Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples

被引:0
|
作者
Li, Ming [1 ,2 ]
Yang, Zhaoli [1 ]
Wang, Tao [3 ]
Zhang, Yushu [3 ]
Wen, Wenying [4 ]
机构
[1] Henan Normal University, College of Computer and Information Engineering, Xinxiang,453007, China
[2] Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang,453007, China
[3] Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing,211106, China
[4] Jiangxi University of Finance and Economics, School of Computer and Artificial Intelligence, Nanchang,330032, China
关键词
D O I
10.1109/TCSVT.2024.3448351
中图分类号
学科分类号
摘要
53
引用
收藏
页码:13401 / 13412
相关论文
共 50 条
  • [41] On the generation of adversarial examples for image quality assessment
    Sang, Qingbing
    Zhang, Hongguo
    Liu, Lixiong
    Wu, Xiaojun
    Bovik, Alan C.
    VISUAL COMPUTER, 2024, 40 (05): : 3183 - 3198
  • [42] Lyapunov stability for detecting adversarial image examples
    Pedraza, Anibal
    Deniz, Oscar
    Bueno, Gloria
    CHAOS SOLITONS & FRACTALS, 2022, 155
  • [43] ADVERSARIAL EXAMPLES FOR IMAGE CROPPING IN SOCIAL MEDIA
    Yoshida, Masatomo
    Okuda, Masahiro
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4898 - 4902
  • [44] On the generation of adversarial examples for image quality assessment
    Qingbing Sang
    Hongguo Zhang
    Lixiong Liu
    Xiaojun Wu
    Alan C. Bovik
    The Visual Computer, 2024, 40 : 3183 - 3198
  • [45] ADVERSARIAL EXAMPLES DETECTION BEYOND IMAGE SPACE
    Chen, Kejiang
    Chen, Yuefeng
    Zhou, Hang
    Qin, Chuan
    Mao, Xiaofeng
    Zhang, Weiming
    Yu, Nenghai
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 3850 - 3854
  • [46] Detecting Adversarial Examples through Image Transformation
    Tian, Shixin
    Yang, Guolei
    Cai, Ying
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 4139 - 4146
  • [47] Adversarial Examples Protect Your Privacy on Speech Enhancement System
    Dong M.
    Yan D.
    Wang R.
    Computer Systems Science and Engineering, 2023, 46 (01): : 1 - 12
  • [48] An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection
    Liu, Shenchuan
    Fujiyoshi, Masaaki
    Kiya, Hitoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1245 - 1252
  • [49] INTRODUCING K-ANONYMITY PRINCIPLES TO ADVERSARIAL ATTACKS FOR PRIVACY PROTECTION IN IMAGE CLASSIFICATION PROBLEMS
    Mygdalis, Vasileios
    Tefas, Anastasios
    Pitas, Ioannis
    2021 IEEE 31ST INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2021,
  • [50] Invertible Image Obfuscation for Facial Privacy Protection via Secure Flow
    Yuan, Lin
    Liang, Kai
    Pu, Xiao
    Zhang, Yan
    Leng, Jiaxu
    Wu, Tao
    Wang, Nannan
    Gao, Xinbo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (07) : 6077 - 6091