{"title":"The Role of Artificial Intelligence in Providing People With Privacy: Survey","authors":"Salar Raees, Mohammed Al-Tamimi","doi":"10.37385/jaets.v5i2.4013","DOIUrl":null,"url":null,"abstract":"Images privacy involves assessing the amount of information leakage from images, assessing risks associated with identification, and examining controls on this information. It was discussed various types of protection available and most commonly used in providing privacy to a person in images, including single-stage and two-stage detection algorithms. The results of each algorithm are organized in detailed tables, and the [YOLO] algorithm expands on all versions. The paper also clarifies the dataset used for testing the algorithms and its relevance to achieving desired results. It presents a comprehensive understanding of the process of detecting persons in digital images and assesses various tools and algorithms for recognizing persons, faces, and identities. It added an extensive examination of the several methods used to identify persons in digital images, with a specific emphasis on safeguarding their privacy. The task at hand is assessing various face recognition and identification tools and algorithms, with a specific emphasis on those that exhibit superior accuracy and efficiency in presenting outcomes. The study concluded that using the yolov8 algorithm in conjunction with blurring techniques effectively conceals individuals' information in digital images while maintaining the integrity of the overall image. The research paper's implications and information can practically contribute to the development of algorithms for detecting and protecting people in digital images, as well as the development of applications in this field. Theoretically, it can enhance understanding of the process of detecting and protecting people, and potentially contribute to the development of new theories in the field of protection and discovery.","PeriodicalId":509378,"journal":{"name":"Journal of Applied Engineering and Technological Science (JAETS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Applied Engineering and Technological Science (JAETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37385/jaets.v5i2.4013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Images privacy involves assessing the amount of information leakage from images, assessing risks associated with identification, and examining controls on this information. It was discussed various types of protection available and most commonly used in providing privacy to a person in images, including single-stage and two-stage detection algorithms. The results of each algorithm are organized in detailed tables, and the [YOLO] algorithm expands on all versions. The paper also clarifies the dataset used for testing the algorithms and its relevance to achieving desired results. It presents a comprehensive understanding of the process of detecting persons in digital images and assesses various tools and algorithms for recognizing persons, faces, and identities. It added an extensive examination of the several methods used to identify persons in digital images, with a specific emphasis on safeguarding their privacy. The task at hand is assessing various face recognition and identification tools and algorithms, with a specific emphasis on those that exhibit superior accuracy and efficiency in presenting outcomes. The study concluded that using the yolov8 algorithm in conjunction with blurring techniques effectively conceals individuals' information in digital images while maintaining the integrity of the overall image. The research paper's implications and information can practically contribute to the development of algorithms for detecting and protecting people in digital images, as well as the development of applications in this field. Theoretically, it can enhance understanding of the process of detecting and protecting people, and potentially contribute to the development of new theories in the field of protection and discovery.