|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910872182803321 |
|
|
Autore |
Wen Yunqian |
|
|
Titolo |
Face de-Identification |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing AG, , 2024 |
|
©2024 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9783031582226 |
9783031582219 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (195 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
LiuBo |
SongLi |
CaoJingyi |
XieRong |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Acknowledgments -- About the Book -- Contents -- Acronyms -- Part I Introduction -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Face Recognition and Face De-identification -- 1.2.1 Face Recognition -- 1.2.2 Face De-identification -- 1.3 Book Overview -- References -- 2 Facial Recognition Technology and the Privacy Risks -- 2.1 Face Recognition Technology -- 2.2 Threat Models and Privacy Risks -- 2.3 Regulations and Acts on Facial Data Privacy -- 2.4 Conclusion and Future Outlook -- References -- Part II Face De-identification Techniques -- 3 Overview of Face De-identification Techniques -- 3.1 Face Image De-identification -- 3.1.1 Obfuscation-Based Methods -- 3.1.2 k-Same Algorithm Based Methods -- 3.1.3 Adversarial Perturbation-Based Methods -- 3.1.4 Deep Generative Model-Based Methods -- 3.1.4.1 Attribute Manipulation-Based Methods -- 3.1.4.2 Conditional Inpainting-Based Methods -- 3.1.4.3 Identity Representation Manipulation-Based Methods -- 3.2 Face Video De-identification -- 3.2.1 Methods of Applying Image De-identification Methods to Videos -- 3.2.1.1 Methods of Applying Image Method Frame by Frame -- 3.2.1.2 Methods of Adding Smooth Transition Measures Between Frames -- 3.2.2 Methods Designed Specifically for |
|
|
|
|