On Visible Adversarial Perturbations & Digital Watermarking

被引:52
|
作者
Hayes, Jamie [1 ]
机构
[1] UCL, London, England
关键词
D O I
10.1109/CVPRW.2018.00210
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given a machine learning model, adversarial perturbations transform images such that the model's output is classified as an attacker chosen class. Most research in this area has focused on adversarial perturbations that are imperceptible to the human eye. However, recent work has considered attacks that are perceptible but localized to a small region of the image. Under this threat model, we discuss both defenses that remove such adversarial perturbations, and attacks that can bypass these defenses.
引用
收藏
页码:1678 / 1685
页数:8
相关论文
共 50 条
  • [41] Digital watermarking for digital documents
    Jia, Yingjiang
    Fu, Xiaozhong
    Yu, Xin
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (10): : 1067 - 1068
  • [42] Discrete Walsh Hadamard Transform Based Visible Watermarking Technique for Digital Color Images
    Santhi, V.
    Thangavelu, Arunkumar
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2011), 2011, 8285
  • [43] Imperceptible-visible watermarking for copyright protection of digital videos based on temporal codes
    Velazquez-Garcia, L.
    Cedillo-Hernandez, A.
    Cedillo-Hernandez, M.
    Nakano-Miyatake, M.
    Perez-Meana, H.
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2022, 102
  • [44] Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras
    Santoyo-Garcia, Hector
    Fragoso-Navarro, Eduardo
    Reyes-Reyes, Rogelio
    Cruz-Ramos, Clara
    Nakano-Miyatake, Mariko
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [45] Design a Hybrid FPGA Architecture for Visible Digital Image Watermarking in Spatial and Frequency Domain
    Jayanthi, VE.
    Pitchai, Senthil
    Smitha, M.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (01)
  • [46] Delving deep into adversarial perturbations initialization on adversarial examples generation
    Hu, Cong
    Wan, Peng
    Wu, Xiao-Jun
    Yin, He-Feng
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [47] Adversarial transformation network with adaptive perturbations for generating adversarial examples
    Zhang, Guoyin
    Da, Qingan
    Li, Sizhao
    Sun, Jianguo
    Wang, Wenshan
    Hu, Qing
    Lu, Jiashuai
    INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2022, 20 (02) : 94 - 103
  • [48] Visible watermarking for halftone images
    Pan, Jeng-Shyang
    Luo, Hao
    Lu, Zhe-Ming
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (07) : 1487 - 1490
  • [49] Adaptive visible watermarking of images
    Kankanhalli, MS
    Rajmohan
    Ramakrishnan, KR
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, 1999, : 568 - 573
  • [50] Hardware Implementation of Visible Watermarking
    Pandurangan, Raji
    Logashanmugam, E.
    Kumar, T. V. U. Kiran
    2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY, INFORMATION AND COMMUNICATION (ICCPEIC), 2015, : 400 - 402