1 Introduction

Visual data is shared publicly at unprecedented scales through social media. At the same time, however, advanced image retrieval and face recognition algorithms, enabled by deep neural networks and large-scale training datasets, allow to index and recognize privacy relevant information more reliably than ever. To address this exploding privacy threat, methods for reliable identity obfuscation are crucial. Ideally, such a method should not only effectively hide the identity information but also preserve the realism of the visual data, i.e., make obfuscated people look realistic.

Existing techniques for identity obfuscation have evolved from simply covering the face with often unpleasant occluders, such as black boxes or mosaics, to more advanced methods that produce natural images [1,2,3]. These methods either perturb the imagery in an imperceptible way to confuse specific recognition algorithms [2, 3], or substantially modify the appearance of the people in the images, thus making them unrecognizable even for generic recognition algorithms and humans [1]. Among the latter category, recent work [1] leverages a generative adversarial network (GAN) to inpaint the head region conditioned on facial landmarks. It achieves state-of-the-art performance in terms of both recognition rate and image quality. However, due to the lack of controllability of the image generation process, the results of such a purely data-driven method inevitably exhibit artifacts by inpainting faces of unfitting face pose, expression or implausible shape. In contrast, parametric face models [4] give us complete control of facial attributes and have demonstrated compelling results for applications such as face reconstruction, expression transfer and visual dubbing [4,5,6]. Importantly, using a parametric face model allows to control the identify of a person as well as to preserve attributes such as face pose and expression by rendering and blending an altered face over the original image. However, this naive face replacement yields unsatisfactory results, since (1) fine level details cannot be synthesized by the model, (2) imperfect blending leads to unnatural output images and (3) only the face region is obfuscated while the larger head and hair regions, which also contain a lot of identity information, remain untouched.

In this paper, we propose a novel approach that combines a data-driven method and a parametric face model, and therefore leverages the best of two worlds. To this end, we disentangle and solve our problem in two stages (see Fig. 1): In the first stage, we replace the face region in the image with a rendered face of a different identity. To this end we replace the identity related component of the original person in the parameter vector of the face model while preserving attributes of original facial expression. In the second stage, a GAN is trained to synthesize the complete head image given the rendered face and an obfuscated region around the head as conditional inputs. In this stage, the missing region in the input is inpainted and fine grained details are added, resulting in a photo-realistic output image. Our qualitative and quantitative evaluations show that our approach significantly outperforms the baseline methods on publicly available datasets with both lower recognition rate and higher image quality.

2 Related Work

Identity Obfuscation. Blurring the face region or covering it with occluders, such as a mosaic or a black bar, are still the predominant techniques for visual identity obfuscation in photos and videos. The performance of these methods in concealing identity against machine recognition systems has been studied in [7, 8]. They show that these simple techniques not only introduce unpleasant artifacts, but also become less effective due to the improvement of CNN-based recognition methods. Hiding the identity information while preserving the photorealism of images is still an unsolved problem. Only a few works have attempted to tackle this problem.

For target-specific obfuscations, Sharif et al. [3] and Oh et al. [2] used adversarial example based methods which perturb the imagery in an imperceptible manner aiming to confuse specific machine recognition systems. Their obfuscation patterns are invisible to humans and the obfuscation performance is strong. However, obfuscation can only be guaranteed for target-specific recognizers.

To confuse target-generic machine recognizers and even human recognizers, Brkic et al. [9] generated full body images that overlay with the target person masks. However, synthesized persons with uniform poses do not match scene context which leads to blending artifacts in final images. The recent work of [1] inpaints fake head images conditioned on the context and blends generated heads with diverse poses into varied background and body poses in social media photos. While achieving state-of-the-art performance in terms of both recognition rate and image quality, the results of such a purely data-driven method inevitably exhibits artifacts like the change of attributes such as face poses and expressions.

Parametric Face Models. Blanz and Vetter [10] learn an affine parametric 3D Morphable Model (3DMM) of face geometry and texture from 200 high-quality scans. Higher-quality models have been constructed using more scans [11], or by using information from in-the-wild images [12, 13]. Such parametric models can act as strong regularizers for 3D face reconstruction problems, and have been widely used in optimization based [5, 12, 14,15,16,17] and learning-based [18,19,20,21,22,23] settings. Recently, a model-based face autoencoder (MoFA) has been introduced [4] which combines a trainable CNN encoder with an expert-designed differentiable rendering layer as decoder, which allows for end-to-end training on real images. We use such an architecture and extend it to reconstruct faces from images where the face region is blacked out or blurred for obfuscation. We also utilize the semantics of the parameters of the 3DMM by replacing the identity-specific parameters to synthesize overlaid faces with different identities. While the reconstructions obtained using parametric face models are impressive, they are limited to the low-dimensional subspace of the models. Many high-frequency details are not captured and the face region does not blend well with the surroundings in overlaid 3DMM renderings. Some reconstruction methods go beyond the low-dimensional parametric models [6, 16, 17, 19, 21, 24] to capture more detail, but most lack parametric control of the captured high-frequency details.

Image Inpainting and Refinement. We propose a GAN based method in the second stage to refine the rendered 3DMM face pixels for higher realism as well as to inpaint the obfuscated head pixels around the rendered face. In [25, 26], rendered images are modified to be more realistic by means of adversarial training. The generated data works well for specific tasks such as gaze estimation and hand pose estimation, with good results on real images. Yeh et al. [27] and Pathak et al. [28] have used GANs to synthesize missing content conditioned on image context. Both of these approaches assume strong appearance similarity or connection between the missing parts and their contexts. Sun et al. [1] inpainted head pixels conditioned on facial landmarks. Our method, conditioned on parametric face model renderings, gives us control to change the identity of the generated face while also synthesizing more photo-realistic results.

3 Face Replacement Framework

We propose a novel face replacement approach for identity obfuscation that combines a data-driven method with a parametric face model.

Our approach consists of two stages (see Fig. 1). Experimenting on different modalities of input results in different levels of obfuscationFootnote 1. In the first stage, we can not only render a reconstructed face on the basis of a parametric face model (3DMM), but can also replace the face region in the image with the rendered face of a different identity. In the second stage, a GAN is trained to synthesize the complete head image given the rendered face and a further obfuscated image around the face as conditional inputs. The obfuscation here protects the identity information contained in the ears, hair, etc. In this stage, the obfuscated region is inpainted with realistic content and fine grain details missing in the rendered 3DMM are added, resulting in a photo-realistic output image.

Fig. 1.
figure 1

Our obfuscation method based on data-driven deep models and parametric face models. The bottom row shows the input image choices for stage-I and stage-II. Different input combination results in different levels of obfuscation.

3.1 Stage-I: Face Replacement

Stage-I of our approach reconstructs 3D faces from the input images using a parametric face model. We train a convolutional encoder to regress the model’s semantic parameters from the input. This allows us to render a synthetic face reconstructed from a person and also gives us the control to modify its rendered identity based on the parameter vector.

Semantic Parameters. We denote the set of all semantic parameters as \(p = (\alpha , \beta , \delta , \phi , \gamma )\), \(|p|=257\). These parameters describe the full appearance of the face. We use an affine parametric 3D face model to represent our reconstructions. \(\alpha \) and \(\beta \) represent the shape and reflectance of the face, and correspond to the identity of the person. These parameters are the coefficients of the PCA vectors constructed from 200 high-quality face scans [10]. \(\delta \) are the coefficients of the expression basis vectors computed using PCA on selected blend shapes of [29, 30]. We use 80 \(\alpha \), 80 \(\beta \) and 64 \(\delta \) parameters. Together, they define the per-vertex position and reflectance of the face mesh represented in the topology used by [13]. In addition, we also estimate the rigid pose (\(\phi \)) of the face and the scene illumination (\(\gamma \)). Rigid pose is parametrized with 6 parameters corresponding to a 3D translation vector and Euler angles for the rotation. Scene illumination is parameterized using 27 parameters corresponding to the first 3 bands of the spherical harmonic basis functions [31].

Our stage-I architecture is based on the Model-based Face Autoencoder (MoFA) [4] and consists of a convolutional encoder and a parametric face decoder. The encoder regresses the semantic parameters p given an input imageFootnote 2.

Parametric Face Decoder. As shown in Fig. 1, the parametric face decoder takes the output of the convolutional encoder, p, as input and generates the reconstructed face model and its rendered image. The reconstructed face can be represented as \(v_i(p) \in \mathbb {R}^{3}\) and \(c_i(p) \in \mathbb {R}^{3}\), \(\forall i \in [1, N]\), where \(v_i(p)\) and \(c_i(p)\) denote the position in camera space and the shaded color of the vertex i, and N is the total number of vertices. For each vertex i, the decoder also computes \(u_i(p) \in \mathbb {R}^{2}\) which denotes the projected pixel location of \(v_i(p)\) using a full perspective camera model.

Loss Function. Our auto-encoder in stage-I is trained using a loss function that compares the input image to the output of the decoder as

$$\begin{aligned} E_\textit{loss}(p) = E_\textit{land}(p) + w_\textit{photo} E_\textit{photo}(p) + w_\textit{reg} E_\textit{reg}(p). \end{aligned}$$
(1)

Here, \(E_\textit{land}(p)\) is a landmark alignment term which measures the distance between 66 fiducial landmarks [13] in the input image with the corresponding landmarks on the output of the parametric decoder,

$$\begin{aligned} E_\textit{land}(p) = \sum _{i=1}^{66} || l_i - u_{x}(p) ||_2^2. \end{aligned}$$
(2)

\(l_i\) is the ith landmark’s image position and x is the index of the corresponding landmark vertex on the face mesh. Image landmarks are computed using the dlib toolkit [33]. \(E_\textit{photo}(p)\) is a photometric alignment term which measures the per-vertex appearance difference between the reconstruction and the input image,

$$\begin{aligned} E_\textit{photo}(p) = \sum _{i \in V } || I(u_i(p)) - c_i(p) ||_2. \end{aligned}$$
(3)

\( V \) is the set of visible vertices and I is the image for the current training iteration. \(E_{\textit{reg}}(p)\) is a Tikhonov style statistical regularizer which prevents degenerate reconstructions by penalizing parameters far away from their mean,

$$\begin{aligned} E_\textit{reg}(p) = \sum _{i=1}^{80} \frac{\alpha _i}{(\sigma _s)_i} + w_e \sum _{i=1}^{64} \frac{\delta _i}{(\sigma _e)_i} + w_r \sum _{i=1}^{80} \frac{\beta _i}{(\sigma _r)_i}. \end{aligned}$$
(4)

\(\sigma _s\), \(\sigma _e\), \(\sigma _r\) are the standard deviations of the shape, expression and reflectance vectors respectively. Please refer to [4, 13] for more details on the face model and the loss function. Since the loss function \(E_{\textit{loss}}(p)\) is differentiable, we can backpropagate the gradients to the convolutional encoder, enabling self-supervised learning of the network.

Replacement of Identity Parameters. The controllable semantic parameters of the face model have the advantage that we can modify them after face reconstruction. Note that the shape and reflectance parameters \(\alpha \) and \(\beta \) of the face model depend on the identity of the person [10, 20]. We propose to modify these parameters (referred to as identity parameters from now on) and render synthetic overlaid faces with different identities, while keeping all other dimensions fixed. While all face model dimensions could be modified we want to avoid unfitting facial attributes. For example, changing all dimensions of the reflectance parameters can lead to misaligned skin color between the rendered face and the body. To alleviate this problem, we keep the first, third and fourth dimensions of \(\beta \), which control the global skin tone of the face, fixed.

After obtaining the semantic parameters on all our training set (over 2k different identities), we first cluster the identity parameters into 15 different identity clusters with the respective cluster means as representatives. We then replace the identity parameters of the current test image with the parameters of the cluster that is either closest (Replacer1), at middle distance (Replacer8) or furthest away (Replacer15) to evaluate different levels of obfuscation (Fig. 2). Note that each test image has its own Replacers.

Fig. 2.
figure 2

Replacement of identity parameters in Stage-I allows us to generate faces with different identities.

Input Image Obfuscation. In addition to replacing the identity parameters, we also optionally allow additional obfuscation by blurring or blacking out the face region in the input image for Stage-I (the face region is determined by reconstructing the face from the original image). These obfuscation strategies force the Stage-I network to predict the semantic parameters only using the context information (Fig. 3), thus reducing the extent of facial identity information captured in the reconstructions. We train networks for these strategies using the full body images with the obfuscated face region as input while using the original unmodified images in the loss function \(E_{\textit{loss}}(p)\)Footnote 3. This approach gives us results which preserve the boundary of the face region and the skin color of the person even for such obfuscated input images (Fig. 3). The rigid pose and appearance of the face is also nicely estimated.

Fig. 3.
figure 3

Stage-I output: If the face in the input image is blacked out or blurred, our network can still predict reasonable parametric reconstructions which align to the contour of the face region. The appearance is also well estimated from the context information. The results are further aligned using an optimization-based strategy.

In addition to reducing the identity information in the rendered face, the Stage-I network also removes the expression information when faces in the input images are blurred or blacked out. To better align our reconstructions with the input images without adding any identity-specific information, we further refine only the rigid pose and expression estimates of the reconstructions. We minimize part of the energy term in (1) after initializing all parameters with the predictions of our network.

$$\begin{aligned} p^{*} = \underset{p}{\mathrm {argmin}} \, E_\textit{refine}(p) \end{aligned}$$
(5)
$$\begin{aligned} E_\textit{refine}(p) = E_\textit{land}(p) + w_\textit{reg} E_\textit{reg}(p) \end{aligned}$$
(6)

Note that only \(\phi \) and \(\delta \) are optimized during refinement. We use 10 non-linear iterations of a Gauss-Newton optimizer to minimize this energy. As can be seen in Fig. 3, this optimization strategy significantly improves the alignment between the reconstructions and the input images. Note that input image obfuscation can be combined with identity replacement to further change the identity of the rendered face.

The output of stage-I is the shaded rendering of the face reconstruction. The synthetic face lacks high-frequency details and does not blend perfectly with the image as the expressiveness of the parametric model is limited. Stage-II enhances this result and provides further obfuscation by removing/reducing the context information from the full head region.

3.2 Stage-II: Inpainting

Stage-II is conditioned on the rendered face image from Stage-I and an obfuscated region around the head to inpaint a realistic image. There are two objectives for this inpainter: (1) inpainting the blurred/blacked-out hair pixels in the head region; (2) modifying the rendered face pixels to add fine details and realism to match the surrounding image context. The architecture is composed of a convolutional generator G and discriminator D, and is optimized by L1 loss and adversarial loss.

Input. For the generator G, RGB channels of both the obfuscated image I and the rendered face from Stage-I F are concatenated as input. For the discriminator D, we take the inpainted image as fake and the original image as real. Then, we feed the (fake, real) pairs into the discriminator. We use the whole body image instead of just the head region in order to generate natural transitions between the head and the surrounding regions including body and background, especially for the case of obfuscated input.

Head Generator (\({\varvec{G}}\)) and Discriminator (\({\varvec{D}}\)). The head generator G is a “U-Net”-based architecture [34], i.e. Convolutional Auto-encoder with skip connections between encoder and decoderFootnote 4, following [1, 35, 36]. It generates a natural head image given both the surrounding context and the rendered face. The architecture of the discriminator D is the same as in DCGAN [37].

Loss Function. We use L1 reconstruction loss plus adversarial loss, named \(\mathcal{{L}}^{G}\), to optimize the generator and the adversarial loss, named \(\mathcal{{L}}^{D}\), to optimize the discriminator. For the generator, we use the head-masked L1 loss such that the optimizer focuses more on the appearance of the targeted head region,

$$\begin{aligned} \mathcal{{L}}^{G} = \mathcal{{L}}_{bce}({{D}(G(I, F)),1}) + \lambda \Vert (G({I}, F) - I_O) \odot {M_h} \Vert _1 , \end{aligned}$$
(7)

where \(M_h\) is the head mask (from the annotated bounding box), \(I_O\) denotes the original image and \(\mathcal{{L}}_{bce}\) is the binary cross-entropy loss. \(\lambda \) controls the importance of the L1 termFootnote 5. Then, for the discriminator, we have the following losses:

$$\begin{aligned} \mathcal{{L}}^{D}=\mathcal{{L}}^{D}_{adv}= & {} \mathcal{{L}}_{bce}(D{(I_O),1}) + \mathcal{{L}}_{bce}({D(G(I, F)),0}). \end{aligned}$$
(8)

We also tried to add a de-identification loss derived from verification models [38], in order to change the identity of the person in the generated image. However, this has a conflicting objective with the L1 loss and we were not able to find a good trade-off between them.

Figure 4 shows the effect of our inpainter. In (a) when the original hair image is given, the inpainter refines the rendered face pixels to match surroundings, e.g., the face skin becomes more realistic in the bottom image. In (b), (c), the inpainter not only refines the face pixels but also generates the blurred/missing head pixels based on the context.

Fig. 4.
figure 4

Visualization results before and after inpainting. On the top row, rendered faces are overlayed onto the color images for better comparison of details.

4 Recognizers

Identity obfuscation in this paper is target-generic: it is designed to work against any recognizer, be it machine or human. In this paper, we use both recognizers to test our approach.

4.1 Machine Recognizers

We use an automatic recognizer naeil [39], the state-of-the-art for person recognition in social media images [1, 40]. In contrast to typical person recognizers, naeil also uses body and scene context cues for recognition. It has thus proven to be relatively immune to common obfuscation techniques like blacking-out or blurring the head region [7].

We first train feature extractors over head and body regions, and then train SVM identity classifiers on those features. We can concatenate features from multiple regions (e.g. head+body) to make use of multiple cues. In our work, we use GoogleNet features from head and head+body for evaluation. We have also verified that the obfuscation results show similar trends against AlexNet-based analogues (see supplementary materials).

4.2 Human Recognizers

We also conduct human recognition experiments to evaluate the obfuscation effectiveness in a perceptual way. Given an original head image and the head images inpainted by variants of our method and results of other methods, we ask users to recognize the original person from the inpainted ones, and to also choose the farthest one in terms of identity. Users are guided to focus on identity recognition rather than the image quality. For each method, we calculate the percentage of times its results were chosen as the farthest identity (higher number implies better obfuscation performance).

5 Experiments

An obfuscation method should not only effectively hide the identity information but also produce photo-realistic results. Therefore, we evaluate our results on the basis of recognition rate and visual realism. We also study the impact of different levels of obfuscation yielded from different input modalities at two stages.

5.1 Dataset

Our obfuscation method needs to be evaluated on realistic social media photos. PIPA dataset [41] is the largest social media dataset (37,107 Flickr images with 2,356 annotated individuals), which shows people in diverse events, activities and social relations [42]. In total, 63,188 person instances are annotated with head bounding boxes from which we create head masks. We split the PIPA dataset into a training set and a test set without overlapping identities, following [1]. In the training set, there are 2,099 identities, 46,576 instances and in the test set 257 identities, 5,175 instances. We further prune images with strong profile or back of the head views from both sets following [1], resulting in 23,884 training and 1,084 test images. As our pipeline takes a fixed-size input (\(256\times 256\times 3\)), we normalize the image size of the dataset. To this end, we crop and zero-pad the images so that the face appears in the top middle block of a \(3\times 4\) grid in the entire image. Details of our crop method are given in supplementary materials.

5.2 Input Modalities

Our method allows 18 different combinations of input modalities, which is a combination of 3 types of face modalities, 3 types of hair modalities and the choice of modifying the face identity parameters (default replacer is Replacer15). Note that, only 17 of them are valid for obfuscation, since the combination of original face and hair aims to reconstruct the original image. Due to space limitations, we compare a representative subset, as shown in Table 1. The complete results can be found in the supplementary material.

In order to blur the face and hair regions in the input images, we use the same Gaussian kernel as in [1, 7]. Note that in contrast to those methods, our reconstructed face model provides the segmentation of the face region allowing us to precisely blur the face or hair region.

5.3 Results

In this section, we evaluate the proposed hybrid approach with different input modalities in terms of the realism of images and the obfuscation performance.

Image Realism. We evaluate the quality of the inpainted images compared to the ground truth (original) images using Structure Similarity Score (SSIM) [43]. During training, the body parts are not obfuscated, so we report the mask-SSIM [1, 35] for the head region only (SSIM scores are in supplementary materials). This score measures how close the inpainted head is to the original head.

The SSIM metric is not applicable when using a Replacer, as ground truth images are not available. Therefore, we conduct a human perceptual study (HPS) on Amazon Mechanical Turk (AMT) following [1, 35]. For each method, we show 55 real and 55 inpainted images in a random order to 20 users, who are asked to answer whether the image looks real or fake within 1s.

Obfuscation Performance. Obfuscation evaluation is to measure how well our methods can fool automatic person recognizers as well as humans. We have defined machine recognizers and human recognizers in Sect. 4.

For machine recognizers, we report the average recognition rates for 1, 084 test images in Table 1. For human recognition, we randomly choose 45 instances then ask recognizers to verify the identity, given the original image as reference, from the obfuscated images of six representative methods: two methods in [1] and four methods indexed by v9-v12, see the last column of Table 1.

Table 1. Quantitative results comparing with the state-of-the-art methods [1]. Image quality: Mask-SSIM and HPS scores (both the higher, the better). Obfuscation effectiveness: recognition rates of machine recognizers (lower is better) and confusion rates of human recognizers (higher is better). v* simply represents the method in that row.

Comparison to the State-of-the-Art. In Table 1, we report quantitative evaluation results on different input modalities and in comparison to [1]. We also implement the exact same models of [1] on our cropped data for fair comparisons. We also compare the visual quality of our results with [1], see Fig. 5.

Fig. 5.
figure 5

Result images by methods v9 and v12, compared to original images and the results of the Blackhead scenario using PDMDec landmarks in [1]. Note that the image scale difference with [1] is because of different cropping methods.

Our best obfuscation rate is achieved by v12. The most comparable method in [1] is Blackhead+PDMDec, where the input is an image with a fully blacked-out head and the landmarks are generated by PDMDec. Comparing v12 with it, we achieve \(2.6\%\) lower recognition rate (\(2.6\%\) higher for confusing machine recognizers) using head features. Our method does even better (\(15.3\%\) higher) in fooling human recognizers. In addition, our method has clearly higher image quality in terms of HPS, 0.33 vs. 0.15 [1]. Figure 5 shows that our method generates more natural images in terms of consistent skin colors, proper head poses and vivid face expressions.

Parametric Model Versus GAN. For the ablation study of our hybrid model, we replace the parametric model in Stage-I with a GAN. We use the same architecture as the stage-II network of [1], but without the landmark channel. This is inspired by the regional completion method using GANs [44]. We consider two comparison scenarios: when the input face is blacked-out (indexed by v13), we compare with v8; when the head is blacked-out (indexed by v14), we compare with v9. We observe that v13 results in a lower mask-SSIM score of 0.80 (v8 has 0.85) with the same recognition rate of 64.4%. This means that the GAN generates lower-quality images without performing better obfuscation. v14 has a lower recognition rate of 19.7% vs. v9’s 25.7%, but its mask-SSIM (image quality) is only 0.23, 0.24 lower than v9’s 0.47. If we make use of face replacement (only applicable when using our parametric model-based approach), we are able to achieve a lower recognition rate of 18.1%, sacrificing only 0.08 in terms of image quality (see HPS of v9 and v12 in Table 1).

Fig. 6.
figure 6

Result images of methods v2, v3, v6 and v7, compared to the original images.

Analysis of Different Face/Hair Modalities. Table 1 shows that different modalities of the input yield different levels of obfuscation and image quality. In general, the image quality is roughly correlated to the recognition rate. With higher level of modification to an image, the identity will be more effectively obfuscated, but the image quality will also deteriorate accordingly. However, we can observe that the recognition rate drops quicker than the image quality.

It is worth noting that when there is no inpainting on the rendered faces (v1), HPS score is 0.58, 0.13 lower than v2, verifying that rendered faces are less realistic than inpainted ones. Not surprisingly, the best image quality is achieved by v2 which aims to reconstruct the original image without obfuscation. On top of that, when we use blurred faces in Stage-I (v4), the machine recognition rate (head) drops from \(70.8\%\) to \(59.9\%\). This indicates that blurring the face region indeed partially conceals the identity information.

When we blur the hair region (v6), the recognition rate sharply drops to \(25.8\%\), which implies that the region around the face contains a large amount of identity information. When we remove all information from the face and hair regions (v9), we get an even lower recognition rate of \(14.2\%\).

Face Replacement is of Great Effectiveness. We can see from Table 1 that replacing the face parameters with those of another identity is an effective way of hiding the identity information. Regardless of the face and hair input modalities, the obfuscation performances on both recognizers are significantly improved using Replacer15 rendered faces than using Own rendered faces. Replacing faces from close to far identities also has an obvious impact on the obfuscation effectiveness. From v10 to v12 in Table 1, we can see using Replacer8 yields clearly better obfuscation than the Replacer1, e.g., obfuscation for humans gets \(25.1\%\) improvement. This is further evidenced by the comparison between the Replacer15 and Replacer1. Visually, Figs. 6 and 5 show that replacing the face parameters indeed makes the faces very different.

Trade-off Between Image Quality and Obfuscation. Figure 7 shows the machine recognition rate vs. image quality plots for different obfuscation methods (some are not in Table 1 but in supplementary materials). Points on the curves from left to right are the results of using Blacked-out, Blurred and Original hair inputs for stage-II.

Fig. 7.
figure 7

Scatter curves of different obfuscation methods. HPS scores change along X-axis for different obfuscation levels (Blacked-out, Blurred, Original) on hair regions.

This figure allows users to select the method with the highest image quality given a specified obfuscation threshold. For example, if a user would like to take the risk of \(30\%\) recognizability at most, the highest image quality he/she can get is about 0.45, corresponding to the middle point on the blue dashed line (the method of Original image, Blurred hair, Replacer15). On the other hand, if a user requires the image quality to be at least 0.30, the best obfuscation possible corresponds to the first point of the red dashed line (the method of Blacked-out face, Blacked-out hair, Replacer15). The global coverage of these plots show the selection constrains, such as when a user strictly controls the privacy leaking rate under \(20\%\), there are only two applicable methods: Blackhead+PDMDec [1] (image quality is only 0.15) and ours (Blacked-out face, Blacked-out hair, Replacer15) where the image quality is higher at 0.33.

6 Conclusion

We have introduced a new hybrid approach to obfuscate identities in photos by head replacement. Thanks to the combination of a parametric face model reconstruction and rendering, and the GAN-based data-driven image synthesis, our method gives us complete control over the facial parameters for explicit manipulation of the identity, and allows for photo-realistic image synthesis. The images synthesized by our method confuse not only the machine recognition systems but also humans. Our experimental results have demonstrated output of our system that improves over the previous state of the art in obfuscation rate while generating obfuscated images of much higher visual realism.