Research Article

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

Figure 7

Different ways of fooling detection machine. Assume that the user shares many pictures and then tries to protect their privacy by different methods of image scrambling. Obviously our veil algorithm can protect the most privacy. Mosaic comes second, but it has destructive effects on image itself.