Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision
As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. With these concerns in mind, we introduce a novel method to control w...
Saved in:
| Main Authors: | Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-01-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/15/3/1142 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
DOG: An Object Detection Adversarial Attack Method
by: Jinpeng Li, et al.
Published: (2025-01-01) -
Separable reversible data hiding by vacating room after encryption using encrypted pixel difference
by: Veeramuthu Venkatesh, et al.
Published: (2025-04-01) -
HIGH-PERFORMANCE EMBEDDING IN DUAL IMAGES BASED ON PIXEL VALUE ORDERING METHOD
by: Cao Thị Luyen, et al.
Published: (2024-12-01) -
MRA-VSS: A Matrix-Based Reversible and Authenticable Visual Secret-Sharing Scheme Using Dual Meaningful Images
by: Chia-Chen Lin, et al.
Published: (2024-11-01) -
A comprehensive transplanting of black-box adversarial attacks from multi-class to multi-label models
by: Zhijian Chen, et al.
Published: (2025-03-01)