Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 1

The general process of obtaining privacy through online photos.