Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/180637
Title: | Semantic deep hiding for robust unlearnable examples | Authors: | Meng, Ruohan Yi, Chenyu Yu, Yi Yang, Siyuan Shen, Bingquan Kot, Alex C. |
Keywords: | Engineering | Issue Date: | 2024 | Source: | Meng, R., Yi, C., Yu, Y., Yang, S., Shen, B. & Kot, A. C. (2024). Semantic deep hiding for robust unlearnable examples. IEEE Transactions On Information Forensics and Security, 19, 6545-6558. https://dx.doi.org/10.1109/TIFS.2024.3421273 | Project: | DSOCL22332 | Journal: | IEEE Transactions on Information Forensics and Security | Abstract: | Ensuring data privacy and protection has become paramount in the era of deep learning. Unlearnable examples are proposed to mislead the deep learning models and prevent data from unauthorized exploration by adding small perturbations to data. However, such perturbations (e.g., noise, texture, color change) predominantly impact low-level features, making them vulnerable to common countermeasures. In contrast, semantic images with intricate shapes have a wealth of high-level features, making them more resilient to countermeasures and potential for producing robust unlearnable examples. In this paper, we propose a Deep Hiding (DH) scheme that adaptively hides semantic images enriched with high-level features. We employ an Invertible Neural Network (INN) to invisibly integrate predefined images, inherently hiding them with deceptive perturbations. To enhance data unlearnability, we introduce a Latent Feature Concentration module, designed to work with the INN, regularizing the intra-class variance of these perturbations. To further boost the robustness of unlearnable examples, we design a Semantic Images Generation module that produces hidden semantic images. By utilizing similar semantic information, this module generates similar semantic images for samples within the same classes, thereby enlarging the inter-class distance and narrowing the intra-class distance. Extensive experiments on CIFAR-10, CIFAR-100, and an ImageNet subset, against 18 countermeasures, reveal that our proposed method exhibits outstanding robustness for unlearnable examples, demonstrating its efficacy in preventing unauthorized data exploitation. | URI: | https://hdl.handle.net/10356/180637 | ISSN: | 1556-6013 | DOI: | 10.1109/TIFS.2024.3421273 | Schools: | School of Electrical and Electronic Engineering | Research Centres: | Rapid-Rich Object Search (ROSE) Lab | Rights: | © 2024 IEEE. All rights reserved. | Fulltext Permission: | none | Fulltext Availability: | No Fulltext |
Appears in Collections: | EEE Journal Articles |
SCOPUSTM
Citations
50
3
Updated on Mar 12, 2025
Page view(s)
78
Updated on Mar 17, 2025
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.