Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/180637
Title: Semantic deep hiding for robust unlearnable examples
Authors: Meng, Ruohan
Yi, Chenyu
Yu, Yi
Yang, Siyuan
Shen, Bingquan
Kot, Alex C.
Keywords: Engineering
Issue Date: 2024
Source: Meng, R., Yi, C., Yu, Y., Yang, S., Shen, B. & Kot, A. C. (2024). Semantic deep hiding for robust unlearnable examples. IEEE Transactions On Information Forensics and Security, 19, 6545-6558. https://dx.doi.org/10.1109/TIFS.2024.3421273
Project: DSOCL22332 
Journal: IEEE Transactions on Information Forensics and Security
Abstract: Ensuring data privacy and protection has become paramount in the era of deep learning. Unlearnable examples are proposed to mislead the deep learning models and prevent data from unauthorized exploration by adding small perturbations to data. However, such perturbations (e.g., noise, texture, color change) predominantly impact low-level features, making them vulnerable to common countermeasures. In contrast, semantic images with intricate shapes have a wealth of high-level features, making them more resilient to countermeasures and potential for producing robust unlearnable examples. In this paper, we propose a Deep Hiding (DH) scheme that adaptively hides semantic images enriched with high-level features. We employ an Invertible Neural Network (INN) to invisibly integrate predefined images, inherently hiding them with deceptive perturbations. To enhance data unlearnability, we introduce a Latent Feature Concentration module, designed to work with the INN, regularizing the intra-class variance of these perturbations. To further boost the robustness of unlearnable examples, we design a Semantic Images Generation module that produces hidden semantic images. By utilizing similar semantic information, this module generates similar semantic images for samples within the same classes, thereby enlarging the inter-class distance and narrowing the intra-class distance. Extensive experiments on CIFAR-10, CIFAR-100, and an ImageNet subset, against 18 countermeasures, reveal that our proposed method exhibits outstanding robustness for unlearnable examples, demonstrating its efficacy in preventing unauthorized data exploitation.
URI: https://hdl.handle.net/10356/180637
ISSN: 1556-6013
DOI: 10.1109/TIFS.2024.3421273
Schools: School of Electrical and Electronic Engineering 
Research Centres: Rapid-Rich Object Search (ROSE) Lab 
Rights: © 2024 IEEE. All rights reserved.
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:EEE Journal Articles

SCOPUSTM   
Citations 50

3
Updated on Mar 12, 2025

Page view(s)

78
Updated on Mar 17, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.