Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 5

(a) Original images; (b) original results; (c) adversarial perturbations (×20 to show more clearly); (d) processed images; (e) new results.
(a)
(b)
(c)
(d)
(e)