{"id":"https://openalex.org/W4401806115","doi":"https://doi.org/10.1109/tcsvt.2024.3448351","title":"Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples","display_name":"Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples","publication_year":2024,"publication_date":"2024-08-23","ids":{"openalex":"https://openalex.org/W4401806115","doi":"https://doi.org/10.1109/tcsvt.2024.3448351"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2024.3448351","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2024.3448351","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100351523","display_name":"Ming Li","orcid":"https://orcid.org/0000-0003-3385-8364"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Li","raw_affiliation_strings":["College of Computer and Information Engineering, Henan Normal University, Xinxiang, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Henan Normal University, Xinxiang, China","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109767773","display_name":"Zhaoli Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoli Yang","raw_affiliation_strings":["College of Computer and Information Engineering, Henan Normal University, Xinxiang, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Henan Normal University, Xinxiang, China","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100453383","display_name":"Tao Wang","orcid":"https://orcid.org/0000-0001-5532-3999"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Wang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037182288","display_name":"Wenying Wen","orcid":"https://orcid.org/0000-0002-3098-4640"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenying Wen","raw_affiliation_strings":["School of Computer and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China","institution_ids":["https://openalex.org/I59649739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100351523"],"corresponding_institution_ids":["https://openalex.org/I75955062"],"apc_list":null,"apc_paid":null,"fwci":1.9305,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87159048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"34","issue":"12","first_page":"13401","last_page":"13412"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9732999801635742,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7388299107551575},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6807184219360352},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.6566563248634338},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5453594923019409},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5401647686958313},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4770868718624115},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.472195029258728},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4317007064819336},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.4100010097026825},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3619081377983093},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3460797071456909},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.24991929531097412}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7388299107551575},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6807184219360352},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.6566563248634338},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5453594923019409},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5401647686958313},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4770868718624115},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.472195029258728},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4317007064819336},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.4100010097026825},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3619081377983093},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3460797071456909},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.24991929531097412},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2024.3448351","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2024.3448351","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.4399999976158142,"display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G5547888696","display_name":null,"funder_award_id":"62201233","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5707108624","display_name":null,"funder_award_id":"jxsq2023201118","funder_id":"https://openalex.org/F3692415409","funder_display_name":"Double Thousand Plan of Jiangxi Province"}],"funders":[{"id":"https://openalex.org/F3692415409","display_name":"Double Thousand Plan of Jiangxi Province","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1673923490","https://openalex.org/W1686810756","https://openalex.org/W1945616565","https://openalex.org/W2183341477","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2607219512","https://openalex.org/W2765424254","https://openalex.org/W2788848944","https://openalex.org/W2883233582","https://openalex.org/W2902488713","https://openalex.org/W2938439675","https://openalex.org/W2944049061","https://openalex.org/W2962858109","https://openalex.org/W2963070423","https://openalex.org/W2963278610","https://openalex.org/W2963384482","https://openalex.org/W2963448658","https://openalex.org/W2963771536","https://openalex.org/W2963857521","https://openalex.org/W2997594966","https://openalex.org/W3004923694","https://openalex.org/W3028710606","https://openalex.org/W3094821564","https://openalex.org/W3103557498","https://openalex.org/W3128902306","https://openalex.org/W3134175397","https://openalex.org/W3135872251","https://openalex.org/W3138669064","https://openalex.org/W3158953723","https://openalex.org/W3176854876","https://openalex.org/W3196506678","https://openalex.org/W3200113267","https://openalex.org/W3201137430","https://openalex.org/W4212926216","https://openalex.org/W4224990403","https://openalex.org/W4283204466","https://openalex.org/W4283321310","https://openalex.org/W4285604433","https://openalex.org/W4293522959","https://openalex.org/W4312551140","https://openalex.org/W4386171344","https://openalex.org/W4389417079","https://openalex.org/W4390872214","https://openalex.org/W4396667847","https://openalex.org/W6637162671","https://openalex.org/W6637373629","https://openalex.org/W6640425456","https://openalex.org/W6736207377","https://openalex.org/W6746608116","https://openalex.org/W6747749088","https://openalex.org/W6762970624","https://openalex.org/W6773032184","https://openalex.org/W6795828888","https://openalex.org/W6796288065","https://openalex.org/W6838411702","https://openalex.org/W6841059102","https://openalex.org/W6910686314"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W4396832952","https://openalex.org/W2138522421","https://openalex.org/W3046095319","https://openalex.org/W3197497514","https://openalex.org/W1591172238","https://openalex.org/W2111194702","https://openalex.org/W2972172135","https://openalex.org/W2116878667","https://openalex.org/W315296216"],"abstract_inverted_index":{"In":[0,64],"recent":[1],"years,":[2],"the":[3,11,35,44,47,95,113,148],"uploading":[4],"of":[5,116,150,153],"massive":[6],"personal":[7],"images":[8,100],"has":[9],"increased":[10],"security":[12],"risks,":[13],"mainly":[14],"including":[15],"privacy":[16,75,109],"breaches":[17],"and":[18,52,76,156,165],"copyright":[19,62,77,97,102],"infringement.":[20],"Adversarial":[21],"examples":[22,49],"provide":[23],"a":[24,69,83,121,151],"novel":[25],"solution":[26],"for":[27,73,101,108,133],"protecting":[28],"image":[29,74,157],"privacy,":[30],"as":[31,57],"they":[32],"can":[33,90],"evade":[34],"detection":[36],"by":[37,112],"deep":[38],"neural":[39],"network":[40],"(DNN)-based":[41],"recognizers.":[42],"However,":[43],"perturbations":[45],"in":[46,147],"adversarial":[48,80,85,118,124],"typically":[50],"meaningless":[51],"therefore":[53],"cannot":[54],"be":[55,91],"extracted":[56],"traceable":[58,79,84],"information":[59,98],"to":[60,93],"support":[61],"protection.":[63,110],"this":[65],"paper,":[66],"we":[67],"designed":[68],"dual":[70],"protection":[71,103],"scheme":[72,143],"via":[78],"examples.":[81],"Specifically,":[82],"model":[86,132,163],"is":[87,127,144],"proposed,":[88],"which":[89,129],"used":[92],"embed":[94],"invisible":[96],"into":[99],"while":[104,160],"fooling":[105],"DNN-based":[106],"recognizers":[107],"Inspired":[111],"training":[114,125],"method":[115],"generative":[117],"networks":[119],"(GANs),":[120],"new":[122],"dynamic":[123],"strategy":[126],"designed,":[128],"allows":[130],"our":[131,142],"achieving":[134],"stable":[135],"multi-objective":[136],"learning.":[137],"Experimental":[138],"results":[139],"show":[140],"that":[141],"exceptionally":[145],"robust":[146],"face":[149],"variety":[152],"noise":[154],"conditions":[155],"processing":[158],"methods,":[159],"exhibiting":[161],"good":[162],"migration":[164],"defense":[166],"robustness.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
