Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Figure 5
(a) Original images; (b) original results; (c) adversarial perturbations (×20 to show more clearly); (d) processed images; (e) new results.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |