Facial Memorization of Diffusion Model

被引:0
作者
Ma, Shiang [1 ]
Cao, Yang [2 ]
Nakamura, Atsuyoshi [1 ]
机构
[1] Hokkaido Univ, Grad Sch Informat Sci & Technol, Sapporo, Hokkaido, Japan
[2] Inst Sci Tokyo, Dept Comp Sci, Tokyo, Japan
来源
DATABASES THEORY AND APPLICATIONS, ADC 2024 | 2025年 / 15449卷
关键词
Diffusion Model; Memorization; Face Image; Facial Memorization; Differential Privacy;
D O I
10.1007/978-981-96-1242-0_38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, diffusion models have emerged as the dominant methodology employed in image generation. Nevertheless, several studies have demonstrated the capacity of diffusion models to memorize training datasets. This capacity gives rise to considerable concerns regarding the security and privacy of users. It is, therefore, crucial to develop effective methods for detecting and defending against memorization. Existing work suffers from several problems, including unreasonable motivations, ambiguous definitions of memorization, and impractical experimental setups. These problems can be addressed by focusing on facial memorization. In this work, we propose a novel detection method to identify facial memorization within generated images. Our approach categorizes generated images of a target diffusion model into memorized and non-memorized groups. In practice, our method could be utilized by developers to assess their developed diffusion models and to determine whether a specific generation is a memorized generation. We then evaluate our method using a range of metrics, including True Positive Rates (TPRs) at fixed False Positive Rates (FPRs). The experimental results demonstrate that our method achieves high accuracy under specific conditions. Finally, we present a robust framework for addressing privacy issues in diffusion models and suggest avenues for future research.
引用
收藏
页码:519 / 529
页数:11
相关论文
共 21 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Carlini N, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P5253
  • [3] Duan JH, 2023, PR MACH LEARN RES, V202, P8717
  • [4] Differential privacy: A survey of results
    Dwork, Cynthia
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 : 1 - 19
  • [5] Ho J., 2020, P 34 INT C NEUR INF
  • [6] Hu H., 2023, arXiv
  • [7] DeepPrivacy: A Generative Adversarial Network for Face Anonymization
    Hukkelas, Hakon
    Mester, Rudolf
    Lindseth, Frank
    [J]. ADVANCES IN VISUAL COMPUTING, ISVC 2019, PT I, 2020, 11844 : 565 - 578
  • [8] Karras T, 2022, Advances in Neural Information Processing Systems, V35, P26565
  • [9] Kim K, 2022, Arxiv, DOI arXiv:2212.13344
  • [10] Kingma D.P., 2015, ACS SYM SER, DOI 10.48550/arXiv.1412.6980