DefaceGUI - Face Anonymization Tool

DefaceGUI: Face Anonymization Tool

I am delighted to share a program I developed myself with you.

DefaceGUI is a powerful and easy-to-use graphical interface application designed to anonymize faces in video and photo files quickly and easily. In this era of increasing privacy and data protection concerns, it allows you to securely mask personal facial information in your media files before publishing or sharing them.

Whether it’s a single video or a folder full of photos, anonymization is just a few clicks away with DefaceGUI.

What Does It Do?

Using the open-source deface library, the program automatically detects human faces in your input video or image files and masks them using a method of your choice (blurring, pixelation/mosaic, or solid boxes).

  • Privacy Protection: Ensures the protection of individuals' identities in videos/images shared publicly or on the internet.
  • GDPR/KVKK Compliance: Helps you meet legal requirements (e.g., GDPR, KVKK) in your corporate or personal projects.
  • Easy Workflow: Eliminates the need to write terminal commands, making the anonymization process accessible to everyone.

2. Core Features of the Program

DefaceGUI: User-Oriented Face Anonymization Features

DefaceGUI simplifies privacy operations by combining all the power of the "deface" command-line tool with a modern and accessible Graphical User Interface (GUI). The following key features set your program apart from competitors:

1. Ease of Use and Accessibility

  • Full Graphical Interface (GUI): No more dealing with complex command-line (CLI) inputs! DefaceGUI allows you to perform all anonymization processes via a user-friendly, visual interface.
  • Drag & Drop Support: You can instantly set the input path by dragging and dropping your video or photo files directly into the interface.
  • Multi-Language Support: To broaden your user base, the program offers two language options: Turkish (🇹🇷) and English (:united_states:).
  • Modern Dark Theme: The user experience is enhanced with a stylish, eye-friendly, and modern dark mode.

2. Advanced Anonymization Control

  • Multiple Anonymization Methods: You can choose from three popular methods to hide faces based on your needs:
    • Blurring (blur): Hides facial details with a soft transition.
    • Mosaic (mosaic): Covers the face with distinct pixels.
    • Solid Box (solid): Completely covers faces with a solid black box.
  • Fine-Tuning Controls: You can personalize the processing quality thanks to the advanced settings panel:
    • Detection Threshold: By adjusting how sensitive the face detection is, you can ensure even shadowed or small faces are found.
    • Mosaic Size: When the mosaic method is selected, you can precisely determine the pixel size of the mosaic.
  • Video Audio Protection: Thanks to the keep audio (--keep-audio) option while anonymizing videos, you won't lose audio and video synchronization.

3. Workflow and Management

  • Real-Time Process Log: You can follow all outputs of the running deface command in real-time, control the process, and save the process logs to an external file.
  • Process History Management: It keeps records of your previously successful operations. By double-clicking on a record in the history, you can instantly load the same input/output paths and method settings, saving time on repetitive tasks.

My Github Profile

Project Github Link

Project Releases .deb

To install on Linux (deb) directly from the Terminal:

wget -O Setup_Linux64.deb https://github.com/cektor/DefaceGUI/releases/download/1.0.0/Setup_Linux64.deb && sudo apt install ./Setup_Linux64.deb && sudo apt-get install -f -y

1 Like

In your thread tags, you have software-store listed, I am on Zorin OS 16, and its not in the software store FYI. Additionally, you have Zorin OS 16 and 17 listed in tags, why not OS 18? Are you not aware that OS 18 is the latest release, and has been out for a couple months now?

I am also looking at your installation instructions, and I want to know why -f and -y are in there. It feels like were trying to brute force something here.

Also, in my experience, most people don't care about their privacy, which is why they put themselves all over the net on social media, face and all. If people are willing to do that, they are not going to use that tool.

These folks tend to post themselves in YouTube video's as well, and its shocking how little people care about their privacy online. Also, most people's phones, have that avatar ability, to impose an avatar over a persons face, or use the camera to create a lifelike character.

People who care about keeping their face off the net, will have done so, and have no need for tools like this. I'm trying to figure out what the use case of this is, because I suspect, its very niche.

Hopefully a code wizard has some time to look over the code, to make sure its not phoning home to big brother or something. We live in a time where some folks go to great lengths to get people's data, even lie to get it.

The great thing about open source, is the code can be gone over. Its the only way to keep software makers honest IMO.


2 Likes

I think that this application is not intended toward protecting ones own privacy, as much as supplying a batch process for protecting others privacy.
In the place where I live, being in public space is no guarantee of privacy. Therefor, there are no (local) laws that require someone filming to anonymize passersby caught on a camera.

However, some locations do have laws for that and software like this can protect any person filming as well as people who happen to walk by an active camera.

The -y flag (--yes) ensures that needed dependencies are installed along with the project.
The -f flag is often relayed as meaning "force install" but that is not what it actually means. It is short for --fix-broken which is a common command we often suggest on the forum in full: sudo apt --fix-broken install, for example.

The use of these two flags ensures that the end user has the most seamless installation possible, but does not apply brute force.
(Note:
Force commands do exist. --force-depends, --force-overwrite being examples, but they do not use the shorthand -f.)

4 Likes

Thanks for the explanation, you can see why those triggered my thought process. This is why I love the Linux community, because we look out for each other.

Also, thanks for the explanation on the use case of the software, I never thought of the passers by approach, if your filming in a big city, with lots of people, such as New York for example.


1 Like