{"id":"https://openalex.org/W4417188286","doi":"https://doi.org/10.1109/iccv51701.2025.01754","title":"DCT-Shield: A Robust Frequency Domain Defense Against Malicious Image Editing","display_name":"DCT-Shield: A Robust Frequency Domain Defense Against Malicious Image Editing","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W4417188286","doi":"https://doi.org/10.1109/iccv51701.2025.01754"},"language":"en","primary_location":{"id":"doi:10.1109/iccv51701.2025.01754","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccv51701.2025.01754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/CVF International Conference on Computer Vision (ICCV)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2504.17894","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Aniruddha Bala","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139030","display_name":"Samsung (India)","ror":"https://ror.org/04cpx2569","country_code":"IN","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210139030"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aniruddha Bala","raw_affiliation_strings":["Samsung R&#x0026;D Institute,Bangalore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Samsung R&#x0026;D Institute,Bangalore","institution_ids":["https://openalex.org/I4210139030"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rohit Chowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139030","display_name":"Samsung (India)","ror":"https://ror.org/04cpx2569","country_code":"IN","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210139030"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rohit Chowdhury","raw_affiliation_strings":["Samsung R&#x0026;D Institute,Bangalore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Samsung R&#x0026;D Institute,Bangalore","institution_ids":["https://openalex.org/I4210139030"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rohan Jaiswal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139030","display_name":"Samsung (India)","ror":"https://ror.org/04cpx2569","country_code":"IN","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210139030"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rohan Jaiswal","raw_affiliation_strings":["Samsung R&#x0026;D Institute,Bangalore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Samsung R&#x0026;D Institute,Bangalore","institution_ids":["https://openalex.org/I4210139030"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000014025","display_name":"Siddharth Roheda","orcid":"https://orcid.org/0000-0002-6195-8517"},"institutions":[{"id":"https://openalex.org/I4210139030","display_name":"Samsung (India)","ror":"https://ror.org/04cpx2569","country_code":"IN","type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4210139030"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Siddharth Roheda","raw_affiliation_strings":["Samsung R&#x0026;D Institute,Bangalore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Samsung R&#x0026;D Institute,Bangalore","institution_ids":["https://openalex.org/I4210139030"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210139030"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19702058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"18876","last_page":"18884"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5383999943733215,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.5383999943733215,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.25119999051094055,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.07029999792575836,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/image-editing","display_name":"Image editing","score":0.736299991607666},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.6822999715805054},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6348000168800354},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6272000074386597},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6118000149726868},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6115000247955322},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5199999809265137},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5145999789237976},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.5037000179290771}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7572000026702881},{"id":"https://openalex.org/C2776674983","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image editing","level":3,"score":0.736299991607666},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.6822999715805054},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6348000168800354},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6272000074386597},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6197999715805054},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6118000149726868},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6115000247955322},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5964999794960022},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5199999809265137},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5145999789237976},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.5037000179290771},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4876999855041504},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.35760000348091125},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3531000018119812},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.3379000127315521},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.3370000123977661},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.33149999380111694},{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C2780310081","wikidata":"https://www.wikidata.org/wiki/Q1154312","display_name":"Video editing","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.27379998564720154},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C160086991","wikidata":"https://www.wikidata.org/wiki/Q5939193","display_name":"Human visual system model","level":3,"score":0.2655999958515167},{"id":"https://openalex.org/C100675267","wikidata":"https://www.wikidata.org/wiki/Q1371624","display_name":"Background noise","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iccv51701.2025.01754","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccv51701.2025.01754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/CVF International Conference on Computer Vision (ICCV)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2504.17894","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2504.17894","pdf_url":"https://arxiv.org/pdf/2504.17894","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2504.17894","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2504.17894","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2504.17894","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2504.17894","pdf_url":"https://arxiv.org/pdf/2504.17894","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Advancements":[0],"in":[1,41,98],"diffusion":[2],"models":[3],"have":[4],"enabled":[5],"effortless":[6],"image":[7,15,128],"editing":[8,51],"via":[9],"text":[10],"prompts,":[11],"raising":[12],"concerns":[13],"about":[14],"security.":[16],"Attackers":[17],"with":[18],"access":[19],"to":[20,33,45,64,76,156],"user":[21],"images":[22,35,123],"can":[23],"exploit":[24],"these":[25,71],"tools":[26],"for":[27],"malicious":[28,127],"edits.":[29],"Recent":[30],"defenses":[31],"attempt":[32],"protect":[34],"by":[36,58,102],"adding":[37],"a":[38,83,89,133],"limited":[39],"noise":[40,56,157],"the":[42,47,54,65,99,104,111,116],"pixel":[43,85],"space":[44],"disrupt":[46],"functioning":[48],"of":[49,70,110,135,151],"diffusion-based":[50],"models.":[52],"However,":[53],"adversarial":[55,95,122],"added":[57],"previous":[59],"methods":[60,72],"is":[61],"easily":[62],"noticeable":[63],"human":[66],"eye.":[67],"Moreover,":[68],"most":[69],"are":[73],"not":[74],"robust":[75],"purification":[77,158],"techniques":[78],"like":[79],"JPEG":[80,117],"compression":[81],"under":[82],"feasible":[84],"budget.":[86],"We":[87],"propose":[88],"novel":[90],"optimization":[91],"approach":[92,142],"that":[93,124,140],"introduces":[94,143],"perturbations":[96],"directly":[97],"frequency":[100],"domain":[101],"modifying":[103],"Discrete":[105],"Cosine":[106],"Transform":[107],"(DCT)":[108],"coefficients":[109],"input":[112],"image.":[113],"By":[114],"leveraging":[115],"pipeline,":[118],"our":[119,141],"method":[120],"generates":[121],"effectively":[125],"prevent":[126],"editing.":[129],"Extensive":[130],"experiments":[131],"across":[132],"variety":[134],"tasks":[136],"and":[137,154],"datasets":[138],"demonstrate":[139],"fewer":[144],"visual":[145],"artifacts":[146],"while":[147],"maintaining":[148],"similar":[149],"levels":[150],"edit":[152],"protection":[153],"robustness":[155],"techniques.":[159]},"counts_by_year":[],"updated_date":"2026-05-06T06:03:25.996018","created_date":"2025-10-10T00:00:00"}
