Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Algorithm 1

Stealth algorithm for detection system.
Input: Image , model , , iteration number , invisible cloak thickness .
Output: Adversarial image .
Initialize: , .
while do
,
,
,
,
,
end while
,
return .