. Mohaisen, "A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions," Computers, Materials & Continua, vol. 78, no. 2, pp. 2087–2110, 2024.

H. Albalawi, "Human Recognition Theory and Facial Recognition Technology: A Topic Modeling Approach to Understanding the Ethical Implication of a Developing Algorithmic Technologies Landscape on How We View Ourselves and Are Viewed by Others," Ph.D. dissertation, University of Central Florida, 2023.

L. Arbuckle and K. E. Emam, Building an Anonymization Pipeline: Creating Safe Data. Sebastopol, CA, USA: O’Reilly Media, Inc., 2020.

P. Ohm, "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," UCLA Law Review, vol. 57, 2010, Art. no. 1701.

R. H. Weber and U. I. Heinrich, Anonymization. Springer Science & Business Media, 2012.

T. Li and L. Lin, "AnonymousNet: Natural Face De-Identification With Measurable Privacy," in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, Jun. 2019, pp. 56–65.

D. Saxena and J. Cao, "Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions," ACM Computing Surveys, vol. 54, no. 3, Feb. 2021, Art. no. 63.

V. Asokan, "Handling Class Imbalance Using Generative Adversarial Network (GAN) and Convolutional Neural Network (CNN)," University of Reading, UK, Sep. 2021.

W. Zhang, "Generating Adversarial Examples in One Shot With Image-to-Image Translation GAN," IEEE Access, vol. 7, pp. 151103–151119, 2019.

I. Goodfellow et al., "Generative Adversarial Nets," in Advances in Neural Information Processing Systems, 2014, vol. 27.

E. M. Newton, L. Sweeney, and B. Malin, "Preserving privacy by de-identifying face images," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 2, pp. 232–243, Oct. 2005.

R. Gross, E. Airoldi, B. Malin, and L. Sweeney, "Integrating Utility into Face De-identification," in Privacy Enhancing Technologies, 2006, pp. 227–242.

C. Neustaedter, S. Greenberg, and M. Boyle, "Blur filtration fails to preserve privacy for home-based video conferencing," ACM Transactions on Computer-Human Interaction, vol. 13, no. 1, pp. 1–36, Nov. 2006.

W. M. S. Yafooz, E. A. Hizam, and W. A. Alromema, "Arabic Sentiment Analysis on Chewing Khat Leaves using Machine Learning and Ensemble Methods," Engineering, Technology & Applied Science Research, vol. 11, no. 2, pp. 6845–6848, Apr. 2021.

H. Chi and Y. H. Hu, "Face de-identification using facial identity preserving features," in 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Sep. 2015, pp. 586–590.

K. Brkic, I. Sikiric, T. Hrkac, and Z. Kalafatic, "I Know That Person: Generative Full Body and Face De-identification of People in Images," in 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, Jul. 2017, pp. 1319–1328.

Y. Li and S. Lyu, "De-identification Without Losing Faces," in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France, Apr. 2019, pp. 83–88.

J. Chen, J. Konrad, and P. Ishwar, “VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Salt Lake City, UT, USA, Jun. 2018, pp. 1651–165109.

M. Maximov, I. Elezi, and L. Leal-Taixé, "CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks," in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, Jun. 2020, pp. 5446–5455.

H. Choudhury, B. Goswami, and S. K. Gurung, "CovidChain: An Anonymity Preserving Blockchain Based Framework for Protection Against Covid-19," Information Security Journal: A Global Perspective, Sep. 2021.

M. U. Hassan, M. H. Rehmani, and J. Chen, "Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions," Future Generation Computer Systems, vol. 97, pp. 512–529, Aug. 2019.

Face Recognition Technology (FERET), NIST. [Online]. Available: https://www.nist.gov/programs-projects/face-recognition-technology-feret.

T. E. Boult, "PICO: Privacy through Invertible Cryptographic Obscuration," in Computer Vision for Interactive and Intelligent Environment (CVIIE’05), Lexington, KY, USA, Aug. 2005, pp. 27–38.

D. Chen, Y. Chang, R. Yan, and J. Yang, "Protecting Personal Identification in Video," in Protecting Privacy in Video Surveillance, A. Senior, Ed. London, UK: Springer, 2009, pp. 115–128.

R. Cucchiara, A. Prati, and R. Vezzani, "Advanced video surveillance with pan tilt zoom cameras," in Proceedings of the 6th IEEE International Workshop on Visual Surveillance, 2006, pp. 334–352.

A. Melle and J. L. Dugelay, "Scrambling faces for privacy protection using background self-similarities," in 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, Jul. 2014, pp. 6046–6050.

D. Kasikrit, "AT&T Database of Faces." https://www.kaggle.com/datasets/kasikrit/att-database-of-faces.

M. Xuan and J. Jiang, "Video Security Algorithm Aiming at the Need of Privacy Protection," in 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, Tianjin, China, Dec. 2009, vol. 5, pp. 473–477.

S. Barattin, C. Tzelepis, I. Patras, and N. Sebe, "Attribute-Preserving Face Dataset Anonymization via Latent Code Optimization," in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada, Jun. 2023, pp. 8001–8010.

"cifar10 | TensorFlow Datasets." https://www.tensorflow.org/datasets/catalog/cifar10.

"The CMU Multi-PIE Face Database." https://www.cs.cmu.edu/afs/cs/project/PIE/MultiPie/Multi-Pie/Home.html.

S. Alver, "chokepoint-bbs." 2022. https://github.com/alversafa/chokepoint-bbs.

"FERG-DB." https://grail.cs.washington.edu/projects/deepexpr/ferg-2d-db.html.

Z. Ren, Y. J. Lee, and M. S. Ryoo, "Learning to Anonymize Faces for Privacy Preserving Action Detection," presented at the Proceedings of the European Conference on Computer Vision (ECCV), 2018, pp. 620–636, Accessed: May 25, 2024.

H. Jhuang, J. Gall, S. Zuffi, C. Schmid, and M. J. Black, "JHMDB Dataset." http://jhmdb.is.tue.mpg.de/.

A. E. Yahya, A. Gharbi, W. M. S. Yafooz, and A. Al-Dhaqm, “A Novel Hybrid Deep Learning Model for Detecting and Classifying Non-Functional Requirements of Mobile Apps Issues,” Electronics, vol. 12, no. 5, Jan. 2023, Art. no. 125810.3390/.

M. Kawulok, M. E. Celebi, and B. Smolka, "Labeled Faces in the Wild." University Of Massachusetts, 2016.

Z. Liu, P. Luo, X. Wang, and X. Tang, "Large-scale CelebFaces Attributes (CelebA) Dataset." Available: https://mmlab.ie.cuhk.edu.hk/projects/CelebA.html.

S. I. Alqahtani, W. M. S. Yafooz, A. Alsaeedi, L. Syed, and R. Alluhaibi, "Children's Safety on YouTube: A Systematic Review," Applied Sciences, vol. 13, no. 6, Jan. 2023, Art. no. 4044.

T. Li and L. Lin, "AnonymousNet: Natural Face De-Identification With Measurable Privacy," in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, Jun. 2019, pp. 56–65.

Downloads

How to Cite

[1]
Al-Khasawneh, M.A. and Mahmoud, M. 2024. Safeguarding Identities with GAN-based Face Anonymization. Engineering, Technology & Applied Science Research. 14, 4 (Aug. 2024), 15581–15589. DOI:https://doi.org/10.48084/etasr.7527.

Metrics

Abstract Views: 320
PDF Downloads: 339

Metrics Information

Most read articles by the same author(s)