Disrupting diffusion: Token-level attention erasure attack against diffusion-based customization

Y Liu, J An, W Zhang, D Wu, J Gu, Z Lin… - Proceedings of the 32nd …, 2024 - dl.acm.org
With the development of diffusion-based customization methods like DreamBooth,
individuals now have access to train the models that can generate their personalized …

Replication in visual diffusion models: A survey and outlook

W Wang, Y Sun, Z Yang, Z Hu, Z Tan… - arXiv preprint arXiv …, 2024 - arxiv.org
Visual diffusion models have revolutionized the field of creative AI, producing high-quality
and diverse content. However, they inevitably memorize training images or videos …

Anti-Reference: Universal and Immediate Defense Against Reference-Based Generation

Y Song, S Lou, X Liu, H Ci, P Yang, J Liu… - arXiv preprint arXiv …, 2024 - arxiv.org
Diffusion models have revolutionized generative modeling with their exceptional ability to
produce high-fidelity images. However, misuse of such potent tools can lead to the creation …

A survey of defenses against ai-generated visual media: Detection, disruption, and authentication

J Deng, C Lin, Z Zhao, S Liu, Q Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Deep generative models have demonstrated impressive performance in various computer
vision applications, including image synthesis, video generation, and medical analysis …

IDProtector: An Adversarial Noise Encoder to Protect Against ID-Preserving Image Generation

Y Song, P Yang, H Ci, MZ Shou - arXiv preprint arXiv:2412.11638, 2024 - arxiv.org
Recently, zero-shot methods like InstantID have revolutionized identity-preserving
generation. Unlike multi-image finetuning approaches such as DreamBooth, these zero-shot …

DTIA: Disruptive Text-Image Alignment for Countering Text-to-Image Diffusion Model Personalization

Y Gao, J Yang, M Wu, C Zhao, A Su, J Song… - Data Science and …, 2024 - Springer
Personalized content synthesis technologies based on diffusion models have achieved
significant breakthroughs, allowing for the creation of specific images from just a few …

Privacy Protection in Personalized Diffusion Models via Targeted Cross-Attention Adversarial Attack

X Xu, MA Butt, S Kamath, B Raducanu - arXiv preprint arXiv:2411.16437, 2024 - arxiv.org
The growing demand for customized visual content has led to the rise of personalized text-to-
image (T2I) diffusion models. Despite their remarkable potential, they pose significant …

DDAP: Dual-Domain Anti-Personalization against Text-to-Image Diffusion Models

J Yang, R Xi, Y Lai, X Lin, Z Yu - 2024 IEEE International Joint …, 2024 - ieeexplore.ieee.org
Diffusion-based personalized visual content generation technologies have achieved
significant breakthroughs, allowing for the creation of specific objects by just learning from a …

Protective Perturbations against Unauthorized Data Usage in Diffusion-based Image Generation

S Peng, J Yang, M Wang, J He, X Jia - arXiv preprint arXiv:2412.18791, 2024 - arxiv.org
Diffusion-based text-to-image models have shown immense potential for various image-
related tasks. However, despite their prominence and popularity, customizing these models …

BBP: Blockchain-Enabled Biological Assets Identity Protection System

Z Gao, Z Fang, Y Wei, K Gai - Blockchain and Web3 Technology …, 2024 - Springer
In recent years, with the development of the Internet, various forms of biological assets can
be digitally uploaded to the Internet, such as pictures of animals. Some malicious attackers …