Scalable Universal Adversarial Watermark Defending Against Facial Forgery

被引:0
|
作者
Qiao, Tong [1 ]
Zhao, Bin [1 ]
Shi, Ran [2 ]
Han, Meng [3 ]
Hassaballah, Mahmoud [4 ,5 ]
Retraint, Florent [6 ]
Luo, Xiangyang [7 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
[3] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[4] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Dept Comp Sci, Alkharj 16278, Saudi Arabia
[5] South Valley Univ, Dept Comp Sci, Qena 83523, Egypt
[6] Univ Technol Troyes, Lab Comp Sci & Digital Soc, F-10004 Troyes, France
[7] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Watermarking; Forgery; Predictive models; Generative adversarial networks; Computational modeling; Perturbation methods; Detectors; GAN forgery model; active defense; adversarial watermark; scalability;
D O I
10.1109/TIFS.2024.3460387
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The illegal use of facial forgery models, such as Generative Adversarial Networks (GAN) synthesized contents, has been on the rise, thereby posing great threats to personal reputation and national security. To mitigate these threats, recent studies have proposed the use of adversarial watermarks as countermeasures against GAN, effectively disrupting their outputs. However, the majority of these adversarial watermarks exhibit very limited defense ranges, providing defense against only a single GAN forgery model. Although some universal adversarial watermarks have demonstrated impressive results, they lack the defense scalability as a new-emerging forgery model appears. To address the tough issue, we propose a scalable approach even when the original forgery models are unknown. Specifically, a watermark expansion scheme, which mainly involves inheriting, defense and constraint steps, is introduced. On the one hand, the proposed method can effectively inherit the defense range of the prior well-trained adversarial watermark; on the other hand, it can defend against a new forgery model. Extensive experimental results validate the efficacy of the proposed method, exhibiting superior performance and reduced computational time compared to the state-of-the-arts.
引用
下载
收藏
页码:8998 / 9011
页数:14
相关论文
共 50 条
  • [31] Texture Re-Scalable Universal Adversarial Perturbation
    Huang, Yihao
    Guo, Qing
    Juefei-Xu, Felix
    Hu, Ming
    Jia, Xiaojun
    Cao, Xiaochun
    Pu, Geguang
    Liu, Yang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8291 - 8305
  • [32] Universal Forgery Attack Against GCM-RUP
    Li, Yanbin
    Leurent, Gaetan
    Wang, Meiqin
    Wang, Wei
    Zhang, Guoyan
    Liu, Yu
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 15 - 34
  • [33] Defense against Universal Adversarial Perturbations
    Akhtar, Naveed
    Liu, Jian
    Mian, Ajmal
    2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 3389 - 3398
  • [34] A Comparative Study of Cross-Model Universal Adversarial Perturbation for Face Forgery
    Lin, Shuo-Yen
    Chen, Jun-Cheng
    Wang, Jia-Ching
    2022 IEEE INTERNATIONAL CONFERENCE ON VISUAL COMMUNICATIONS AND IMAGE PROCESSING (VCIP), 2022,
  • [35] Evidential classification for defending against adversarial attacks on network traffic
    Beechey, Matthew
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos G.
    INFORMATION FUSION, 2023, 92 : 115 - 126
  • [36] VeriFace: Defending against Adversarial Attacks in Face Verification Systems
    Sayed, Awny
    Kinlany, Sohair
    Zaki, Alaa
    Mahfouz, Ahmed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3151 - 3166
  • [37] Feature decoupling and interaction network for defending against adversarial examples
    Wang, Weidong
    Li, Zhi
    Liu, Shuaiwei
    Zhang, Li
    Yang, Jin
    Wang, Yi
    IMAGE AND VISION COMPUTING, 2024, 144
  • [38] Defending Against Adversarial Iris Examples Using Wavelet Decomposition
    Soleymani, Sobhan
    Dabouei, Ali
    Dawson, Jeremy
    Nasrabadi, Nasser M.
    2019 IEEE 10TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2019,
  • [39] Defending non-Bayesian learning against adversarial attacks
    Lili Su
    Nitin H. Vaidya
    Distributed Computing, 2019, 32 : 277 - 289
  • [40] Defending non-Bayesian learning against adversarial attacks
    Su, Lili
    Vaidya, Nitin H.
    DISTRIBUTED COMPUTING, 2019, 32 (04) : 277 - 289