Energy News
INTERNET SPACE
Using AI to protect against AI image manipulation
Dalle-E stock illustration only
Using AI to protect against AI image manipulation
by Rachel Gordon for MIT CSAIL
Boston MA (SPX) Aug 01, 2023

As we enter a new era where technologies powered by artificial intelligence can craft and manipulate images with a precision that blurs the line between reality and fabrication, the specter of misuse looms large. Recently, advanced generative models such as DALL-E and Midjourney, celebrated for their impressive precision and user-friendly interfaces, have made the production of hyper-realistic images relatively effortless. With the barriers of entry lowered, even inexperienced users can generate and manipulate high-quality images from simple text descriptions - ranging from innocent image alterations to malicious changes. Techniques like watermarking pose a promising solution, but misuse requires a preemptive (as opposed to only post hoc) measure.

In the quest to create such a new measure, researchers from MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) developed "PhotoGuard," a technique that uses perturbations - minuscule alterations in pixel values invisible to the human eye but detectable by computer models - that effectively disrupt the model's ability to manipulate the image.

PhotoGuard uses two different "attack" methods to generate these perturbations. The more straightforward "encoder" attack targets the image's latent representation in the AI model, causing the model to perceive the image as a random entity. The more sophisticated "diffusion" one defines a target image and optimizes the perturbations to make the final image resemble the target as closely as possible.

"Consider the possibility of fraudulent propagation of fake catastrophic events, like an explosion at a significant landmark. This deception can manipulate market trends and public sentiment, but the risks are not limited to the public sphere. Personal images can be inappropriately altered and used for blackmail, resulting in significant financial implications when executed on a large scale," says Hadi Salman, an MIT graduate student in electrical engineering and computer science (EECS), affiliate of MIT CSAIL, and lead author of a new paper about PhotoGuard.

"In more extreme scenarios, these models could simulate voices and images for staging false crimes, inflicting psychological distress and financial loss. The swift nature of these actions compounds the problem. Even when the deception is eventually uncovered, the damage - whether reputational, emotional, or financial - has often already happened. This is a reality for victims at all levels, from individuals bullied at school to society-wide manipulation."

PhotoGuard in practice
AI models view an image differently from how humans do. It sees an image as a complex set of mathematical data points that describe every pixel's color and position - this is the image's latent representation. The encoder attack introduces minor adjustments into this mathematical representation, causing the AI model to perceive the image as a random entity. As a result, any attempt to manipulate the image using the model becomes nearly impossible. The changes introduced are so minute that they are invisible to the human eye, thus preserving the image's visual integrity while ensuring its protection.

The second and decidedly more intricate "diffusion" attack strategically targets the entire diffusion model end-to-end. This involves determining a desired target image, and then initiating an optimization process with the intention of closely aligning the generated image with this preselected target.

In implementing, the team created perturbations within the input space of the original image. These perturbations are then used during the inference stage, and applied to the images, offering a robust defense against unauthorized manipulation.

"The progress in AI that we are witnessing is truly breathtaking, but it enables beneficial and malicious uses of AI alike," says MIT professor of EECS and CSAIL principal investigator Aleksander Madry, who is also an author on the paper. "It is thus urgent that we work towards identifying and mitigating the latter. I view PhotoGuard as our small contribution to that important effort."

The diffusion attack is more computationally intensive than its simpler sibling, and requires significant GPU memory. The team says that approximating the diffusion process with fewer steps mitigates the issue, thus making the technique more practical.

To better illustrate the attack, consider an art project, for example. The original image is a drawing, and the target image is another drawing that's completely different. The diffusion attack is like making tiny, invisible changes to the first drawing so that, to an AI model, it begins to resemble the second drawing. However, to the human eye, the original drawing remains unchanged.

By doing this, any AI model attempting to modify the original image will now inadvertently make changes as if dealing with the target image, thereby protecting the original image from intended manipulation. The result is a picture that remains visually unaltered for human observers, but protects against unauthorized edits by AI models.

As far as a real example with PhotoGuard, consider an image with multiple faces. You could mask any faces you don't want to modify, and then prompt with "two men attending a wedding." Upon submission, the system will adjust the image accordingly, creating a plausible depiction of two men participating in a wedding ceremony.

Now, consider safeguarding the image from being edited; adding perturbations to the image before upload can immunize it against modifications. In this case, the final output will lack realism compared to the original, non-immunized image.

All hands on deck
Key allies in the fight against image manipulation are the creators of the image-editing models, says the team. For PhotoGuard to be effective, an integrated response from all stakeholders is necessary. "Policymakers should consider implementing regulations that mandate companies to protect user data from such manipulations. Developers of these AI models could design APIs that automatically add perturbations to users' images, providing an added layer of protection against unauthorized edits," says Salman.

Despite PhotoGuard's promise, it's not a panacea. Once an image is online, individuals with malicious intent could attempt to reverse engineer the protective measures by applying noise, cropping, or rotating the image. However, there is plenty of previous work from the adversarial examples literature that can be utilized here to implement robust perturbations that resist common image manipulations.

"A collaborative approach involving model developers, social media platforms, and policymakers presents a robust defense against unauthorized image manipulation. Working on this pressing issue is of paramount importance today," says Salman. "And while I am glad to contribute towards this solution, much work is needed to make this protection practical. Companies that develop these models need to invest in engineering robust immunizations against the possible threats posed by these AI tools. As we tread into this new era of generative models, let's strive for potential and protection in equal measures."

"The prospect of using attacks on machine learning to protect us from abusive uses of this technology is very compelling," says Florian Tramer, an assistant professor at ETH Zurich. "The paper has a nice insight that the developers of generative AI models have strong incentives to provide such immunization protections to their users, which could even be a legal requirement in the future. However, designing image protections that effectively resist circumvention attempts is a challenging problem: Once the generative AI company commits to an immunization mechanism and people start applying it to their online images, we need to ensure that this protection will work against motivated adversaries who might even use better generative AI models developed in the near future. Designing such robust protections is a hard open problem, and this paper makes a compelling case that generative AI companies should be working on solving it."

Salman wrote the paper alongside fellow lead authors Alaa Khaddaj and Guillaume Leclerc MS '18, as well as Andrew Ilyas '18, MEng '18; all three are EECS graduate students and MIT CSAIL affiliates. The team's work was partially done on the MIT Supercloud compute cluster, supported by U.S. National Science Foundation grants and Open Philanthropy, and based upon work supported by the U.S. Defense Advanced Research Projects Agency. It was presented at the International Conference on Machine Learning this July.

Research Report:"Raising the Cost of Malicious AI-Powered Image Editing"

Related Links
Center for Deployable Machine Learning
Computer Science and Artificial Intelligence Laboratory (CSAIL)
Satellite-based Internet technologies

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
INTERNET SPACE
Musk removes giant, flashing X sign after furore
San Francisco (AFP) July 31, 2023
The company formerly known as Twitter removed a towering, blinking X from atop its San Francisco headquarters Monday after the rebranded tech firm tangled with city officials over the controversial sign. The X, installed on the roof of the company's downtown office last week, was part of owner Elon Musk's bid to rebrand the troubled social media giant to the 24th letter of the alphabet. But local residents had complained about the brilliant flashing lights emitting from the sign at night. Some a ... read more

INTERNET SPACE
UK climate campaigners fear net zero policies under threat

Electrical fire sparks nationwide power outage in Iraq

U.S. pulls plug on incandescent light bulbs as new ban goes into effect

In a warming world, is an air-conditioned future inevitable?

INTERNET SPACE
MIT engineers create an energy-storing supercapacitor from ancient materials

New approach to fuel cell manufacturing could reduce cost, increase availability

Less power, lower emissions: improving AC technology

Fusion model hot off the wall

INTERNET SPACE
U.S. identifies three new areas for potential offshore wind energy development

Biden to visit Philly Shipyard to announce construction of offshore wind vessel

New transmission line to carry wind energy electricity from Wyoming to Nevada

Brazil faces dilemma: endangered macaw vs. wind farm

INTERNET SPACE
Solar batteries: a new material makes it possible to simultaneously absorb light and store energy

China's GalaxySpace Debuts Revolutionary Flexible Solar Wing Satellite

New robot boosts solar energy research

AI and satellite imagery transform solar energy potential mapping in China

INTERNET SPACE
Niger coup raises questions about uranium dependence

First US nuclear reactor in seven years goes online

Framatome's accident tolerant fuel technology one step closer to market readiness

EU says no uranium 'supply risk' after Niger coup

INTERNET SPACE
Harnessing synthetic biology to make sustainable alternatives to petroleum products

University of Illinois study finds turning food waste into bioenergy can become a profitable industry

New technology will let farmers produce their own fertilizer and e-fuels

Clean, sustainable fuels made 'from thin air' and plastic waste

INTERNET SPACE
UK to issue 'hundreds' of new oil, gas licences in North Sea

Berlin hails 'progress' in EU talks on hydrogen plants

Iraq and Kuwait seek to solve contested border issue

NASA Armstrong sensor technology helping turn oxygen into fuel

INTERNET SPACE
UAE vows to allow 'peaceful' assembly of climate activists at COP28

Asset managers not on track for climate target: report

Litigation increasingly used to fight climate change: UN

British professor elected to lead UN climate panel in key decade

Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.