0.00 0.10
0.20 0.30 0.40
0.50
0.00
0.20
0.40
0.60
Distortion
Prediction
Seam Replaced
Random
Figure 7: Resnet50 predictions on 608 distorted bird im-
ages.
classes is becoming equally likely (i.e. maximum en-
tropy). The seam carving approach is levelling out at
about 3-4% for the 50% distorted images.
4.2 Experimental Issues and Future
Work
We are careful to note several issues with our ex-
perimental setup and exposition. We use ResNet50
as an example of a deep CNN. However, this was
trained with 1000 classes that include many other
non-bird classes. Specifically, ResNet50 includes
chainlink fence, windows screen, and jigsaw puzzle.
The seam carving moves the bird images closer in ap-
pearance to these classes. If the deep CNN was re-
stricted to only bird images, it may not be so easily
fooled. Future work is to train a more modest CNN
on a restricted set of classes and evaluating other Im-
ageNet categories. Future work also includes using
different energy functions such as histogram of gradi-
ents and entropy (Avidan and Shamir, 2007).
5 CONCLUSIONS
In this paper, we presented the seam doppelganger ap-
proach for privacy preserving images. The paper de-
tailed how redundant pixels can be identified using
the seam carving technique and then replaced. This
produced distorted, though still human recognisable,
images. We also demonstrated how the image can be
restored to a close facsimile of the original, though
with some objectionable artefacts. We then showed
how the distorted images degraded the accuracy per-
formance of a leading edge image classifier.
ACKNOWLEDGEMENTS
This work was supported in part by the University
of Montevallo Contract #19-0501-001. The authors
greatly appreciate the support of the staff involved in
the project. Without their efforts this research could
not have been conducted.
REFERENCES
(Fall 2011 Release). ImageNet: Explore WordNet Structure.
Avidan, S. and Shamir, A. (2007). Seam carving for
content-aware image resizing. ACM Trans. Graph.,
26(3):10–es.
Das, N., Shanbhogue, M., Chen, S.-T., Hohman, F., Chen,
L., Kounavis, M. E., and Chau, D. H. (2017). Keeping
the bad guys out: Protecting and Vaccinating Deep
Learning with JPEG Compression.
Kumar, A., Verma, S., and Mangla, H. (2018). A sur-
vey of deep learning techniques in speech recogni-
tion. In 2018 International Conference on Advances
in Computing, Communication Control and Network-
ing (ICACCCN), pages 179–185.
Liu, Z., Liu, Q., Liu, T., Xu, N., Lin, X., Wang, Y., and
Wen, W. (2019). Feature distillation: DNN-oriented
JPEG compression against adversarial examples. In
2019 IEEE/CVF Conference on Computer Vision and
Pattern Recognition (CVPR), pages 860–868.
Moosavi-Dezfooli, S., Fawzi, A., and Frossard, P. (2016).
DeepFool: A Simple and Accurate Method to Fool
Deep Neural Networks. In 2016 IEEE Conference
on Computer Vision and Pattern Recognition (CVPR),
pages 2574–2582.
Pope, J. (2020 (accessed September 16, 2020)). Seam
Doppelganger on Open Science Foundation.
https://osf.io/gmn97/.
Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S.,
Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bern-
stein, M., Berg, A. C., and Fei-Fei, L. (2014). Ima-
genet large scale visual recognition challenge.
Sanchez-Matilla, R., Li, C. Y., Shahin Shamsabad, A., Maz-
zon, R., and Cavallaro, A. (2020). Exploiting vulnera-
bilities of deep neural networks for privacy protection.
IEEE Transactions on Multimedia, pages 1–1.
Simonyan, K. and Zisserman, A. (2014). Very deep convo-
lutional networks for large-scale image recognition.
Traore, B. B., Kamsu-Foguem, B., and Tangara, F. (2018).
Deep convolution neural network for image recogni-
tion. Ecological Informatics, 48:257 – 268.
ICPRAM 2021 - 10th International Conference on Pattern Recognition Applications and Methods
274