I have tried different guidance on four attack methods: CW, Encoder, VAE, and FaceLock. It is confusing that FaceLock is not the only method of destroying facial information. It varies from the guidance scale relatively.
From top to bottom: Original Image, CW attack, Encoder attack, VAE attack, FaceLock attack
From left to right: Original image or protected image, edited image with guidance [2, 3, 4, 5, 6, 7, 7.5, 8]
Place a headband in the hair

Let the person wear a police suit

I have tried different guidance on four attack methods: CW, Encoder, VAE, and FaceLock. It is confusing that FaceLock is not the only method of destroying facial information. It varies from the guidance scale relatively.
From top to bottom: Original Image, CW attack, Encoder attack, VAE attack, FaceLock attack
From left to right: Original image or protected image, edited image with guidance [2, 3, 4, 5, 6, 7, 7.5, 8]
Place a headband in the hair
Let the person wear a police suit