Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Figure 5
(a) Original images; (b) original results; (c) adversarial perturbations (×20 to show more clearly); (d) processed images; (e) new results.
(a) |
(b) |
(c) |
(d) |
(e) |