{"id":"https://openalex.org/W7156918168","doi":"https://doi.org/10.48550/arxiv.2604.23688","title":"Do Protective Perturbations Really Protect Portrait Privacy under Real-world Image Transformations?","display_name":"Do Protective Perturbations Really Protect Portrait Privacy under Real-world Image Transformations?","publication_year":2026,"publication_date":"2026-04-26","ids":{"openalex":"https://openalex.org/W7156918168","doi":"https://doi.org/10.48550/arxiv.2604.23688"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.23688","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.23688","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.23688","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5134777284","display_name":"Ruiqing Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sun, Ruiqing","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115076523","display_name":"Xingshan Yao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yao, Xingshan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134751299","display_name":"Zhijing Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Zhijing","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134806282","display_name":"Tian Lan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lan, Tian","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134818954","display_name":"Chenhao Cui","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cui, Chenhao","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134804155","display_name":"Huiyang Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhao, Huiyang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134812283","display_name":"Jialing Shi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shi, Jialing","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5134801158","display_name":"Chen Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Chen","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5102573331","display_name":"XianLing Mao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mao, Xianling","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5134777284"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.11389999836683273,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.11389999836683273,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.10520000010728836,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.10520000010728836,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.58160001039505},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5249999761581421},{"id":"https://openalex.org/keywords/portrait","display_name":"Portrait","score":0.44200000166893005},{"id":"https://openalex.org/keywords/natural","display_name":"Natural (archaeology)","score":0.40529999136924744},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.37299999594688416},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.3068000078201294}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6284999847412109},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.58160001039505},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5249999761581421},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48649999499320984},{"id":"https://openalex.org/C162462552","wikidata":"https://www.wikidata.org/wiki/Q134307","display_name":"Portrait","level":2,"score":0.44200000166893005},{"id":"https://openalex.org/C2776608160","wikidata":"https://www.wikidata.org/wiki/Q4785462","display_name":"Natural (archaeology)","level":2,"score":0.40529999136924744},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40459999442100525},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.37299999594688416},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3666999936103821},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.3068000078201294},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2759999930858612},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C3017601658","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image enhancement","level":3,"score":0.2615000009536743},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.23688","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.23688","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.23688","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.23688","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.7640275359153748,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Proactive":[0],"defense":[1,65,107,133,149],"methods":[2,66,90,134],"protect":[3],"portrait":[4,111],"images":[5,31],"from":[6],"unauthorized":[7],"editing":[8],"or":[9],"talking":[10],"face":[11],"generation":[12,96],"(TFG)":[13],"by":[14,167,172],"introducing":[15],"pixel-level":[16,57,70,137],"protective":[17,186],"perturbations,":[18],"and":[19,39,44,101,112,115,121,126],"have":[20],"already":[21],"attracted":[22],"increasing":[23],"attention":[24],"for":[25,124],"privacy":[26],"protection.":[27],"In":[28],"real-world":[29,152,173],"scenarios,":[30],"inevitably":[32],"undergo":[33],"various":[34],"transformations":[35,43],"during":[36],"cross-device":[37],"display":[38],"dissemination--such":[40],"as":[41,99,104,106],"scale":[42],"color":[45],"compression--that":[46],"directly":[47],"alter":[48],"pixel":[49],"values.":[50],"However,":[51],"it":[52],"remains":[53],"unclear":[54],"whether":[55],"such":[56,98],"modifications":[58],"affect":[59],"the":[60,169,180,197],"effectiveness":[61],"of":[62,81,148],"existing":[63],"proactive":[64,83],"that":[67,132,179],"rely":[68],"on":[69,136],"perturbations.":[71],"To":[72,154],"solve":[73],"this":[74,157],"problem,":[75],"we":[76,159],"conduct":[77],"a":[78,146,161],"systematic":[79],"evaluation":[80],"representative":[82],"defenses":[84],"under":[85],"image":[86,143,174],"transformation.":[87],"The":[88],"evaluated":[89],"are":[91,116],"selected":[92],"to":[93,140,196],"span":[94],"different":[95],"architectures":[97],"diffusion":[100],"GAN-based":[102],"models,":[103],"well":[105],"scopes":[108],"covering":[109],"both":[110,119],"natural":[113],"images,":[114],"assessed":[117],"using":[118],"qualitative":[120],"quantitative":[122],"metrics":[123],"subjective":[125],"objective":[127],"comparison.":[128],"Experimental":[129,176],"results":[130,177],"indicate":[131],"based":[135],"perturbations":[138,187],"struggle":[139],"withstand":[141],"common":[142],"transformations,":[144],"posing":[145],"risk":[147],"failure":[150],"in":[151],"applications.":[153],"further":[155],"highlight":[156],"risk,":[158],"propose":[160],"simple":[162],"yet":[163],"effective":[164],"purification":[165],"framework":[166],"leveraging":[168],"vulnerabilities":[170],"induced":[171],"transformations.":[175],"demonstrate":[178],"proposed":[181],"method":[182],"can":[183],"efficiently":[184],"remove":[185],"with":[188],"low":[189],"computational":[190],"cost,":[191],"highlighting":[192],"previously":[193],"overlooked":[194],"risks":[195],"research":[198],"community.":[199]},"counts_by_year":[],"updated_date":"2026-04-29T06:16:36.941037","created_date":"2026-04-29T00:00:00"}
