Privacy preservation through makeup transfer for facial feature obfuscation
Automated facial recognition can infer sensitive attributes from facial images without consent, posing substantial privacy risks. Existing adversarial perturbation methods often degrade visual fidelity and compromise identity utility. We propose makeup-transfer obfuscation GAN (MTO-GAN), which uses...
Saved in:
Published in | The Journal of supercomputing Vol. 81; no. 13 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer Nature B.V
21.08.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Automated facial recognition can infer sensitive attributes from facial images without consent, posing substantial privacy risks. Existing adversarial perturbation methods often degrade visual fidelity and compromise identity utility. We propose makeup-transfer obfuscation GAN (MTO-GAN), which uses makeup-inspired perturbations to obfuscate soft biometric traits while preserving realism and recognition performance. Methodologically, (i) an entropy-increase perspective motivates the use of adversarial noise; (ii) a density-ratio-to-probabilistic-classification reformulation with a Siamese objective estimates and mitigates domain shift while alleviating conflicts with cycle consistency; and (iii) a lightweight domain regularization module based on RRDB denoises and harmonizes features to stabilize the cycle. To address the challenges of large-scale facial image privacy computation and extreme computational load in deep learning, we employ GPU-accelerated parallel inference to meet throughput and latency requirements. Experiments across four public face datasets and five face recognizers show that MTO-GAN drives age and race predictability toward random-guessing levels while largely preserving identity verification, and it improves perceptual quality over prior perturbation approaches. Overall, MTO-GAN achieves a favorable balance among privacy protection, visual fidelity, and identity utility. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1573-0484 0920-8542 1573-0484 |
DOI: | 10.1007/s11227-025-07756-z |