It is crucial to record the world, especially in major events such as protests and rallies that continue to occur across the country. But as any photojournalist or news photographer will tell you, publishing images around the world requires a huge responsibility. Every photo and video you share contains a lot of information, some of which you may not even realize.
Quickly blur face
The laws on the use of facial recognition remain worryingly loose, and facial images have become a valuable asset for everyone from marketers to police. However, you can protect these faces from snooping.
Just this week, Signal (the secure messaging service you probably should use) added a tool that allows users to blur faces in photos. This is a simple mechanism that allows users to blur someone's identity, which requires about the same amount of work as adding emojis. After capturing an image in Signal, you can export it to other applications before sharing.
Clear the image thoroughly
Faces aren't the only things you should consider clearing from photos. Every time you take a photo (especially using a mobile phone), the backend of the image file will contain a lot of identification information. If you have Photoshop, you can click File > File Information to view GPS data and original image data that may contain identification marks about your device or location.
If you want to use Photoshop to blur faces, you can use the Blur tool (looks like water drops in the toolbar) and increase the intensity. But blurring alone is not always the best way to mask faces, because neural networks can sometimes recognize them if you don't do it thoroughly enough. Use liquefied tools to distort and deform features to remove some of the terrain facial marks that the recognition software uses to identify individuals.
When exporting the image, make sure the None radio button is selected under the Metadata heading.
There are also some specialized applications for cleaning photos before posting them. For example, Image Scrubber is a tool designed specifically for extracting personal information from photos taken during protests. It works on laptops and two major mobile platforms and features a simple brush-based tool that completely obscures faces with blur. This is not the most elegant method, it does not automatically detect faces in photos like Signal's tools. However, it's very fast and simple, which is very important, especially when you're trying to share images quickly. It also clears the EXIF data of the image, which includes information about the device that took it and its location.
Anonymous video clip
The faces in a blur video are much more difficult because you can't usually just point and click on the face. People move around the screen and it’s difficult to track them.
There are some tools to help. YouTube has an automatic feature that does this for you – it is designed to help content creators who don’t get the model authorization of people who appear in their videos. However, whether it is sufficient to fight powerful facial recognition is unclear.
Adobe's Premiere Pro has a mechanism to automatically block faces. You have to add a mosaic filter and create a tracking mask that automatically follows the subject as it moves through the screen. It works well, but you have to repeat this process for each face and adjust the tracking to make sure it works properly.
The above is the detailed content of You should blur the faces in your protest photos. Here's how.. For more information, please follow other related articles on the PHP Chinese website!

NVIDIA OpenGL driver error code 3: Game operation obstacles and solutions On Windows 11/10 systems, NVIDIA OpenGL driver error code 3 may cause the game to fail to run. This article will provide a variety of ways to resolve error code 3 (subcode 2 or 7). OpenGL is an industry-standard graphical application programming interface (API) for rendering 3D and 2D graphics. NVIDIA supports OpenGL for its GPU to perform at its best. However, NVIDIA OpenGL driver error code 3 interrupts all operations, causing the game and video/image editing software to be unusable. The error message may be as follows: NVI

Secure Boot is a built-in security function of newer UEFI firmware that helps make sure only trusted, digitally signed operating systems and bootloaders can boo

Encountering the "failed to load xgameruntime.dll error code 126"? This guide provides effective solutions to resolve this game launch issue. The xgameruntime.dll Error (Code 126): This error prevents certain games from launching, displayin

The "An Unreal Process Has Crashed" error in Oblivion Remastered prevents players from enjoying this updated RPG. This guide offers several solutions to resolve this issue. Try each fix until the problem is solved. Quick Navigation: An Un

Troubleshooting "Scan for Hardware Changes" Freezing Windows Some users experience system freezes after selecting "Scan for hardware changes" in Device Manager. This guide provides solutions to resolve this issue. A user on the M

Recovering Lost Data from Your Nintendo 3DS SD Card: A Step-by-Step Guide Losing precious photos, videos, or game saves from your Nintendo 3DS SD card is frustrating. This guide offers solutions to recover your 3DS SD card data on a Windows PC. Unde

This guide explains how to locate your Sunderfolk save files and troubleshoot saving issues. Knowing your save file location allows you to manage your game progress. Sunderfolk Save File Location Sunderfolk, Dreamhaven's debut game, saves game data

Microsoft Teams is widely used for virtual meetings, team collaboration, and workplace communication. But from time to time, users encounter technical issues th


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Atom editor mac version download
The most popular open source editor

Dreamweaver CS6
Visual web development tools

WebStorm Mac version
Useful JavaScript development tools
