AI Masks Face Recognition
This is a news story, published by Live Science, that relates primarily to Georgia Tech news.
News about Ai research
For more Ai research news, you can click here:
more Ai research newsLive Science news
For more news from Live Science, you can click here:
more news from Live ScienceAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about Ai research, you might also like this article about
unwanted facial recognition software. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest personal photos news, facial recognition scanners news, news about Ai research, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
personal imagesLive Science
•Meet 'Chameleon' – an AI model that can protect you from facial recognition thanks to a sophisticated digital mask
80% Informative
Georgia Tech researchers have created an AI model called " Chameleon " that can hide photos from unwanted facial recognition software and fraudsters.
Chameleon can produce a digital "single, personalized privacy protection ( P-3 ) mask" for personal photos that thwarts unwanted facial scanning from detecting a person's face.
Facial recognition systems are now commonplace in everyday life.
VR Score
86
Informative language
89
Neutral language
61
Article tone
formal
Language
English
Language complexity
76
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
long-living
External references
5
Source diversity
5