Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Algorithm 1
Stealth algorithm for detection system.
| Input: Image , model , , iteration number , invisible cloak thickness . | | Output: Adversarial image . | | Initialize: , . | | while do | | , | | , | | , | | , | | , | | end while | | , | | return . |
|