Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images

被引:0
|
作者
Li, Ming [1 ,2 ]
Wang, Si [1 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Key Lab Artificial Intelligence & Personalized Lea, Xinxiang 453007, Henan, Peoples R China
关键词
Privacy protection; Image authentication; Adversarial examples; Channel attention; Generative adversarial networks; DEEP NEURAL-NETWORKS; ROBUSTNESS;
D O I
10.1016/j.sigpro.2024.109816
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of network technology, more and more images containing personal identity characteristics are being released by users on open network platforms. However, these images are easily collected by malicious users, leading to problems such as privacy leakage, infringement, and tampering, thus harming users' legitimate interests. Recent studies have found that adversarial examples generated by adding tiny perturbations to an image can mislead image classifiers, causing incorrect classifications. Therefore significant privacy protection against deep neural networks is achieved while the visual quality remains indistinguishable to human eyes. However, these methods cannot protect the authenticity and integrity of the image simultaneously, failing to address infringement and tampering issues, which are also neglectable in the open network platforms. To solve this problem, we propose a novel authentication-enabled privacy protection method. The meaningful information used for authentication, instead of the meaningless perturbations, is embedded into the host image to generate adversarial examples, thereby achieving both authentication and privacy protection simultaneously. This scheme combines attention mechanisms with generative adversarial networks to adaptively select and weight features between different channels, achieving significant improvements in both aggressiveness and authentication capability. Experimental results show that our method outperforms recent similar methods in overall performance.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Privacy protection and beautification of cornea images
    Wu, Chia-Lin
    Yang, Chuan-Kai
    Lin, Yi-Ling
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (22) : 32421 - 32448
  • [22] Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
    Liu, Yujia
    Zhang, Weiming
    Yu, Nenghai
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [23] Privacy Risks of Securing Machine Learning Models against Adversarial Examples
    Song, Liwei
    Shokri, Reza
    Mittal, Prateek
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 241 - 257
  • [24] A Protection Scheme With Speech Processing Against Audio Adversarial Examples
    Tarutani, Yuya
    Yamamoto, Taisei
    Fukushima, Yukinobu
    Yokohira, Tokumi
    IEEE ACCESS, 2024, 12 : 146551 - 146559
  • [25] Generative Adversarial Network Based Image Privacy Protection Algorithm
    He, Yuwen
    Zhang, Chunhong
    Zhu, Xinning
    Ji, Yang
    TENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2018), 2019, 11069
  • [26] Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective
    Oh, Seong Joon
    Fritz, Mario
    Schiele, Bernt
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, : 1491 - 1500
  • [27] Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples
    Abolfathi, Masoumeh
    Inturi, Srivani
    Banaei-Kashani, Farnoush
    Jafarian, J. Haadi
    COMPUTERS & SECURITY, 2024, 139
  • [28] Robust Privacy Protection Framework for Medical Images
    Zhao, Lei
    Jia, Menglin
    Xiong, Caili
    Meng, Jian
    Yang, Yang
    2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, : 169 - 176
  • [29] Forensics of visual privacy protection in digital images
    Fei Xue
    Wei Lu
    Honglin Ren
    Huimei Xiao
    Qin Zhang
    Xianjin Liu
    Multimedia Tools and Applications, 2020, 79 : 12427 - 12445
  • [30] Privacy Protection and Integrity Verification of HDR Images
    Mzoughi, Souha
    Zaid, Azza Ouled
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS AND DIGITAL IMAGE PROCESSING (CGDIP 2017), 2017,