Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessHow AI and Alternative Data Are Finally Making Germany's Hidden Champions Accessible to Global InvestorsDev.to AIThe Simple Truth About AI Agent RevenueDev.to AIAI Transformation in German SMEs: McKinsey Data Shows Up to 10x ROI from Strategic AI IntegrationDev.to AIAutomating Your Urban Farm with AI: From Guesswork to PrecisionDev.to AIThe Real Ceiling in Claude Code's Memory System (It’s Not the 200-Line Cap)Dev.to AIThe Invisible Rhythms of the Siuntio FortDev.to AIExploring RAG Embedding Techniques in DepthDev.to AIHow I Built a Multi-Agent Geopolitical Simulator with FastAPI + LiteLLMDev.to AI90% людей используют нейросети как поисковик. И проигрывают.Dev.to AII Let AI Coding Agents Build My Side Projects for a Month — Here's My Honest TakeDev.to AINvidia vs. CoreWeave: The Better AI Supercycle Stock Might Surprise You - AOL.comGNews AI NVIDIANvidia Partner Hon Hai’s Sales Meet Estimates on Solid AI DemandBloomberg TechnologyBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessHow AI and Alternative Data Are Finally Making Germany's Hidden Champions Accessible to Global InvestorsDev.to AIThe Simple Truth About AI Agent RevenueDev.to AIAI Transformation in German SMEs: McKinsey Data Shows Up to 10x ROI from Strategic AI IntegrationDev.to AIAutomating Your Urban Farm with AI: From Guesswork to PrecisionDev.to AIThe Real Ceiling in Claude Code's Memory System (It’s Not the 200-Line Cap)Dev.to AIThe Invisible Rhythms of the Siuntio FortDev.to AIExploring RAG Embedding Techniques in DepthDev.to AIHow I Built a Multi-Agent Geopolitical Simulator with FastAPI + LiteLLMDev.to AI90% людей используют нейросети как поисковик. И проигрывают.Dev.to AII Let AI Coding Agents Build My Side Projects for a Month — Here's My Honest TakeDev.to AINvidia vs. CoreWeave: The Better AI Supercycle Stock Might Surprise You - AOL.comGNews AI NVIDIANvidia Partner Hon Hai’s Sales Meet Estimates on Solid AI DemandBloomberg Technology
AI NEWS HUBbyEIGENVECTOREigenvector

Unsafe2Safe: Controllable Image Anonymization for Downstream Utility

arXivby [Submitted on 30 Mar 2026]March 31, 20262 min read1 views
Source Quiz

arXiv:2603.28605v1 Announce Type: cross Abstract: Large-scale image datasets frequently contain identifiable or sensitive content, raising privacy risks when training models that may memorize and leak such information. We present Unsafe2Safe, a fully automated pipeline that detects privacy-prone images and rewrites only their sensitive regions using multimodally guided diffusion editing. Unsafe2Safe operates in two stages. Stage 1 uses a vision-language model to (i) inspect images for privacy risks, (ii) generate paired private and public captions that respectively include and omit sensitive a — Mih Dinh, SouYoung Jin

View PDF HTML (experimental)

Abstract:Large-scale image datasets frequently contain identifiable or sensitive content, raising privacy risks when training models that may memorize and leak such information. We present Unsafe2Safe, a fully automated pipeline that detects privacy-prone images and rewrites only their sensitive regions using multimodally guided diffusion editing. Unsafe2Safe operates in two stages. Stage 1 uses a vision-language model to (i) inspect images for privacy risks, (ii) generate paired private and public captions that respectively include and omit sensitive attributes, and (iii) prompt a large language model to produce structured, identity-neutral edit instructions conditioned on the public caption. Stage 2 employs instruction-driven diffusion editors to apply these dual textual prompts, producing privacy-safe images that preserve global structure and task-relevant semantics while neutralizing private content. To measure anonymization quality, we introduce a unified evaluation suite covering Quality, Cheating, Privacy, and Utility dimensions. Across MS-COCO, Caltech101, and MIT Indoor67, Unsafe2Safe reduces face similarity, text similarity, and demographic predictability by large margins, while maintaining downstream model accuracy comparable to training on raw data. Fine-tuning diffusion editors on our automatically generated triplets (private caption, public caption, edit instruction) further improves both privacy protection and semantic fidelity. Unsafe2Safe provides a scalable, principled solution for constructing large, privacy-safe datasets without sacrificing visual consistency or downstream utility.

Comments: Accepted at CVPR 2026 and CVPR 2026 Workshop on Machine Unlearning for Computer Vision

Subjects:

Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Machine Learning (cs.LG)

Cite as: arXiv:2603.28605 [cs.CV]

(or arXiv:2603.28605v1 [cs.CV] for this version)

https://doi.org/10.48550/arXiv.2603.28605

arXiv-issued DOI via DataCite (pending registration)

Submission history

From: Minh Dinh [view email] [v1] Mon, 30 Mar 2026 15:54:47 UTC (3,550 KB)

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

researchpaperarxiv

Knowledge Map

Knowledge Map
TopicsEntitiesSource
Unsafe2Safe…researchpaperarxivmachine-lea…deep-learni…arXiv

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 181 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Research Papers