Research Article
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
Figure 6
Images processed by diverse methods of disturbing are detected by the detection framework based on Faster RCNN. Each two horizontal images compose a pair, respectively, representing processed images and the results from the detector.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |