Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images

被引:0
|
作者
Li, Ming [1 ,2 ]
Wang, Si [1 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Key Lab Artificial Intelligence & Personalized Lea, Xinxiang 453007, Henan, Peoples R China
关键词
Privacy protection; Image authentication; Adversarial examples; Channel attention; Generative adversarial networks; DEEP NEURAL-NETWORKS; ROBUSTNESS;
D O I
10.1016/j.sigpro.2024.109816
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of network technology, more and more images containing personal identity characteristics are being released by users on open network platforms. However, these images are easily collected by malicious users, leading to problems such as privacy leakage, infringement, and tampering, thus harming users' legitimate interests. Recent studies have found that adversarial examples generated by adding tiny perturbations to an image can mislead image classifiers, causing incorrect classifications. Therefore significant privacy protection against deep neural networks is achieved while the visual quality remains indistinguishable to human eyes. However, these methods cannot protect the authenticity and integrity of the image simultaneously, failing to address infringement and tampering issues, which are also neglectable in the open network platforms. To solve this problem, we propose a novel authentication-enabled privacy protection method. The meaningful information used for authentication, instead of the meaningless perturbations, is embedded into the host image to generate adversarial examples, thereby achieving both authentication and privacy protection simultaneously. This scheme combines attention mechanisms with generative adversarial networks to adaptively select and weight features between different channels, achieving significant improvements in both aggressiveness and authentication capability. Experimental results show that our method outperforms recent similar methods in overall performance.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Efficient remote attestation mechanism with privacy protection
    Xu Z.-Y.
    He Y.-P.
    Deng L.-L.
    Ruan Jian Xue Bao/Journal of Software, 2011, 22 (02): : 339 - 352
  • [22] A novel approach to generating high-resolution adversarial examples
    Fang, Xianjin
    Li, Zhiwei
    Yang, Gaoming
    APPLIED INTELLIGENCE, 2022, 52 (02) : 1289 - 1305
  • [23] Data Chunks Adjustment Mechanism for Privacy Protection
    Shi Y.-L.
    Chen Y.
    Sun S.-B.
    Cui L.-Z.
    1600, Science Press (40): : 2719 - 2733
  • [24] A novel approach to generating high-resolution adversarial examples
    Xianjin Fang
    Zhiwei Li
    Gaoming Yang
    Applied Intelligence, 2022, 52 : 1289 - 1305
  • [25] Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples
    Jia, Xiaojun
    Wei, Xingxing
    Cao, Xiaochun
    Han, Xiaoguang
    MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 1579 - 1587
  • [26] ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints
    Xue, Mingfu
    Sun, Shichang
    He, Can
    Gu, Dujuan
    Zhang, Yushu
    Wang, Jian
    Liu, Weiqiang
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2023, 17 (3-4) : 111 - 126
  • [27] Toward Invisible Adversarial Examples Against DNN-Based Privacy Leakage for Internet of Things
    Ding, Xuyang
    Zhang, Shuai
    Song, Mengkai
    Ding, Xiaocong
    Li, Fagen
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02): : 802 - 812
  • [28] Recoverable Privacy-preserving Image Classification through Noise-like Adversarial Examples
    Liu, Jun
    Zhou, Jiantao
    Tian, Jinyu
    Sun, Weiwei
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (07)
  • [29] A Novel Privacy Protection Scheme for Iris Identification
    Zhang Lei
    Yu Lili
    Wang Bin
    Bian Xingchao
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (04) : 2411 - 2425
  • [30] Person region extraction and background replacement in images for privacy protection
    Sato S.
    Kageyama Y.
    Ishizawa C.
    Nishida M.
    2018, Society of Materials Engineering for Resources of Japan (23) : 162 - 166