Miaomiao Wang , Sheng Li , Xinpeng Zhang , Guorui Feng
{"title":"Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions","authors":"Miaomiao Wang , Sheng Li , Xinpeng Zhang , Guorui Feng","doi":"10.1016/j.cosrev.2025.100785","DOIUrl":null,"url":null,"abstract":"<div><div>With the advancement of computer vision technology and smart devices, images and videos containing facial information are increasingly shared on social media, making it easier for facial data to be collected and misused. As sensitive biometric data, once facial information is leaked, it may cause irreversible damage to personal privacy. Ensuring the security of facial information while benefiting from technological conveniences has become a critical research area. Many surveys have summarized existing protection measures, which often focus on specific issues or are oriented toward particular technologies, so existing methods have not been comprehensively summarized. In this paper, we categorize facial privacy-preserving methods into four paradigms: appearance-guided, identity-guided, reversible, and privacy-preserving for facial recognition systems. We offer an in-depth review of the most representative methods, emphasizing their advantages and functional characteristics. Additionally, we present commonly used datasets and evaluation metrics and analyze the performance of current methods. Finally, we discuss the challenges and opportunities for practical applications in facial privacy protection, offering insights for future research.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"58 ","pages":"Article 100785"},"PeriodicalIF":13.3000,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000619","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the advancement of computer vision technology and smart devices, images and videos containing facial information are increasingly shared on social media, making it easier for facial data to be collected and misused. As sensitive biometric data, once facial information is leaked, it may cause irreversible damage to personal privacy. Ensuring the security of facial information while benefiting from technological conveniences has become a critical research area. Many surveys have summarized existing protection measures, which often focus on specific issues or are oriented toward particular technologies, so existing methods have not been comprehensively summarized. In this paper, we categorize facial privacy-preserving methods into four paradigms: appearance-guided, identity-guided, reversible, and privacy-preserving for facial recognition systems. We offer an in-depth review of the most representative methods, emphasizing their advantages and functional characteristics. Additionally, we present commonly used datasets and evaluation metrics and analyze the performance of current methods. Finally, we discuss the challenges and opportunities for practical applications in facial privacy protection, offering insights for future research.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.