Multifunctional adversarial examples: A novel mechanism for authenticatable privacy protection of images

被引:0
|
作者
Li, Ming [1 ,2 ]
Wang, Si [1 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Key Lab Artificial Intelligence & Personalized Lea, Xinxiang 453007, Henan, Peoples R China
关键词
Privacy protection; Image authentication; Adversarial examples; Channel attention; Generative adversarial networks; DEEP NEURAL-NETWORKS; ROBUSTNESS;
D O I
10.1016/j.sigpro.2024.109816
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of network technology, more and more images containing personal identity characteristics are being released by users on open network platforms. However, these images are easily collected by malicious users, leading to problems such as privacy leakage, infringement, and tampering, thus harming users' legitimate interests. Recent studies have found that adversarial examples generated by adding tiny perturbations to an image can mislead image classifiers, causing incorrect classifications. Therefore significant privacy protection against deep neural networks is achieved while the visual quality remains indistinguishable to human eyes. However, these methods cannot protect the authenticity and integrity of the image simultaneously, failing to address infringement and tampering issues, which are also neglectable in the open network platforms. To solve this problem, we propose a novel authentication-enabled privacy protection method. The meaningful information used for authentication, instead of the meaningless perturbations, is embedded into the host image to generate adversarial examples, thereby achieving both authentication and privacy protection simultaneously. This scheme combines attention mechanisms with generative adversarial networks to adaptively select and weight features between different channels, achieving significant improvements in both aggressiveness and authentication capability. Experimental results show that our method outperforms recent similar methods in overall performance.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Forensics of visual privacy protection in digital images
    Xue, Fei
    Lu, Wei
    Ren, Honglin
    Xiao, Huimei
    Zhang, Qin
    Liu, Xianjin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 12427 - 12445
  • [32] Trajectory data privacy protection based on differential privacy mechanism
    Gu, Ke
    Yang, Lihao
    Liu, Yongzhi
    Liao, Niandong
    2017 2ND INTERNATIONAL CONFERENCE ON RELIABILITY ENGINEERING (ICRE 2017), 2018, 351
  • [33] Continuous location privacy protection mechanism based on differential privacy
    Li H.
    Ren X.
    Wang J.
    Ma J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 164 - 175
  • [34] A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples
    Yang, Rui
    Cao, Tian-Jie
    Chen, Xiu-Qing
    Zhang, Feng-Rong
    COMPUTERS & SECURITY, 2021, 111
  • [35] A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism
    Zhang, Lei
    Cao, Mingzeng
    Li, Jing
    Zhang, Chenglin
    He, Lili
    COMPUTING, 2025, 107 (01)
  • [36] Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy
    Zhang, Zhaoyang
    Wang, Shen
    Zhu, Guopu
    Zhan, Dechen
    Huang, Jiwu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8701 - 8716
  • [37] FOX: Fooling with Explanations Privacy Protection with Adversarial Reactions in Social Media
    Belhadj-Cheikh, Noreddine
    Imine, Abdessamad
    Rusinowitch, Michael
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [38] Privacy Protection Against Automated Tracking System Using Adversarial Patch
    Takiwaki, Hiroto
    Kuribayashi, Minoru
    Funabiki, Nobuo
    Raval, Mehul S.
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1849 - 1854
  • [39] An Image Privacy Protection Algorithm Based on Adversarial Perturbation Generative Networks
    Tong, Chao
    Zhang, Mengze
    Lang, Chao
    Zheng, Zhigao
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [40] Privacy Protection of Grid Users Data with Blockchain and Adversarial Machine Learning
    Yilmaz, Ibrahim
    Kapoor, Kavish
    Siraj, Ambareen
    Abouyoussef, Mahmoud
    SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 33 - 38