Skip to main content

Showing 1–6 of 6 results for author: Robinette, P K

.
  1. arXiv:2502.02676  [pdf, other

    cs.CV cs.CR cs.LG

    Blind Visible Watermark Removal with Morphological Dilation

    Authors: Preston K. Robinette, Taylor T. Johnson

    Abstract: Visible watermarks pose significant challenges for image restoration techniques, especially when the target background is unknown. Toward this end, we present MorphoMod, a novel method for automated visible watermark removal that operates in a blind setting -- without requiring target images. Unlike existing methods, MorphoMod effectively removes opaque and transparent watermarks while preserving… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

  2. arXiv:2412.03809  [pdf, other

    cs.CV

    EditScout: Locating Forged Regions from Diffusion-based Edited Images with Multimodal LLM

    Authors: Quang Nguyen, Truong Vu, Trong-Tung Nguyen, Yuxin Wen, Preston K Robinette, Taylor T Johnson, Tom Goldstein, Anh Tran, Khoi Nguyen

    Abstract: Image editing technologies are tools used to transform, adjust, remove, or otherwise alter images. Recent research has significantly improved the capabilities of image editing tools, enabling the creation of photorealistic and semantically informed forged regions that are nearly indistinguishable from authentic imagery, presenting new challenges in digital forensics and media credibility. While cu… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

  3. arXiv:2409.19442  [pdf, other

    cs.CR

    Trigger-Based Fragile Model Watermarking for Image Transformation Networks

    Authors: Preston K. Robinette, Dung T. Nguyen, Samuel Sasaki, Taylor T. Johnson

    Abstract: In fragile watermarking, a sensitive watermark is embedded in an object in a manner such that the watermark breaks upon tampering. This fragile process can be used to ensure the integrity and source of watermarked objects. While fragile watermarking for model integrity has been studied in classification models, image transformation/generation models have yet to be explored. We introduce a novel, t… ▽ More

    Submitted 28 September, 2024; originally announced September 2024.

  4. arXiv:2404.05703  [pdf, other

    cs.CR

    Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

    Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson

    Abstract: Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but are vulnerable to adversarial machine learning attacks. These attacks perturb input data to cause misclassification, bypassing protective systems. Existing defens… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: In International Conference On Formal Methods in Software Engineering, 2024; (FormaliSE'24)

  5. arXiv:2310.06951  [pdf, other

    cs.CR

    Sanitizing Hidden Information with Diffusion Models

    Authors: Preston K. Robinette, Daniel Moyer, Taylor T. Johnson

    Abstract: Information hiding is the process of embedding data within another form of data, often to conceal its existence or prevent unauthorized access. This process is commonly used in various forms of secure communications (steganography) that can be used by bad actors to propagate malware, exfiltrate victim data, and discreetly communicate. Recent work has utilized deep neural networks to remove this hi… ▽ More

    Submitted 5 February, 2025; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: Accepted to European Conference on Artificial Intelligence (ECAI), 2024

  6. SUDS: Sanitizing Universal and Dependent Steganography

    Authors: Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer, Taylor T. Johnson

    Abstract: Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by bad actors to propagate malware, exfiltrate data, and discreetly communicate. Current protection mechanisms rely upon steganalysis, or t… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: Accepted to European Conference on Artificial Intelligence (ECAI) 2023