45 research outputs found

    Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping

    Full text link
    The malicious applications of deep forgery, represented by face swapping, have introduced security threats such as misinformation dissemination and identity fraud. While some research has proposed the use of robust watermarking methods to trace the copyright of facial images for post-event traceability, these methods cannot effectively prevent the generation of forgeries at the source and curb their dissemination. To address this problem, we propose a novel comprehensive active defense mechanism that combines traceability and adversariality, called Dual Defense. Dual Defense invisibly embeds a single robust watermark within the target face to actively respond to sudden cases of malicious face swapping. It disrupts the output of the face swapping model while maintaining the integrity of watermark information throughout the entire dissemination process. This allows for watermark extraction at any stage of image tracking for traceability. Specifically, we introduce a watermark embedding network based on original-domain feature impersonation attack. This network learns robust adversarial features of target facial images and embeds watermarks, seeking a well-balanced trade-off between watermark invisibility, adversariality, and traceability through perceptual adversarial encoding strategies. Extensive experiments demonstrate that Dual Defense achieves optimal overall defense success rates and exhibits promising universality in anti-face swapping tasks and dataset generalization ability. It maintains impressive adversariality and traceability in both original and robust settings, surpassing current forgery defense methods that possess only one of these capabilities, including CMUA-Watermark, Anti-Forgery, FakeTagger, or PGD methods

    >

    No full text

    Sensor Array Based Distributed Instrument System

    No full text
    The dynamic integration of sensors to design distributed instrument system is absorbing more and more research focus for its requirements in modern producing enterprises for low-cost products. In this paper, the distributed instrument based on sensor array is proposed, and the data exchange model is discussed which implemented the communication of the modules of the measurement instrument. And then the control mechanism of the data exchange among sensors is studied which manages the information of the measurement components and schedules the data process in the measurement cases. In this way, a group of measurement components and the distributed measurement sensors can be connected together dynamically. Based on the hardware concepts, the instrument components are proposed for data acquisition, data management, data processing etc.. The data exchange among instrument components can be configured according to the communication software bus. The measurement data from the distributed sensor array can propagate among the configured data logical flow ways asynchronously, and users can plug and unplug any components to the online instrument cases. Finally, the proposed application case is present which shows that the proposed way can accelerate the collaboration of production for different enterprise and improve the producing efficiency

    Thermodynamic and Kinetics Study of Carbothermal Reduction of Barite

    No full text

    Once and for All: Universal Transferable Adversarial Perturbation against Deep Hashing-Based Facial Image Retrieval

    No full text
    Deep Hashing (DH)-based image retrieval has been widely applied to face-matching systems due to its accuracy and efficiency. However, this convenience comes with an increased risk of privacy leakage. DH models inherit the vulnerability to adversarial attacks, which can be used to prevent the retrieval of private images. Existing adversarial attacks against DH typically target a single image or a specific class of images, lacking universal adversarial perturbation for the entire hash dataset. In this paper, we propose the first universal transferable adversarial perturbation against DH-based facial image retrieval, a single perturbation can protect all images. Specifically, we explore the relationship between clusters learned by different DH models and define the optimization objective of universal perturbation as leaving from the overall hash center. To mitigate the challenge of single-objective optimization, we randomly obtain sub-cluster centers and further propose sub-task-based meta-learning to aid in overall optimization. We test our method with popular facial datasets and DH models, indicating impressive cross-image, -identity, -model, and -scheme universal anti-retrieval performance. Compared to state-of-the-art methods, our performance is competitive in white-box settings and exhibits significant improvements of 10%-70% in transferability in all black-box settings
    corecore