AnonFACES: Anonymizing Faces Adjusted to Constraints on Efficacy and Security.
Minh-Ha LeMd Sakib Nizam KhanGeorgia TsaloliNiklas CarlssonSonja BucheggerPublished in: WPES@CCS (2020)
Keyphrases
- linear constraints
- access control
- information security
- face recognition
- constraint satisfaction
- constraint programming
- network security
- constrained optimization
- cyber security
- geometric constraints
- security issues
- private information
- security level
- computer vision
- resource constraints
- security policies
- privacy preserving
- face images
- information systems