Anti-Neuron Watermarking: Protecting Personal Data Against Unauthorized Neural Networks

نویسندگان

چکیده

AbstractWe study protecting a user’s data (images in this work) against learner’s unauthorized use training neural networks. It is especially challenging when the only tiny percentage of complete set. We revisit traditional watermarking under modern deep learning settings to tackle challenge. show that user watermarks images using specialized linear color transformation, network classifier will be imprinted with signature so third-party arbitrator can verify potentially usage by inferring watermark from network. also discuss what properties and spaces make arbitrator’s verification convincing. To our best knowledge, work first protect an individual ownership

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Privacy Against Location-Based Personal Identification

This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and may be used to access sensitive information about specific individuals. The paper formally defines a frame...

متن کامل

Protecting Personal Data in Camera Surveillance Practices

This paper explores in which ways privacy (in particular, data protection principles) comes to the fore in the day-to-day operation of a public video surveillance system. Starting from current European legal perspectives on data protection, and building on an empirical case study, the meanings and management of privacy in the practice of Closed-Circuit Television (CCTV) will be discussed in ord...

متن کامل

Protecting patient privacy against unauthorized release of medical images in a group communication environment.

In this paper, we identify and study an important patient privacy protection problem related to medical images. Following Health Insurance Portability and Accountability Act (HIPAA) mandate on privacy protection of patients' medical records, efforts have been devoted to guaranteeing the confidentiality of data and medical images during storage and transmission via an untrustworthy channel. Howe...

متن کامل

Preventing Unauthorized Data Flows

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-19778-9_26