Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images

被引:0
作者
Li, Ming [1 ,2 ]
Wang, Si [1 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Key Lab Artificial Intelligence & Personalized Lea, Xinxiang 453007, Henan, Peoples R China
关键词
Privacy protection; Image authentication; Adversarial examples; Channel attention; Generative adversarial networks; DEEP NEURAL-NETWORKS; ROBUSTNESS;
D O I
10.1016/j.sigpro.2024.109816
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of network technology, more and more images containing personal identity characteristics are being released by users on open network platforms. However, these images are easily collected by malicious users, leading to problems such as privacy leakage, infringement, and tampering, thus harming users' legitimate interests. Recent studies have found that adversarial examples generated by adding tiny perturbations to an image can mislead image classifiers, causing incorrect classifications. Therefore significant privacy protection against deep neural networks is achieved while the visual quality remains indistinguishable to human eyes. However, these methods cannot protect the authenticity and integrity of the image simultaneously, failing to address infringement and tampering issues, which are also neglectable in the open network platforms. To solve this problem, we propose a novel authentication-enabled privacy protection method. The meaningful information used for authentication, instead of the meaningless perturbations, is embedded into the host image to generate adversarial examples, thereby achieving both authentication and privacy protection simultaneously. This scheme combines attention mechanisms with generative adversarial networks to adaptively select and weight features between different channels, achieving significant improvements in both aggressiveness and authentication capability. Experimental results show that our method outperforms recent similar methods in overall performance.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A NOVEL EYE REGION BASED PRIVACY PROTECTION SCHEME
    Lee, Dohyoung
    Plataniotis, Konstantinos N.
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 1845 - 1848
  • [42] A novel anonymization algorithm: Privacy protection and knowledge preservation
    Yang, Weijia
    Qiao, Sanzheng
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 756 - 766
  • [43] A NOVEL PRIVACY PROTECTION SCHEME FOR PARTICIPATORY SENSING WITH INCENTIVES
    Zhang, Junsong
    Ma, Jian
    Wang, Wendong
    Liu, Yazhi
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1017 - 1021
  • [44] Ciphertext Fuzzy Retrieval Mechanism With Bidirectional Verification and Privacy Protection
    Xie, Tianyu
    Yuan, Lingyun
    Zhang, Qianhui
    Wu, Jiaying
    Ren, Fei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 41061 - 41083
  • [45] Generating and Restoring Private Face Images for Internet of Vehicles Based on Semantic Features and Adversarial Examples
    Yang, Jingjing
    Liu, Jiaxing
    Han, Runkai
    Wu, Jinzhao
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 16799 - 16809
  • [46] Privacy protection-based incentive mechanism for Mobile Crowdsensing
    Tao, Dan
    Wu, Tin-Yu
    Zhu, Shaojun
    Guizani, Mohsen
    COMPUTER COMMUNICATIONS, 2020, 156 : 201 - 210
  • [47] A dynamic group privacy protection mechanism based on cloud model
    Zhai, Ruxiang
    Zhang, Kun
    Liu, Mingjun
    PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, : 83 - 88
  • [48] Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models
    Zhang, Xingwei
    Zheng, Xiaolong
    Mao, Wenji
    Zeng, Daniel Dajun
    Wang, Fei-Yue
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06) : 3241 - 3251
  • [49] Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks
    Seidlitz, Stefan
    Juergens, Kris
    Makrushin, Andrey
    Kraetzer, Christian
    Dittmann, Jana
    VISAPP: PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS - VOL. 4: VISAPP, 2021, : 345 - 352
  • [50] A Novel Federated Learning Framework Based on Conditional Generative Adversarial Networks for Privacy Preserving in 6G
    Huang, Jia
    Chen, Zhen
    Liu, Shengzheng
    Long, Haixia
    ELECTRONICS, 2024, 13 (04)