Search Results for author: Zhenxing Qian

Found 35 papers, 6 papers with code

Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models

no code implementations3 Mar 2024 Meiling Li, Zhenxing Qian, Xinpeng Zhang

Comprehensive experiments reveal that (1) Our method can effectively attribute fake images to their source models, achieving comparable attribution performance with the state-of-the-art method; (2) Our method has high scalability ability, which is well adapted to real-world attribution scenarios.

Attribute

Purified and Unified Steganographic Network

1 code implementation27 Feb 2024 Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang

It is also shown to be capable of imperceptibly carrying the steganographic networks in a purified network.

Image Denoising

Object-oriented backdoor attack against image captioning

no code implementations5 Jan 2024 Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li

After training with the poisoned data, the attacked model behaves normally on benign images, but for poisoned images, the model will generate some sentences irrelevant to the given image.

Backdoor Attack Image Captioning +2

Fact-checking based fake news detection: a review

no code implementations3 Jan 2024 Yuzhou Yang, Yangming Zhou, Qichao Ying, Zhenxing Qian, Dan Zeng, Liang Liu

This paper reviews and summarizes the research results on fact-based fake news from the perspectives of tasks and problems, algorithm strategies, and datasets.

Fact Checking Fake News Detection

From Covert Hiding to Visual Editing: Robust Generative Video Steganography

no code implementations1 Jan 2024 Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process.

Face Swapping Image Steganography +1

PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning

no code implementations1 Jan 2024 Xuntao Liu, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang, Sheng Li

We observe that humans tend to discern the authenticity of an image based on both semantic and high-frequency information, inspired by which, the proposed framework leverages rich semantic knowledge from pre-trained visual foundation models to assist IML.

Image Manipulation Image Manipulation Localization

Model Copyright Protection in Buyer-seller Environment

no code implementations5 Dec 2023 Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang

The main idea of ISNN is to make a DNN sensitive to the key and copyright information.

valid

Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models

no code implementations22 Nov 2023 Ge Luo, Junqiang Huang, Manman Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang

In various fine-tune scenarios and against watermark attack methods, our research confirms that analyzing the distribution of watermarks in artificially generated images reliably detects unauthorized mimicry.

PatchCraft: Exploring Texture Patch for Efficient AI-generated Image Detection

1 code implementation21 Nov 2023 Nan Zhong, Yiran Xu, Sheng Li, Zhenxing Qian, Xinpeng Zhang

We observe that the texture patches of images tend to reveal more traces left by generative models compared to the global semantic information of the images.

Image Forensics

Securing Fixed Neural Network Steganography

no code implementations18 Sep 2023 Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian, Xinpeng Zhang

To deal with this issue, we propose a key-based FNNS scheme to improve the security of the FNNS, where we generate key-controlled perturbations from the FNN for data embedding.

Image Steganography

Physical Invisible Backdoor Based on Camera Imaging

no code implementations14 Sep 2023 Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang

Subsequently, we elaborate a special network architecture, which is easily compromised by our backdoor attack, by leveraging the attributes of the CFA interpolation algorithm and combining it with the feature extraction block in the camera identification model.

Backdoor Attack

DRAW: Defending Camera-shooted RAW against Image Manipulation

no code implementations ICCV 2023 Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

RAW files are the initial measurement of scene radiance widely used in most cameras, and the ubiquitously-used RGB images are converted from RAW data through Image Signal Processing (ISP) pipelines.

Image Manipulation

RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection

no code implementations20 Jul 2023 Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang

However, the lack of large-scale and fine-grained face retouching datasets has been a major obstacle to progress in this field.

Representation Learning

Towards Deep Network Steganography: From Networks to Networks

no code implementations7 Jul 2023 Guobiao Li, Sheng Li, Meiling Li, Zhenxing Qian, Xinpeng Zhang

In this paper, we propose deep network steganography for the covert communication of DNN models.

StyleStegan: Leak-free Style Transfer Based on Feature Steganography

no code implementations1 Jul 2023 Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian, Xinpeng Zhang

Our method consists of two main components: a style transfer method that accomplishes artistic stylization on the original image and an image steganography method that embeds content feature secrets on the stylized image.

Image Steganography SSIM +1

Generative Steganographic Flow

no code implementations10 May 2023 Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian, Sheng Li

In the forward mapping, secret data is hidden in the input latent of Glow model to generate stego images.

Image Generation

Generative Steganography Diffusion

no code implementations5 May 2023 Ping Wei, Qing Zhou, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li

However, existing GAN-based GS methods cannot completely recover the hidden secret data due to the lack of network invertibility, while Flow-based methods produce poor image quality due to the stringent reversibility restriction in each module.

Image Generation

Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion

no code implementations3 Apr 2023 Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang

The easy sharing of multimedia content on social media has caused a rapid dissemination of fake news, which threatens society's stability and security.

Fake News Detection

Steganography of Steganographic Networks

1 code implementation28 Feb 2023 Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian

We propose to disguise a steganographic network (termed as the secret DNN model) into a stego DNN model which performs an ordinary machine learning task (termed as the stego task).

Exploring Depth Information for Face Manipulation Detection

no code implementations29 Dec 2022 Haoyue Wang, Meiling Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang

As one of the important face features, the face depth map, which has shown to be effective in other areas such as the face recognition or face detection, is unfortunately paid little attention to in literature for detecting the manipulated face images.

Face Detection Face Recognition

Learning to Immunize Images for Tamper Localization and Self-Recovery

no code implementations28 Oct 2022 Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Image immunization (Imuge) is a technology of protecting the images by introducing trivial perturbation, so that the protected images are immune to the viruses in that the tampered contents can be auto-recovered.

Hiding Images in Deep Probabilistic Models

no code implementations5 Oct 2022 Haoyu Chen, Linqi Song, Zhenxing Qian, Xinpeng Zhang, Kede Ma

As an instantiation, we adopt a SinGAN, a pyramid of generative adversarial networks (GANs), to learn the patch distribution of one cover image.

Generative Steganography Network

no code implementations28 Jul 2022 Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, Qing Zhou

A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly without cover media.

Image Generation Steganalysis

Image Generation Network for Covert Transmission in Online Social Network

no code implementations21 Jul 2022 Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang

Online social networks have stimulated communications over the Internet more than ever, making it possible for secret message transmission over such noisy channels.

Image Generation Image Steganography +2

Bootstrapping Multi-view Representations for Fake News Detection

1 code implementation12 Jun 2022 Qichao Ying, Xiaoxiao Hu, Yangming Zhou, Zhenxing Qian, Dan Zeng, Shiming Ge

Representations from each view are separately used to coarsely predict the fidelity of the whole news, and the multimodal representations are able to predict the cross-modal consistency.

Decision Making Fake News Detection

Image Protection for Robust Cropping Localization and Recovery

no code implementations6 Jun 2022 Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Existing image cropping detection schemes ignore that recovering the cropped-out contents can unveil the purpose of the behaved cropping attack.

Image Cropping

A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion

no code implementations2 Jun 2022 Yifei Wang, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

To address this issue, we present a new video watermarking based on joint Dual-Tree Cosine Wavelet Transformation (DTCWT) and Singular Value Decomposition (SVD), which is resistant to frame rate conversion.

Multimodal Fake News Detection via CLIP-Guided Learning

no code implementations28 May 2022 Yangming Zhou, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

The results indicate that the proposed framework has a better capability in mining crucial features for fake news detection.

Decision Making Fake News Detection +1

Imperceptible Backdoor Attack: From Input Space to Feature Representation

1 code implementation6 May 2022 Nan Zhong, Zhenxing Qian, Xinpeng Zhang

A U-net-based network is employed to generate concrete parameters of multinomial distribution for each benign input.

Backdoor Attack

Invertible Image Dataset Protection

no code implementations29 Dec 2021 Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang

We develop a reversible adversarial example generator (RAEG) that introduces slight changes to the images to fool traditional classification models.

Adversarial Defense

From Image to Imuge: Immunized Image Generation

1 code implementation27 Oct 2021 Qichao Ying, Zhenxing Qian, Hang Zhou, Haisheng Xu, Xinpeng Zhang, Siyi Li

At the recipient's side, the verifying network localizes the malicious modifications, and the original content can be approximately recovered by the decoder, despite the presence of the attacks.

Image Cropping Image Generation

Hiding Images into Images with Real-world Robustness

no code implementations12 Oct 2021 Qichao Ying, Hang Zhou, Xianhan Zeng, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang

The existing image embedding networks are basically vulnerable to malicious attacks such as JPEG compression and noise adding, not applicable for real-world copyright protection tasks.

RWN: Robust Watermarking Network for Image Cropping Localization

no code implementations12 Oct 2021 Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian, Xinpeng Zhang

At the recipient's side, ACP extracts the watermark from the attacked image, and we conduct feature matching on the original and extracted watermark to locate the position of the crop in the original image plane.

Image Cropping Image Forensics

Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis

no code implementations8 Dec 2020 Xinran Li, Chuan Qin, Zhenxing Qian, Heng Yao, Xinpeng Zhang

Local color features of significant corner points on outer boundaries of ring-ribbons are extracted through color vector angles (CVA), and color low-order moments (CLMs) is utilized to extract global color features.

Copy Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.