Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

被引:0
|
作者
Li, Ming [1 ,2 ]
Yang, Zhaoli [1 ]
Wang, Tao [3 ]
Zhang, Yushu [3 ]
Wen, Wenying [4 ]
机构
[1] Henan Normal University, College of Computer and Information Engineering, Xinxiang,453007, China
[2] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang,453007, China
[3] Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing,211106, China
[4] Jiangxi University of Finance and Economics, School of Computer and Artificial Intelligence, Nanchang,330032, China
关键词
D O I
10.1109/TCSVT.2024.3448351
中图分类号
学科分类号
摘要
53
引用
收藏
页码:13401 / 13412
相关论文
共 50 条
  • [21] TAE-RWP: Traceable Adversarial Examples With Recoverable Warping Perturbation
    Xing, Fan
    Zhou, Xiaoyi
    Peng, Hongli
    Fan, Xuefeng
    Han, Wenbao
    Zhang, Yuqing
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2024, 2024
  • [22] Towards A Guided Perturbation for Privacy Protection through Detecting Adversarial Examples with Provable Accuracy and Precision
    Lin, Ying
    Qu, Yanzhen
    Zhang, Zhiyuan
    Su, Haorong
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 107 - 112
  • [23] Blockchain-based Medical Image Data Trading Platform with Copyright and Privacy Protection
    Wang, Baowei
    Huang, Wenjue
    Li, Bin
    Yuan, Yi
    Yang, Fan
    Hu, Zhengyu
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 224 - 229
  • [24] Image watermarking for copyright protection
    Heileman, GL
    Pizano, CE
    Abdallah, CT
    ALGORITHM ENGINEERING AND EXPERIMENTATION, 1999, 1619 : 226 - 245
  • [25] Privacy protection generalization with adversarial fusion
    Wang, Hao
    Sun, Guangmin
    Zheng, Kun
    Li, Hui
    Liu, Jie
    Bai, Yu
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (07) : 7314 - 7336
  • [26] Recoverable Privacy-preserving Image Classification through Noise-like Adversarial Examples
    Liu, Jun
    Zhou, Jiantao
    Tian, Jinyu
    Sun, Weiwei
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (07)
  • [27] Image watermarking for copyright protection and data hiding via the Mojette transform
    Autrusseau, F
    Guédon, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 378 - 386
  • [28] Adversarial Examples Improve Image Recognition
    Xie, Cihang
    Tan, Mingxing
    Gong, Boqing
    Wang, Jiang
    Yuille, Alan L.
    Le, Quoc, V
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 816 - 825
  • [29] Deep Learning-Based Dual Watermarking for Image Copyright Protection and Authentication
    Padhi, Sudev Kumar
    Tiwari, Archana
    Ali, Sk. Subidh
    IEEE Transactions on Artificial Intelligence, 2024, 5 (12): : 6134 - 6145
  • [30] Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection
    Kumar, Ashwani
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (03) : 22 - 36