Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

被引:0
|
作者
Li, Ming [1 ,2 ]
Yang, Zhaoli [1 ]
Wang, Tao [3 ]
Zhang, Yushu [3 ]
Wen, Wenying [4 ]
机构
[1] Henan Normal University, College of Computer and Information Engineering, Xinxiang
[2] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang
[3] Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing
[4] Jiangxi University of Finance and Economics, School of Computer and Artificial Intelligence, Nanchang
基金
中国国家自然科学基金;
关键词
Adversarial examples; copyright; deep neural networks; privacy protection; robust watermarking;
D O I
10.1109/TCSVT.2024.3448351
中图分类号
学科分类号
摘要
In recent years, the uploading of massive personal images has increased the security risks, mainly including privacy breaches and copyright infringement. Adversarial examples provide a novel solution for protecting image privacy, as they can evade the detection by deep neural network (DNN)-based recognizers. However, the perturbations in the adversarial examples typically meaningless and therefore cannot be extracted as traceable information to support copyright protection. In this paper, we designed a dual protection scheme for image privacy and copyright via traceable adversarial examples. Specifically, a traceable adversarial model is proposed, which can be used to embed the invisible copyright information into images for copyright protection while fooling DNN-based recognizers for privacy protection. Inspired by the training method of generative adversarial networks (GANs), a new dynamic adversarial training strategy is designed, which allows our model for achieving stable multi-objective learning. Experimental results show that our scheme is exceptionally robust in the face of a variety of noise conditions and image processing methods, while exhibiting good model migration and defense robustness. © 1991-2012 IEEE.
引用
收藏
页码:13401 / 13412
页数:11
相关论文
共 50 条
  • [41] Discriminative Manifold Learning Network using Adversarial Examples for Image Classification
    Zhang, Yuan
    Shi, Biming
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (05) : 2099 - 2106
  • [42] Adversarial Examples for Preventing Diffusion Models from Malicious Image Edition
    Guo, Mengjie
    Gai, Keke
    Yu, Jing
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, PT III, KSEM 2024, 2024, 14886 : 373 - 385
  • [43] An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy Protection
    Teng, Da
    Yao, Yanqing
    Wang, Yingdong
    Zhou, Lei
    Huang, Chao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 296 - 313
  • [44] ON THE TRANSFERABILITY OF ADVERSARIAL EXAMPLES AGAINST CNN-BASED IMAGE FORENSICS
    Barni, M.
    Kallas, K.
    Nowroozi, E.
    Tondi, B.
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 8286 - 8290
  • [45] Privacy-Preserving Feature Extraction via Adversarial Training
    Ding, Xiaofeng
    Fang, Hongbiao
    Zhang, Zhilin
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (04) : 1967 - 1979
  • [46] Protection and Utilization of Privacy Information via Sensing
    Babaguchi, Noboru
    Nakashima, Yuta
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (01) : 2 - 9
  • [47] An Efficient Consortium Blockchain Dual Privacy Protection Scheme
    Yang, Haipeng
    Han, Peng
    Xiong, Lili
    Li, Yuanyuan
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCS 2023, 2024, 2098 : 225 - 241
  • [48] Invertible Privacy-Preserving Adversarial Reconstruction for Image Compressed Sensing
    Xiao, Di
    Li, Yue
    Li, Min
    SENSORS, 2023, 23 (07)
  • [49] VISUAL PRIVACY PROTECTION VIA MAPPING DISTORTION
    Li, Yiming
    Liu, Peidong
    Jiang, Yong
    Xia, Shu-Tao
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 3740 - 3744
  • [50] ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints
    Xue, Mingfu
    Sun, Shichang
    He, Can
    Gu, Dujuan
    Zhang, Yushu
    Wang, Jian
    Liu, Weiqiang
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2023, 17 (3-4) : 111 - 126