Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 3

Region proposal process in the training phase and in our algorithm.
(a) In training phase
(b) In our algorithm