Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
ReFaceX: donor-driven reversible face anonymisation with detached recovery
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 09 February 2026

ReFaceX: donor-driven reversible face anonymisation with detached recovery

  • Dost Muhammad1,3,
  • Muhammad Salman2,
  • Syed Muhammad Haider Shah4 &
  • …
  • Malika Bendechache3 

Scientific Reports , Article number:  (2026) Cite this article

  • 306 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Organisations must share facial imagery that remains useful for analysis while protecting identity. Many current methods fail to strike this balance: reconstruction-centred encoder–decoder designs tend to blur salient detail, whereas latent edits in pretrained generators often retain or drift identity cues, undermining privacy and utility. We present ReFaceX, a reversible anonymisation framework that separates what to protect from what to preserve. A donor identity code steers a U-Net anonymiser with Identity Feature Fusion to change identity while retaining non-identity content such as pose, background and expression. A learned steganographic channel carries a compact recovery payload, and reconstruction gradients are blocked at the stego image so the anonymiser is never rewarded for keeping identity. The threat model is stated explicitly and outcomes are audited with strong recognisers. On LFW and CelebA-HQ datasets at \(256\times 256\), ReFaceX reduces identity similarity across FaceNet, ArcFace and AdaFace, and improves recovered-image quality (SSIM \(0.9378\), LPIPS \(0.1002\), PSNR \(23.97\) dB), while operating in real time on a single RTX 3090. Robustness to common JPEG re-encoding is also demonstrated. By turning the privacy–utility balance into an explicit and auditable operating choice, ReFaceX provides a practical template for responsible release of facial imagery and a foundation for extensions to video, higher resolutions and stronger recovery guarantees.

Similar content being viewed by others

ID-insensitive deepfake detection model based on multi-attention mechanism

Article Open access 01 April 2025

Enhanced model inversion via frequency disentanglement and latent space optimization

Article Open access 30 November 2025

AIFS: an efficient face recognition method based on AI and enhanced few-shot learning

Article Open access 30 November 2025

Data availability

All datasets used in this study are publicly available and have been cited accordingly. The Flickr-Faces-HQ (FFHQ) dataset can be accessed at https://www.kaggle.com/datasets/arnaud58/flickrfaceshq-dataset-ffhq, the CelebA-HQ dataset is available at https://www.kaggle.com/datasets/badasstechie/celebahq-resized-256x256, and the Labeled Faces in the Wild (LFW) dataset can be obtained from https://www.kaggle.com/datasets/jessicali9530/lfw-dataset. The source code supporting the findings of this work is available from the corresponding author upon reasonable request.

References

  1. Huang, G. B., Mattar, M., Berg, T. & Learned-Miller, E. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. In Workshop on Faces in Real-Life Images (2008).

  2. Hukkelås, H., Mester, R. & Lindseth, F. Deepprivacy: A generative adversarial network for face anonymization. In ISVC (2019).

  3. Deng, J., Guo, J., Xue, N. & Zafeiriou, S. Arcface: Additive angular margin loss for deep face recognition. In CVPR (2019).

  4. Wang, H. et al. Cosface: Large margin cosine loss for deep face recognition. In CVPR (2018).

  5. Isola, P., Zhu, J.-Y., Zhou, T. & Efros, A. A. Image-to-image translation with conditional adversarial networks. In CVPR (2017).

  6. Ledig, C. et al. Photo-realistic single image super-resolution using a generative adversarial network. In CVPR (2017).

  7. Baluja, S. Hiding images in plain sight: Deep steganography. In NeurIPS (2017).

  8. Zhou, Z., Han, S. & Liu, X. A security analysis of generative steganography. IEEE Access (2018).

  9. Hayes, J. & Danezis, G. Generating steganographic images via adversarial training. In NeurIPS Workshop on Machine Deception (2017).

  10. Zhang, R., Isola, P., Efros, A. A., Shechtman, E. & Wang, O. The unreasonable effectiveness of deep features as a perceptual metric. CVPR (2018).

  11. Tov, O., Alaluf, Y., Nitzan, Y., Patashnik, O. & Cohen-Or, D. Designing an encoder for stylegan image manipulation. In SIGGRAPH (2021).

  12. Alaluf, Y., Patashnik, O. & Cohen-Or, D. Restyle: A residual-based stylegan encoder via iterative refinement. In ICCV (2021).

  13. Ronneberger, O., Fischer, P. & Brox, T. U-net: Convolutional networks for biomedical image segmentation. In MICCAI (2015).

  14. Maximov, M., Elezi, I. & Leal-Taixé, L. Ciagan: Conditional identity anonymization with generative adversarial networks. In CVPR Workshops (2020).

  15. Meden, B. et al. Privacy-enhancing face biometrics: A comprehensive survey. IEEE Trans. Inf. Forensics Secur. 16, 4147–4183 (2021).

    Google Scholar 

  16. Barattin, S. et al. Attribute-preserving face dataset anonymization via latent code optimization. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (IEEE, 2023).

  17. Li, D. & et al. Riddle: Reversible and diversified de-identification with latent encryptor. arXiv:2303.05171 (2023).

  18. Zhu, J., Kaplan, R., Johnson, J. & Fei-Fei, L. Hidden: Hiding data with deep networks. In ECCV (2018).

  19. Tancik, M. et al. Stegastamp: Invisible hyperlinks in physical photographs. In CVPR (2020).

  20. Tancik, M., Mildenhall, B. & Ng, R. Stegastamp: Invisible hyperlinks in physical photographs. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2117–2126 (2020).

  21. Kingma, D. P. & Ba, J. Adam: A method for stochastic optimisation. In International Conference on Learning Representations (ICLR) arXiv:1412.6980 (2015).

  22. Karras, T., Laine, S. & Aila, T. A style-based generator architecture for generative adversarial networks. In Proc. CVPR, 4401–4410 (2019).

  23. Zhang, K., Zhang, Z., Li, Z. & Qiao, Y. Joint face detection and alignment using multitask cascaded convolutional networks. In: Proc. IEEE SPL 23, 1499–1503 (2016).

  24. Karras, T., Aila, T., Laine, S. & Lehtinen, J. Progressive growing of GANs for improved quality, stability, and variation. In Proc. ICLR (2018).

  25. Liu, Z., Luo, P., Wang, X. & Tang, X. Deep learning face attributes in the wild. In Proc. ICCV, 3730–3738 (2015).

  26. Huang, G. B., Ramesh, M., Berg, T. & Learned-Miller, E. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. In Proc. Workshop on Faces in ’Real-Life’ Images (2007).

  27. Kärkkäinen, K. & Joo, J. Fairface: Face attribute dataset for balanced race, gender, and age. arXiv:1908.04913 (2021).

  28. Gu, X. et al. Password-conditioned anonymization and deanonymization with face identity transformers. In European Conference on Computer Vision (ECCV), Proceedings of ECCV 2020 (Springer International Publishing, 2020).

  29. Rombach, R., Blattmann, A., Lorenz, D., Esser, P. & Ommer, B. High-resolution image synthesis with latent diffusion models. In Proc. CVPR, 10684–10695 (2022).

  30. Wang, L. et al. Adding conditional control to text-to-image diffusion models. arXiv:2302.05543 (2023).

  31. Muhammad, D. & Bendechache, M. Can ai be faster, accurate, and explainable? spikenet makes it happen. In Annual Conference on Medical Image Understanding and Analysis, 43–57 (Springer, 2025).

  32. Zhang, Z., Zhang, Z., Zhou, H. & Hu, N. Steganogan: High capacity image steganography with GANs. In Proc. ICASSP, 2087–2091 (2019).

  33. Muhammad, D., Keles, A. & Bendechache, M. Towards explainable deep learning in oncology: Integrating efficientnet-b7 with xai techniques for acute lymphoblastic leukaemia. In Proceedings of the 27th European Conference on Artificial Intelligence (ECAI) (Spain, 2024) (2024).

  34. Ali, M., Muhammad, D., Khalaf, O. I. & Habib, R. Optimizing mobile cloud computing: A comparative analysis and innovative cost-efficient partitioning model. SN Comput. Sci. 6, 1–25 (2025).

    Google Scholar 

  35. Muhammad, D., Salman, M. & Bendechache, M. High cost, low trust? msa-pnet fixes both for medical imaging. In Proceedings of the Second Workshop on Explainable Artificial Intelligence for the medical domain-25-30 October (2025).

  36. Muhammad, D., Salman, M. & Bendechache, M. Cracking the clinical code: A scoping review on mechanistic interpretability in medical report generation. Comput. Struct. Biotechnol. Rep. 100066 (2025).

  37. Wang, Z., Bovik, A. C., Sheikh, H. R. & Simoncelli, E. P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612. https://doi.org/10.1109/TIP.2003.819861 (2004).

    Google Scholar 

  38. Hore, A. & Ziou, D. Image quality metrics: Psnr vs. ssim. In Proceedings of the 20th International Conference on Pattern Recognition (ICPR), 2366–2369, https://doi.org/10.1109/ICPR.2010.579 (IEEE, 2010).

  39. Ke, W. et al. Improving the transferability of adversarial examples through neighborhood attribution. Knowl.-Based Syst. 296, 111909 (2024).

    Google Scholar 

  40. Zheng, D. et al. Enhancing the transferability of adversarial attacks via multi-feature attention. IEEE Trans. Inf. Forensics Secur. (2025).

Download references

Acknowledgements

This research was supported by Taighde Éireann – Research Ireland under grant numbers GOIPG/2025/8471, 18/CRT/6223 (RI Centre for Research Training in Artificial Intelligence), 13/RC/2106/\(P\_2\) (ADAPT Centre) and 13/RC/2094/\(P\_2\) (Lero Centre). For the purpose of Open Access, the author has applied a CC BY public copyright licence to any Author Accepted Manuscript version arising from this submission.

Funding

This research was supported by Taighde Éireann – Research Ireland under grant numbers GOIPG/2025/8471, 18/CRT/6223 (RI Centre for Research Training in Artificial Intelligence), 13/RC/2106/\(P\_2\) (ADAPT Centre) and 13/RC/2094/\(P\_2\) (Lero Centre).

Author information

Authors and Affiliations

  1. Research Ireland Center of Research Training and Artificial Intelligence (CRT-AI), Galway, Ireland

    Dost Muhammad

  2. Department of Software Engineering, University of Malakand, Malakand, Pakistan

    Muhammad Salman

  3. ADAPT Research Centre, School of Computer Science, University of Galway, Galway, Ireland

    Dost Muhammad & Malika Bendechache

  4. School of Computer Science, University of Galway, Galway, Ireland

    Syed Muhammad Haider Shah

Authors
  1. Dost Muhammad
    View author publications

    Search author on:PubMed Google Scholar

  2. Muhammad Salman
    View author publications

    Search author on:PubMed Google Scholar

  3. Syed Muhammad Haider Shah
    View author publications

    Search author on:PubMed Google Scholar

  4. Malika Bendechache
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Dost Muhammad: Conceptualisation, Methodology, Writing-Original draft preparation, Investigation, Funding. Muhammad Salman: Data curation, Writing- Original draft preparation. S.M Haider: Visualisation, Dataset analysis, Writing-Original draft preparation.Malika Bendechache: Supervision, Writing- Reviewing and Editing, Validation, and Funding.

Corresponding author

Correspondence to Dost Muhammad.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Supplementary Information.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammad, D., Salman, M., Shah, S.M.H. et al. ReFaceX: donor-driven reversible face anonymisation with detached recovery. Sci Rep (2026). https://doi.org/10.1038/s41598-026-39337-2

Download citation

  • Received: 27 October 2025

  • Accepted: 04 February 2026

  • Published: 09 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-39337-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Deep learning in imaging
  • ReFaceX
  • Reversible face anonymisation
  • Donor-driven identity transfer
  • Identity feature fusion
  • Image steganography
  • Detached recovery
  • Privacy utility trade off
  • Open set re-identification
  • Face recognition auditing
Download PDF

Associated content

Collection

Deep learning for image analysis

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics