Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Algorithm 1
Stealth algorithm for detection system.
Input: Image , model , , iteration number , invisible cloak thickness . | Output: Adversarial image . | Initialize: , . | while do | , | , | , | , | , | end while | , | return . |
|