DeepObfuscator: Obfuscating Intermediate Representations with Privacy-Preserving Adversarial Learning on Smartphones

Ang Li,Jiayi Guo,Huanrui Yang,Flora D. Salim,Yiran Chen
DOI: https://doi.org/10.1145/3450268.3453519
2019-01-01
Abstract:Deep learning has been widely applied in many computer vision applications,with remarkable success. However, running deep learning models on mobiledevices is generally challenging due to the limitation of computing resources.A popular alternative is to use cloud services to run deep learning models toprocess raw data. This, however, imposes privacy risks. Some prior artsproposed sending the features extracted from raw data to the cloud.Unfortunately, these extracted features can still be exploited by attackers torecover raw images and to infer embedded private attributes. In this paper, wepropose an adversarial training framework, DeepObfuscator, which prevents theusage of the features for reconstruction of the raw images and inference ofprivate attributes. This is done while retaining useful information for theintended cloud service. DeepObfuscator includes a learnable obfuscator that isdesigned to hide privacy-related sensitive information from the features byperforming our proposed adversarial training algorithm. The proposed algorithmis designed by simulating the game between an attacker who makes efforts toreconstruct raw image and infer private attributes from the extracted featuresand a defender who aims to protect user privacy. By deploying the trainedobfuscator on the smartphone, features can be locally extracted and then sentto the cloud. Our experiments on CelebA and LFW datasets show that the qualityof the reconstructed images from the obfuscated features of the raw image isdramatically decreased from 0.9458 to 0.3175 in terms of multi-scale structuralsimilarity. The person in the reconstructed image, hence, becomes hardly to bere-identified. The classification accuracy of the inferred private attributesthat can be achieved by the attacker is significantly reduced to arandom-guessing level.
What problem does this paper attempt to address?