Survey on Visual Signal Coding and Processing with Generative Models: Technologies, Standards and Optimization

Z Chen, H Sun, L Zhang, F Zhang - IEEE Journal on Emerging …, 2024 - ieeexplore.ieee.org
This paper provides a survey of the latest developments in visual signal coding and
processing with generative models. Specifically, our focus is on presenting the advancement …

A training-free defense framework for robust learned image compression

M Song, J Choi, B Han - arXiv preprint arXiv:2401.11902, 2024 - arxiv.org
We study the robustness of learned image compression models against adversarial attacks
and present a training-free defense technique based on simple image transform functions …

SLIC: Secure Learned Image Codec through Compressed Domain Watermarking to Defend Image Manipulation

CH Huang, JL Wu - Proceedings of the 6th ACM International …, 2024 - dl.acm.org
The digital image manipulation and advancements in Generative AI, such as Deepfake, has
raised significant concerns regarding the authenticity of images shared on social media …

[HTML][HTML] A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression

CH Huang, JL Wu - Big Data and Cognitive Computing, 2025 - mdpi.com
In the era of deepfakes and AI-generated content, digital image manipulation poses
significant challenges to image authenticity, creating doubts about the credibility of images …

Att2CPC: Attention-Guided Lossy Attribute Compression of Point Clouds

K Liu, K You, P Gao, M Paul - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
With the great progress of 3D sensing and acquisition technology, the volume of point cloud
data has grown dramatically, which urges the development of efficient point cloud …

On the Adversarial Robustness of Learning-based Image Compression Against Rate-Distortion Attacks

C Wu, Q Wu, H Wei, S Chen, L Wang, KN Ngan… - arXiv preprint arXiv …, 2024 - arxiv.org
Despite demonstrating superior rate-distortion (RD) performance, learning-based image
compression (LIC) algorithms have been found to be vulnerable to malicious perturbations …