Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

被引:0
|
作者
Li, Ming [1 ,2 ]
Yang, Zhaoli [1 ]
Wang, Tao [3 ]
Zhang, Yushu [3 ]
Wen, Wenying [4 ]
机构
[1] Henan Normal University, College of Computer and Information Engineering, Xinxiang
[2] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang
[3] Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing
[4] Jiangxi University of Finance and Economics, School of Computer and Artificial Intelligence, Nanchang
基金
中国国家自然科学基金;
关键词
Adversarial examples; copyright; deep neural networks; privacy protection; robust watermarking;
D O I
10.1109/TCSVT.2024.3448351
中图分类号
学科分类号
摘要
In recent years, the uploading of massive personal images has increased the security risks, mainly including privacy breaches and copyright infringement. Adversarial examples provide a novel solution for protecting image privacy, as they can evade the detection by deep neural network (DNN)-based recognizers. However, the perturbations in the adversarial examples typically meaningless and therefore cannot be extracted as traceable information to support copyright protection. In this paper, we designed a dual protection scheme for image privacy and copyright via traceable adversarial examples. Specifically, a traceable adversarial model is proposed, which can be used to embed the invisible copyright information into images for copyright protection while fooling DNN-based recognizers for privacy protection. Inspired by the training method of generative adversarial networks (GANs), a new dynamic adversarial training strategy is designed, which allows our model for achieving stable multi-objective learning. Experimental results show that our scheme is exceptionally robust in the face of a variety of noise conditions and image processing methods, while exhibiting good model migration and defense robustness. © 1991-2012 IEEE.
引用
收藏
页码:13401 / 13412
页数:11
相关论文
共 50 条
  • [21] Revisiting model fairness via adversarial examples
    Zhang, Tao
    Zhu, Tianqing
    Li, Jing
    Zhou, Wanlei
    Yu, Philip S.
    KNOWLEDGE-BASED SYSTEMS, 2023, 277
  • [22] Privacy Risks of Securing Machine Learning Models against Adversarial Examples
    Song, Liwei
    Shokri, Reza
    Mittal, Prateek
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 241 - 257
  • [23] Restoration of Adversarial Examples Using Image Arithmetic Operations
    Ali, Kazim
    Quershi, Adnan N.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (01) : 271 - 284
  • [24] Invisible Adversarial Watermarking: A Novel Security Mechanism for Enhancing Copyright Protection
    Wang, Jinwei
    Wang, Haihua
    Zhang, Jiawei
    Wu, Hao
    Luo, Xiangyang
    Ma, Bin
    ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 21 (02)
  • [25] A Label-based Approach for Automatic Identifying Adversarial Examples with Image Transformation
    Dang Duy Thang
    Matsui, Toshihiro
    2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR 2019), 2019, : 112 - 120
  • [26] Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters
    Dang Duy Thang
    Matsui, Toshihiro
    IEEE ACCESS, 2020, 8 : 44426 - 44442
  • [27] Image Privacy Protection Techniques: A Survey
    Rakhmawati, Lusia
    Wirawan
    Suwadi
    PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, : 0076 - 0080
  • [28] Generating Adversarial Examples in One Shot With Image-to-Image Translation GAN
    Zhang, Weijia
    IEEE ACCESS, 2019, 7 : 151103 - 151119
  • [29] Defending against adversarial examples using perceptual image hashing
    Wu, Ke
    Wang, Zichi
    Zhang, Xinpeng
    Tang, Zhenjun
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (02)
  • [30] A data-driven adversarial examples recognition framework via adversarial feature genomes
    Chen, Li
    Li, Qi
    Chen, Weiye
    Wang, Zeyu
    Li, Haifeng
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 6438 - 6462