2023
DOI: 10.1117/1.jei.32.2.023016
|View full text |Cite
|
Sign up to set email alerts
|

Defending against adversarial examples using perceptual image hashing

Abstract: Conventional deep neural networks (DNNs) have been shown to be vulnerable to images with adversarial perturbations, referred to as adversarial examples. In this study, we propose a method to protect neural networks against adversarial examples using perceptual image hashing. Because perceptual hashing is robust to adversarial perturbations, we combine hash sequences of input images with the parameters of a neural network in an image-hash processing network. Thus, outputs of the neural network are affected by i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…where P i ¼ n i N is the probability of the gray value i, which can be obtained from the histogram of the image, n i is the number of pixels with gray value i, and N is the total number of pixels. For color image, its entropy 31 is defined as E Q -T A R G E T ; t e m p : i n t r a l i n k -; e 0 0 2 ; 1 1 4 ; 3 6 are the probabilities of the gray value i in the red, green, and blue components of the color image, respectively. As the calculation utilizes all color components, the color entropy can effectively reflect color information.…”
Section: Entropy-weighted Secondary Frame Calculationmentioning
confidence: 99%
See 1 more Smart Citation
“…where P i ¼ n i N is the probability of the gray value i, which can be obtained from the histogram of the image, n i is the number of pixels with gray value i, and N is the total number of pixels. For color image, its entropy 31 is defined as E Q -T A R G E T ; t e m p : i n t r a l i n k -; e 0 0 2 ; 1 1 4 ; 3 6 are the probabilities of the gray value i in the red, green, and blue components of the color image, respectively. As the calculation utilizes all color components, the color entropy can effectively reflect color information.…”
Section: Entropy-weighted Secondary Frame Calculationmentioning
confidence: 99%
“…Hashing techniques are an effective approach of information retrieval. [3][4][5] In recent years, some researchers have proposed using hashing schemes 6,7 to detect copy versions of multimedia data for copyright protection. [8][9][10] Video hashing is an effective technique for video data processing.…”
Section: Introductionmentioning
confidence: 99%
“…Yang et al 59 Wu et al 60 proposed a method to protect neural networks against adversarial examples using perceptual image hashing. The method combines hash sequences of input images with the parameters of a neural network in an image-hash processing network, and the outputs of the neural network are affected by image hashes, which render the model robust to adversarial examples.…”
Section: Introductionmentioning
confidence: 99%