Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

被引:0
|
作者
Li, Ming [1 ,2 ]
Yang, Zhaoli [1 ]
Wang, Tao [3 ]
Zhang, Yushu [3 ]
Wen, Wenying [4 ]
机构
[1] Henan Normal University, College of Computer and Information Engineering, Xinxiang
[2] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang
[3] Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing
[4] Jiangxi University of Finance and Economics, School of Computer and Artificial Intelligence, Nanchang
基金
中国国家自然科学基金;
关键词
Adversarial examples; copyright; deep neural networks; privacy protection; robust watermarking;
D O I
10.1109/TCSVT.2024.3448351
中图分类号
学科分类号
摘要
In recent years, the uploading of massive personal images has increased the security risks, mainly including privacy breaches and copyright infringement. Adversarial examples provide a novel solution for protecting image privacy, as they can evade the detection by deep neural network (DNN)-based recognizers. However, the perturbations in the adversarial examples typically meaningless and therefore cannot be extracted as traceable information to support copyright protection. In this paper, we designed a dual protection scheme for image privacy and copyright via traceable adversarial examples. Specifically, a traceable adversarial model is proposed, which can be used to embed the invisible copyright information into images for copyright protection while fooling DNN-based recognizers for privacy protection. Inspired by the training method of generative adversarial networks (GANs), a new dynamic adversarial training strategy is designed, which allows our model for achieving stable multi-objective learning. Experimental results show that our scheme is exceptionally robust in the face of a variety of noise conditions and image processing methods, while exhibiting good model migration and defense robustness. © 1991-2012 IEEE.
引用
收藏
页码:13401 / 13412
页数:11
相关论文
共 50 条
  • [1] Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images
    Li, Ming
    Wang, Si
    SIGNAL PROCESSING, 2025, 230
  • [2] Collaborative Face Privacy Protection Method Based on Adversarial Examples in Social Networks
    Pan, Zhenxiong
    Sun, Junmei
    Li, Xiumei
    Zhang, Xin
    Bai, Huang
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I, 2023, 14086 : 499 - 510
  • [3] Lightweight Privacy Protection via Adversarial Sample
    Xie, Guangxu
    Hou, Gaopan
    Pei, Qingqi
    Huang, Haibo
    ELECTRONICS, 2024, 13 (07)
  • [4] Towards A Guided Perturbation for Privacy Protection through Detecting Adversarial Examples with Provable Accuracy and Precision
    Lin, Ying
    Qu, Yanzhen
    Zhang, Zhiyuan
    Su, Haorong
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 107 - 112
  • [5] Generative Adversarial Network Based Image Privacy Protection Algorithm
    He, Yuwen
    Zhang, Chunhong
    Zhu, Xinning
    Ji, Yang
    TENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2018), 2019, 11069
  • [6] Explaining Image Misclassification in Deep Learning via Adversarial Examples
    Haffar, Rami
    Jebreel, Najeeb Moharram
    Domingo-Ferrer, Josep
    Sanchez, David
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE (MDAI 2021), 2021, 12898 : 323 - 334
  • [7] Generating traceable adversarial text examples by watermarking in the semantic space
    Li, Mingjie
    Wu, Hanzhou
    Zhang, Xinpeng
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [8] Generating Adversarial Examples with Image-To-Perturbation Network
    Wang, Desheng
    Jin, Weidong
    Wu, Yunpu
    PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 7055 - 7060
  • [9] Detecting adversarial examples using image reconstruction differences
    Sun, Jiaze
    Yi, Meng
    SOFT COMPUTING, 2023, 27 (12) : 7863 - 7877
  • [10] Privacy protection generalization with adversarial fusion
    Wang, Hao
    Sun, Guangmin
    Zheng, Kun
    Li, Hui
    Liu, Jie
    Bai, Yu
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (07) : 7314 - 7336