Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion.
Shengwei AnLu YanSiyuan ChengGuangyu ShenKaiyuan ZhangQiuling XuGuanhong TaoXiangyu ZhangPublished in: USENIX Security Symposium (2024)
Keyphrases
- image data
- image content
- image features
- input image
- single image
- image segmentation
- multiscale
- image analysis
- image classification
- image retrieval
- segmentation method
- template matching
- hough transform
- segmentation algorithm
- image representation
- low level
- test images
- image set
- computer vision
- edge detection
- high resolution
- image collections
- image pixels
- normalized gradient
- secret information
- technology enhanced learning
- diffusion process
- sensitive information
- region of interest
- image matching
- spatial information
- feature points