Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 4

The original and processed image through a DNN detector.