Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Figure 6
Images processed by diverse methods of disturbing are detected by the detection framework based on Faster RCNN. Each two horizontal images compose a pair, respectively, representing processed images and the results from the detector.
| (a) |
| (b) |
| (c) |
| (d) |
| (e) |
| (f) |
| (g) |
| (h) |
| (i) |
| (j) |
| (k) |
| (l) |