{"id":"https://openalex.org/W4415332182","doi":"https://doi.org/10.48550/arxiv.2509.23279","title":"Vid-Freeze: Protecting Images from Malicious Image-to-Video Generation via Temporal Freezing","display_name":"Vid-Freeze: Protecting Images from Malicious Image-to-Video Generation via Temporal Freezing","publication_year":2025,"publication_date":"2025-09-27","ids":{"openalex":"https://openalex.org/W4415332182","doi":"https://doi.org/10.48550/arxiv.2509.23279"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2509.23279","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.23279","pdf_url":"https://arxiv.org/pdf/2509.23279","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2509.23279","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chowdhury, Rohit","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chowdhury, Rohit","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Bala, Aniruddha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bala, Aniruddha","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Jaiswal, Rohan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jaiswal, Rohan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5000014025","display_name":"Siddharth Roheda","orcid":"https://orcid.org/0000-0002-6195-8517"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Roheda, Siddharth","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7293000221252441},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.5284000039100647},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.46970000863075256},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4221999943256378},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.39320001006126404},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.38260000944137573}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7293000221252441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6920999884605408},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.5284000039100647},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.46970000863075256},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45820000767707825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43869999051094055},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4221999943256378},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.39320001006126404},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3919000029563904},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.38260000944137573},{"id":"https://openalex.org/C113364801","wikidata":"https://www.wikidata.org/wiki/Q26674","display_name":"High fidelity","level":2,"score":0.36640000343322754},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.3352999985218048},{"id":"https://openalex.org/C104114177","wikidata":"https://www.wikidata.org/wiki/Q79782","display_name":"Motion (physics)","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.25600001215934753}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2509.23279","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.23279","pdf_url":"https://arxiv.org/pdf/2509.23279","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2509.23279","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2509.23279","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2509.23279","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2509.23279","pdf_url":"https://arxiv.org/pdf/2509.23279","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415332182.pdf","grobid_xml":"https://content.openalex.org/works/W4415332182.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"progress":[2],"of":[3],"image-to-video":[4],"(I2V)":[5],"generation":[6],"models":[7,81,106],"has":[8],"introduced":[9],"significant":[10],"risks":[11],"by":[12,32],"enabling":[13],"deceptive":[14],"or":[15,93],"malicious":[16,49,98],"video":[17],"synthesis":[18],"from":[19],"a":[20,58,87,112],"single":[21],"image.":[22],"Prior":[23],"defenses":[24],"such":[25],"as":[26,111],"I2VGuard":[27],"attempt":[28],"to":[29,66,82],"immunize":[30],"images":[31,90],"inducing":[33],"spatio-temporal":[34],"degradation,":[35],"which":[36],"does":[37],"not":[38],"necessarily":[39],"provide":[40],"meaningful":[41,118],"protection,":[42],"since":[43],"residual":[44],"motion":[45,84],"can":[46],"still":[47],"convey":[48],"intent.":[50],"In":[51],"this":[52],"work,":[53],"we":[54],"introduce":[55],"Vid-Freeze":[56],"--":[57],"novel":[59],"adversarial":[60],"defense":[61,119],"that":[62],"adds":[63],"imperceptible":[64],"perturbations":[65],"enforce":[67],"temporal":[68,109],"freezing":[69,110],"in":[70,79],"generated":[71],"videos.":[72],"Our":[73],"method":[74],"explicitly":[75],"targets":[76],"attention":[77],"dynamics":[78],"I2V":[80,121],"suppress":[83],"synthesis.":[85],"As":[86],"result,":[88],"immunized":[89],"produce":[91],"standstill":[92],"near-static":[94],"videos,":[95],"effectively":[96],"blocking":[97],"content":[99],"generation.":[100],"Experiments":[101],"demonstrate":[102],"strong":[103],"protection":[104],"across":[105],"and":[107,117],"support":[108],"promising":[113],"direction":[114],"for":[115],"proactive":[116],"against":[120],"misuse.":[122]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-19T00:00:00"}
