Safeguarding Identities with GAN-based Face Anonymization
Received: 17 April 2024 | Revised: 6 May 2024 | Accepted: 8 May 2024 | Online: 18 June 2024
Corresponding author: Mahmoud Ahmad Al-Khasawneh
Abstract
Effective anonymous facial registration techniques are critical to address privacy concerns arising from facial recognition technology. This study presents an intelligent anonymity platform that incorporates blockchain with advanced privacy and uses a CIAGAN-powered approach. This solution addresses the immediate need for privacy in facial recognition technology. The proposed system uses advanced techniques to anonymously generate highly realistic and effective facial images. The widespread use of facial recognition systems places greater emphasis on privacy concerns, emphasizing the need for strong enrollment mechanisms. The proposed system uses CIAGAN to address this challenge and generate facial images while preserving important attributes. Blockchain storage ensures that data integrity and security are maintained. The process begins with detailed image preprocessing steps to improve data quality and eliminate unwanted noise. CIAGAN can generate anonymous face images with important facial attributes to complicate the recognition of specific objects. A dataset of 202,599 facial images was used. Performance metrics such as PSNR and SSIM indicate image quality and uniformity. The PSNR obtained was 35.0516, indicating a unique image anonymization process.
Keywords:
facial recognition, CIAGAN, blockchainDownloads
References
M. Haider AbdAlkreem, R. Sadoon Salman, and F. Khiled Al-Jibory, "Detect People’s Faces and Protect Them by Providing High Privacy Based on Deep Learning," Tehnički glasnik, vol. 18, no. 1, pp. 92–99, Feb. 2024.
Y. Said, M. Barr, and H. E. Ahmed, "Design of a Face Recognition System based on Convolutional Neural Network (CNN)," Engineering, Technology & Applied Science Research, vol. 10, no. 3, pp. 5608–5612, Jun. 2020.
D. Virmani, P. Girdhar, P. Jain, and P. Bamdev, "FDREnet: Face Detection and Recognition Pipeline," Engineering, Technology & Applied Science Research, vol. 9, no. 2, pp. 3933–3938, Apr. 2019.
Y. Kortli, M. Jridi, A. Al Falou, and M. Atri, "Face Recognition Systems: A Survey," Sensors, vol. 20, no. 2, Jan. 2020, Art. no. 342.
H. M. Al-Dabbas, R. A. Azeez, and A. E. Ali, "Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence," Engineering, Technology & Applied Science Research, vol. 14, no. 2, pp. 13706–13713, Apr. 2024.
S. Jana, A. Narayanan, and V. Shmatikov, "A Scanner Darkly: Protecting User Privacy from Perceptual Applications," in 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, Feb. 2013, pp. 349–363.
A. I. Awad, A. Babu, E. Barka, and K. Shuaib, "AI-powered biometrics for Internet of Things security: A review and future vision," Journal of Information Security and Applications, vol. 82, May 2024, Art. no. 103748.
E. Kavoliūnaitė-Ragauskienė, "Right to Privacy and Data Protection Concerns Raised by the Development and Usage of Face Recognition Technologies in the European Union," Journal of Human Rights Practice, Jan. 2024.
L. Yang et al., "Exploring the role of computer vision in product design and development: a comprehensive review," International Journal on Interactive Design and Manufacturing (IJIDeM), Mar. 2024.
R. K. Shukla and A. K. Tiwari, "Security Analysis of the Cyber Crime," in The Ethical Frontier of AI and Data Analysis, IGI Global, 2024, pp. 257–271.
G. Kaur et al., "Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime," Engineering Proceedings, vol. 62, no. 1, 2024, Art. no. 6.
A. Kammoun, R. Slama, H. Tabia, T. Ouni, and M. Abid, "Generative Adversarial Networks for Face Generation: A Survey," ACM Computing Surveys, vol. 55, no. 5, Sep. 2022, Art. no. 94.
S. Arman, T. Yang, S. Shahed, A. Mazroa, A. Attiah, and L. Mohaisen, "A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions," Computers, Materials & Continua, vol. 78, no. 2, pp. 2087–2110, 2024.
H. Albalawi, "Human Recognition Theory and Facial Recognition Technology: A Topic Modeling Approach to Understanding the Ethical Implication of a Developing Algorithmic Technologies Landscape on How We View Ourselves and Are Viewed by Others," Ph.D. dissertation, University of Central Florida, 2023.
L. Arbuckle and K. E. Emam, Building an Anonymization Pipeline: Creating Safe Data. Sebastopol, CA, USA: O’Reilly Media, Inc., 2020.
P. Ohm, "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," UCLA Law Review, vol. 57, 2010, Art. no. 1701.
R. H. Weber and U. I. Heinrich, Anonymization. Springer Science & Business Media, 2012.
T. Li and L. Lin, "AnonymousNet: Natural Face De-Identification With Measurable Privacy," in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, Jun. 2019, pp. 56–65.
D. Saxena and J. Cao, "Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions," ACM Computing Surveys, vol. 54, no. 3, Feb. 2021, Art. no. 63.
V. Asokan, "Handling Class Imbalance Using Generative Adversarial Network (GAN) and Convolutional Neural Network (CNN)," University of Reading, UK, Sep. 2021.
W. Zhang, "Generating Adversarial Examples in One Shot With Image-to-Image Translation GAN," IEEE Access, vol. 7, pp. 151103–151119, 2019.
I. Goodfellow et al., "Generative Adversarial Nets," in Advances in Neural Information Processing Systems, 2014, vol. 27.
E. M. Newton, L. Sweeney, and B. Malin, "Preserving privacy by de-identifying face images," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 2, pp. 232–243, Oct. 2005.
R. Gross, E. Airoldi, B. Malin, and L. Sweeney, "Integrating Utility into Face De-identification," in Privacy Enhancing Technologies, 2006, pp. 227–242.
C. Neustaedter, S. Greenberg, and M. Boyle, "Blur filtration fails to preserve privacy for home-based video conferencing," ACM Transactions on Computer-Human Interaction, vol. 13, no. 1, pp. 1–36, Nov. 2006.
W. M. S. Yafooz, E. A. Hizam, and W. A. Alromema, "Arabic Sentiment Analysis on Chewing Khat Leaves using Machine Learning and Ensemble Methods," Engineering, Technology & Applied Science Research, vol. 11, no. 2, pp. 6845–6848, Apr. 2021.
H. Chi and Y. H. Hu, "Face de-identification using facial identity preserving features," in 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Sep. 2015, pp. 586–590.
K. Brkic, I. Sikiric, T. Hrkac, and Z. Kalafatic, "I Know That Person: Generative Full Body and Face De-identification of People in Images," in 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA, Jul. 2017, pp. 1319–1328.
Y. Li and S. Lyu, "De-identification Without Losing Faces," in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France, Apr. 2019, pp. 83–88.
J. Chen, J. Konrad, and P. Ishwar, “VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Salt Lake City, UT, USA, Jun. 2018, pp. 1651–165109.
M. Maximov, I. Elezi, and L. Leal-Taixé, "CIAGAN: Conditional Identity Anonymization Generative Adversarial Networks," in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, Jun. 2020, pp. 5446–5455.
H. Choudhury, B. Goswami, and S. K. Gurung, "CovidChain: An Anonymity Preserving Blockchain Based Framework for Protection Against Covid-19," Information Security Journal: A Global Perspective, Sep. 2021.
M. U. Hassan, M. H. Rehmani, and J. Chen, "Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions," Future Generation Computer Systems, vol. 97, pp. 512–529, Aug. 2019.
Face Recognition Technology (FERET), NIST. [Online]. Available: https://www.nist.gov/programs-projects/face-recognition-technology-feret.
T. E. Boult, "PICO: Privacy through Invertible Cryptographic Obscuration," in Computer Vision for Interactive and Intelligent Environment (CVIIE’05), Lexington, KY, USA, Aug. 2005, pp. 27–38.
D. Chen, Y. Chang, R. Yan, and J. Yang, "Protecting Personal Identification in Video," in Protecting Privacy in Video Surveillance, A. Senior, Ed. London, UK: Springer, 2009, pp. 115–128.
R. Cucchiara, A. Prati, and R. Vezzani, "Advanced video surveillance with pan tilt zoom cameras," in Proceedings of the 6th IEEE International Workshop on Visual Surveillance, 2006, pp. 334–352.
A. Melle and J. L. Dugelay, "Scrambling faces for privacy protection using background self-similarities," in 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, Jul. 2014, pp. 6046–6050.
D. Kasikrit, "AT&T Database of Faces." https://www.kaggle.com/datasets/kasikrit/att-database-of-faces.
M. Xuan and J. Jiang, "Video Security Algorithm Aiming at the Need of Privacy Protection," in 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, Tianjin, China, Dec. 2009, vol. 5, pp. 473–477.
S. Barattin, C. Tzelepis, I. Patras, and N. Sebe, "Attribute-Preserving Face Dataset Anonymization via Latent Code Optimization," in 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Vancouver, BC, Canada, Jun. 2023, pp. 8001–8010.
"cifar10 | TensorFlow Datasets." https://www.tensorflow.org/datasets/catalog/cifar10.
"The CMU Multi-PIE Face Database." https://www.cs.cmu.edu/afs/cs/project/PIE/MultiPie/Multi-Pie/Home.html.
S. Alver, "chokepoint-bbs." 2022. https://github.com/alversafa/chokepoint-bbs.
"FERG-DB." https://grail.cs.washington.edu/projects/deepexpr/ferg-2d-db.html.
Z. Ren, Y. J. Lee, and M. S. Ryoo, "Learning to Anonymize Faces for Privacy Preserving Action Detection," presented at the Proceedings of the European Conference on Computer Vision (ECCV), 2018, pp. 620–636, Accessed: May 25, 2024.
H. Jhuang, J. Gall, S. Zuffi, C. Schmid, and M. J. Black, "JHMDB Dataset." http://jhmdb.is.tue.mpg.de/.
A. E. Yahya, A. Gharbi, W. M. S. Yafooz, and A. Al-Dhaqm, “A Novel Hybrid Deep Learning Model for Detecting and Classifying Non-Functional Requirements of Mobile Apps Issues,” Electronics, vol. 12, no. 5, Jan. 2023, Art. no. 125810.3390/.
M. Kawulok, M. E. Celebi, and B. Smolka, "Labeled Faces in the Wild." University Of Massachusetts, 2016.
Z. Liu, P. Luo, X. Wang, and X. Tang, "Large-scale CelebFaces Attributes (CelebA) Dataset." Available: https://mmlab.ie.cuhk.edu.hk/projects/CelebA.html.
S. I. Alqahtani, W. M. S. Yafooz, A. Alsaeedi, L. Syed, and R. Alluhaibi, "Children's Safety on YouTube: A Systematic Review," Applied Sciences, vol. 13, no. 6, Jan. 2023, Art. no. 4044.
T. Li and L. Lin, "AnonymousNet: Natural Face De-Identification With Measurable Privacy," in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Long Beach, CA, USA, Jun. 2019, pp. 56–65.
Downloads
How to Cite
License
Copyright (c) 2024 Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.