Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Table 2
Privacy insurance of each category after using Stealth algorithm on ZF-net and VGG-net.
| | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | PI |
| ZF | 0.99 | 0.75 | 0.87 | 1.00 | 0.84 | 0.97 | 0.85 | 0.47 | 0.86 | 0.85 | 0.98 | 0.23 | 0.74 | 0.34 | 0.70 | 0.95 | 0.90 | 1.00 | 0.99 | 0.96 | 0.82 | VGG | 1.00 | 0.70 | 0.87 | 0.87 | 1.00 | 0.73 | 0.85 | 0.31 | 0.92 | 0.95 | 0.99 | 0.95 | 0.92 | 0.39 | 0.93 | 0.94 | 0.98 | 0.99 | 0.95 | 0.80 | 0.85 |
|
|