Nothing Special   »   [go: up one dir, main page]

Skip to main content

Abstract

Grade research has to be replicable, thus the used data need to be publicly available. Speaking, e.g., about object detection task, where image data for autonomous driving also contain privacy information such as faces and license plates, the publication of data may be harmful to captured people. The solution to the moral dilemma is to anonymize the data. In this study, our aim is to investigate the effect of various anonymization techniques on the performance of algorithms that use such data. We discuss anonymization methods that remove and replace privacy data and select three methods to replace the privacy data: blurring, permutation, and replacing the area with a constant value. We adopted the Cityscapes dataset from which we extracted areas containing privacy information and are the manner of the anonymization methods. Our benchmark involves three famous object detectors: YOLOv3, Mask R-CNN with ResNet-50 backbone, and Mask R-CNN with Swin-T backbone. The results show that the impact of anonymization methods on the performance is negligible and the impact is similar for both convolutional-based and transformer-based backbones. Since the anonymization did not impact the model’s performance, we would recommend to anonymize datasets of this kind to prevent potential GDPR issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://gitlab.com/irafm-ai/ipmu-2022-anonymization.

  2. 2.

    paperswithcode.com/sota/object-detection-on-coco.

References

  1. Bochkovskiy, A., Wang, C.Y., Liao, H.Y.M.: Yolov4: optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934 (2020)

  2. Cao, Z., Hidalgo, G., Simon, T., Wei, S.E., Sheikh, Y.: Openpose: realtime multi-person 2D pose estimation using part affinity fields. IEEE Trans. Pattern Anal. Mach. Intell. 43(1), 172–186 (2019)

    Article  Google Scholar 

  3. Cordts, M., et al.: The cityscapes dataset for semantic urban scene understanding. In: Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)

    Google Scholar 

  4. DeVries, T., Taylor, G.W.: Improved regularization of convolutional neural networks with cutout. arXiv preprint arXiv:1708.04552 (2017)

  5. Dietlmeier, J., Antony, J., McGuinness, K., O’Connor, N.E.: How important are faces for person re-identification? In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 6912–6919. IEEE (2021)

    Google Scholar 

  6. Ge, Z., Liu, S., Wang, F., Li, Z., Sun, J.: Yolox: exceeding yolo series in 2021. arXiv preprint arXiv:2107.08430 (2021)

  7. He, K., Gkioxari, G., Dollár, P., Girshick, R.: Mask r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2961–2969 (2017)

    Google Scholar 

  8. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  9. Hukkelås, H., Mester, R., Lindseth, F.: DeepPrivacy: a generative adversarial network for face anonymization. In: Bebis, G., et al. (eds.) ISVC 2019. LNCS, vol. 11844, pp. 565–578. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-33720-9_44

    Chapter  Google Scholar 

  10. Isola, P., Zhu, J.Y., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1125–1134 (2017)

    Google Scholar 

  11. Klomp, S.R., van Rijn, M., Wijnhoven, R.G., Snoek, C.G., de With, P.H.: Safe fakes: evaluating face anonymizers for face detectors. arXiv preprint arXiv:2104.11721 (2021)

  12. Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: International Conference on Computer Vision (ICCV) (2021)

    Google Scholar 

  13. Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101 (2017)

  14. Mandelli, S., Bondi, L., Lameri, S., Lipari, V., Bestagini, P., Tubaro, S.: Inpainting-based camera anonymization. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 1522–1526. IEEE (2017)

    Google Scholar 

  15. Maximov, M., Elezi, I., Leal-Taixé, L.: Ciagan: conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 5447–5456 (2020)

    Google Scholar 

  16. Milakis, D., Thomopoulos, N., Van Wee, B.: Policy Implications of Autonomous Vehicles. Academic Press (2020)

    Google Scholar 

  17. Münch, D., Grosselfinger, A.-K., Krempel, E., Hebel, M., Arens, M.: Data anonymization for data protection on publicly recorded data. In: Tzovaras, D., Giakoumis, D., Vincze, M., Argyros, A. (eds.) ICVS 2019. LNCS, vol. 11754, pp. 245–258. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34995-0_23

    Chapter  Google Scholar 

  18. Oliver, P.: The Student’s Guide to Research Ethics. McGraw-Hill Education (UK) (2010)

    Google Scholar 

  19. Pan, Y.L., Chen, J.C., Wu, J.L.: A multi-factor combinations enhanced reversible privacy protection system for facial images. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6. IEEE (2021)

    Google Scholar 

  20. Redmon, J., Farhadi, A.: Yolov3: an incremental improvement. arXiv preprint arXiv:1804.02767 (2018)

  21. Ren, Z., Lee, Y.J., Ryoo, M.S.: Learning to anonymize faces for privacy preserving action detection. In: Proceedings of the European conference on computer vision (ECCV), pp. 620–636 (2018)

    Google Scholar 

  22. Ruchaud, N., Dugelay, J.L.: Automatic face anonymization in visual data: are we really well protected? Electron. Imaging 2016(15), 1–7 (2016)

    Article  Google Scholar 

  23. Schnabel, L., Matzka, S., Stellmacher, M., Pätzold, M., Matthes, E.: Impact of anonymization on vehicle detector performance. In: 2019 Second International Conference on Artificial Intelligence for Industries (AI4I), pp. 30–34. IEEE (2019)

    Google Scholar 

  24. Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815–823 (2015)

    Google Scholar 

  25. Shen, Z., Lai, W.S., Xu, T., Kautz, J., Yang, M.H.: Exploiting semantics for face image deblurring. Int. J. Comput. Vis. 128(7), 1829–1846 (2020)

    Article  Google Scholar 

  26. Sutskever, I., Martens, J., Dahl, G., Hinton, G.: On the importance of initialization and momentum in deep learning. In: International Conference on Machine Learning, pp. 1139–1147. PMLR (2013)

    Google Scholar 

  27. Taeihagh, A., Lim, H.S.M.: Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transp. Rev. 39(1), 103–128 (2019)

    Article  Google Scholar 

  28. Tu, X., et al.: Joint face image restoration and frontalization for recognition. IEEE Trans. Circ. Syst. Video Technol. (2021)

    Google Scholar 

  29. Varma, G., Subramanian, A., Namboodiri, A., Chandraker, M., Jawahar, C.: IDD: a dataset for exploring problems of autonomous navigation in unconstrained environments. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1743–1751. IEEE (2019)

    Google Scholar 

  30. Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)

    Google Scholar 

  31. Vlašánek, P.: F-transform in image inpainting applications. In: 2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), pp. 562–566. IEEE (2018)

    Google Scholar 

  32. Wang, C.Y., Bochkovskiy, A., Liao, H.Y.M.: Scaled-yolov4: scaling cross stage partial network. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 13029–13038 (2021)

    Google Scholar 

  33. Wiles, R., Clark, A., Prosser, J., et al.: Visual research ethics at the crossroads. Sage Vis. Methods 1 (2011)

    Google Scholar 

  34. Yang, S., Luo, P., Loy, C.C., Tang, X.: Wider face: a face detection benchmark. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 5525–5533 (2016)

    Google Scholar 

  35. Yu, F., Xian, W., Chen, Y., Liu, F., Liao, M., Madhavan, V., Darrell, T.: Bdd100k: a diverse driving video database with scalable annotation tooling. 2(5), 6 (2018). arXiv preprint arXiv:1805.04687

  36. Zhong, Z., Zheng, L., Kang, G., Li, S., Yang, Y.: Random erasing data augmentation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 13001–13008 (2020)

    Google Scholar 

Download references

Acknowledgement

The work is partially supported by grant SGS17/PřF-MF/2022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Petr Dvořáček .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dvořáček, P., Hurtik, P. (2022). What Is the Cost of Privacy?. In: Ciucci, D., et al. Information Processing and Management of Uncertainty in Knowledge-Based Systems. IPMU 2022. Communications in Computer and Information Science, vol 1602. Springer, Cham. https://doi.org/10.1007/978-3-031-08974-9_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08974-9_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08973-2

  • Online ISBN: 978-3-031-08974-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics