Abstract
Grade research has to be replicable, thus the used data need to be publicly available. Speaking, e.g., about object detection task, where image data for autonomous driving also contain privacy information such as faces and license plates, the publication of data may be harmful to captured people. The solution to the moral dilemma is to anonymize the data. In this study, our aim is to investigate the effect of various anonymization techniques on the performance of algorithms that use such data. We discuss anonymization methods that remove and replace privacy data and select three methods to replace the privacy data: blurring, permutation, and replacing the area with a constant value. We adopted the Cityscapes dataset from which we extracted areas containing privacy information and are the manner of the anonymization methods. Our benchmark involves three famous object detectors: YOLOv3, Mask R-CNN with ResNet-50 backbone, and Mask R-CNN with Swin-T backbone. The results show that the impact of anonymization methods on the performance is negligible and the impact is similar for both convolutional-based and transformer-based backbones. Since the anonymization did not impact the model’s performance, we would recommend to anonymize datasets of this kind to prevent potential GDPR issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
paperswithcode.com/sota/object-detection-on-coco.
References
Bochkovskiy, A., Wang, C.Y., Liao, H.Y.M.: Yolov4: optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934 (2020)
Cao, Z., Hidalgo, G., Simon, T., Wei, S.E., Sheikh, Y.: Openpose: realtime multi-person 2D pose estimation using part affinity fields. IEEE Trans. Pattern Anal. Mach. Intell. 43(1), 172–186 (2019)
Cordts, M., et al.: The cityscapes dataset for semantic urban scene understanding. In: Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)
DeVries, T., Taylor, G.W.: Improved regularization of convolutional neural networks with cutout. arXiv preprint arXiv:1708.04552 (2017)
Dietlmeier, J., Antony, J., McGuinness, K., O’Connor, N.E.: How important are faces for person re-identification? In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 6912–6919. IEEE (2021)
Ge, Z., Liu, S., Wang, F., Li, Z., Sun, J.: Yolox: exceeding yolo series in 2021. arXiv preprint arXiv:2107.08430 (2021)
He, K., Gkioxari, G., Dollár, P., Girshick, R.: Mask r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2961–2969 (2017)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Hukkelås, H., Mester, R., Lindseth, F.: DeepPrivacy: a generative adversarial network for face anonymization. In: Bebis, G., et al. (eds.) ISVC 2019. LNCS, vol. 11844, pp. 565–578. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-33720-9_44
Isola, P., Zhu, J.Y., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1125–1134 (2017)
Klomp, S.R., van Rijn, M., Wijnhoven, R.G., Snoek, C.G., de With, P.H.: Safe fakes: evaluating face anonymizers for face detectors. arXiv preprint arXiv:2104.11721 (2021)
Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: International Conference on Computer Vision (ICCV) (2021)
Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)
Mandelli, S., Bondi, L., Lameri, S., Lipari, V., Bestagini, P., Tubaro, S.: Inpainting-based camera anonymization. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 1522–1526. IEEE (2017)
Maximov, M., Elezi, I., Leal-Taixé, L.: Ciagan: conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5447–5456 (2020)
Milakis, D., Thomopoulos, N., Van Wee, B.: Policy Implications of Autonomous Vehicles. Academic Press (2020)
Münch, D., Grosselfinger, A.-K., Krempel, E., Hebel, M., Arens, M.: Data anonymization for data protection on publicly recorded data. In: Tzovaras, D., Giakoumis, D., Vincze, M., Argyros, A. (eds.) ICVS 2019. LNCS, vol. 11754, pp. 245–258. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34995-0_23
Oliver, P.: The Student’s Guide to Research Ethics. McGraw-Hill Education (UK) (2010)
Pan, Y.L., Chen, J.C., Wu, J.L.: A multi-factor combinations enhanced reversible privacy protection system for facial images. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2021)
Redmon, J., Farhadi, A.: Yolov3: an incremental improvement. arXiv preprint arXiv:1804.02767 (2018)
Ren, Z., Lee, Y.J., Ryoo, M.S.: Learning to anonymize faces for privacy preserving action detection. In: Proceedings of the European conference on computer vision (ECCV), pp. 620–636 (2018)
Ruchaud, N., Dugelay, J.L.: Automatic face anonymization in visual data: are we really well protected? Electron. Imaging 2016(15), 1–7 (2016)
Schnabel, L., Matzka, S., Stellmacher, M., Pätzold, M., Matthes, E.: Impact of anonymization on vehicle detector performance. In: 2019 Second International Conference on Artificial Intelligence for Industries (AI4I), pp. 30–34. IEEE (2019)
Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)
Shen, Z., Lai, W.S., Xu, T., Kautz, J., Yang, M.H.: Exploiting semantics for face image deblurring. Int. J. Comput. Vis. 128(7), 1829–1846 (2020)
Sutskever, I., Martens, J., Dahl, G., Hinton, G.: On the importance of initialization and momentum in deep learning. In: International Conference on Machine Learning, pp. 1139–1147. PMLR (2013)
Taeihagh, A., Lim, H.S.M.: Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transp. Rev. 39(1), 103–128 (2019)
Tu, X., et al.: Joint face image restoration and frontalization for recognition. IEEE Trans. Circ. Syst. Video Technol. (2021)
Varma, G., Subramanian, A., Namboodiri, A., Chandraker, M., Jawahar, C.: IDD: a dataset for exploring problems of autonomous navigation in unconstrained environments. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1743–1751. IEEE (2019)
Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)
Vlašánek, P.: F-transform in image inpainting applications. In: 2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), pp. 562–566. IEEE (2018)
Wang, C.Y., Bochkovskiy, A., Liao, H.Y.M.: Scaled-yolov4: scaling cross stage partial network. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 13029–13038 (2021)
Wiles, R., Clark, A., Prosser, J., et al.: Visual research ethics at the crossroads. Sage Vis. Methods 1 (2011)
Yang, S., Luo, P., Loy, C.C., Tang, X.: Wider face: a face detection benchmark. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5525–5533 (2016)
Yu, F., Xian, W., Chen, Y., Liu, F., Liao, M., Madhavan, V., Darrell, T.: Bdd100k: a diverse driving video database with scalable annotation tooling. 2(5), 6 (2018). arXiv preprint arXiv:1805.04687
Zhong, Z., Zheng, L., Kang, G., Li, S., Yang, Y.: Random erasing data augmentation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 13001–13008 (2020)
Acknowledgement
The work is partially supported by grant SGS17/PřF-MF/2022.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Dvořáček, P., Hurtik, P. (2022). What Is the Cost of Privacy?. In: Ciucci, D., et al. Information Processing and Management of Uncertainty in Knowledge-Based Systems. IPMU 2022. Communications in Computer and Information Science, vol 1602. Springer, Cham. https://doi.org/10.1007/978-3-031-08974-9_55
Download citation
DOI: https://doi.org/10.1007/978-3-031-08974-9_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08973-2
Online ISBN: 978-3-031-08974-9
eBook Packages: Computer ScienceComputer Science (R0)