Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

被引:0
|
作者
Li, Ming [1 ,2 ]
Yang, Zhaoli [1 ]
Wang, Tao [3 ]
Zhang, Yushu [3 ]
Wen, Wenying [4 ]
机构
[1] Henan Normal University, College of Computer and Information Engineering, Xinxiang,453007, China
[2] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang,453007, China
[3] Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing,211106, China
[4] Jiangxi University of Finance and Economics, School of Computer and Artificial Intelligence, Nanchang,330032, China
关键词
D O I
10.1109/TCSVT.2024.3448351
中图分类号
学科分类号
摘要
53
引用
收藏
页码:13401 / 13412
相关论文
共 50 条
  • [21] Privacy protection generalization with adversarial fusion
    Wang, Hao
    Sun, Guangmin
    Zheng, Kun
    Li, Hui
    Liu, Jie
    Bai, Yu
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (07) : 7314 - 7336
  • [22] Recoverable Privacy-preserving Image Classification through Noise-like Adversarial Examples
    Liu, Jun
    Zhou, Jiantao
    Tian, Jinyu
    Sun, Weiwei
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (07)
  • [23] Image watermarking for copyright protection and data hiding via the Mojette transform
    Autrusseau, F
    Guédon, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 378 - 386
  • [24] Adversarial Examples Improve Image Recognition
    Xie, Cihang
    Tan, Mingxing
    Gong, Boqing
    Wang, Jiang
    Yuille, Alan L.
    Le, Quoc, V
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 816 - 825
  • [25] Deep Learning-Based Dual Watermarking for Image Copyright Protection and Authentication
    Padhi, Sudev Kumar
    Tiwari, Archana
    Ali, Sk. Subidh
    IEEE Transactions on Artificial Intelligence, 2024, 5 (12): : 6134 - 6145
  • [26] Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection
    Kumar, Ashwani
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (03) : 22 - 36
  • [27] Privacy-Preserving Image Features via Adversarial Affine Subspace Embeddings
    Dusmanu, Mihai
    Schoenberger, Johannes L.
    Sinha, Sudipta N.
    Pollefeys, Marc
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 14262 - 14272
  • [28] Detecting Overfitting via Adversarial Examples
    Werpachowski, Roman
    Gyorgy, Andras
    Szepesvari, Csaba
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32
  • [29] AdvCloak: Customized adversarial cloak for privacy protection
    Liu, Xuannan
    Zhong, Yaoyao
    Cui, Xing
    Zhang, Yuhang
    Li, Peipei
    Deng, Weihong
    Pattern Recognition, 2025, 158
  • [30] Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks
    Adewole, Kayode S.
    Torra, Vicenc
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 279 - 286