A Survey on Image Immunization Techniques

  • Hanqing Zhang
  • , Jing Yu*
  • , Zhipeng Ru
  • , Yihang Wei
  • , Jiaoyang Su*
  • , Lizhi Zhao
  • , Keke Gai
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Image immunization injects imperceptible perturbations into images to raise the cost of malicious editing. Key challenges persist in balancing immunity strength and visual fidelity, achieving cross-model generalization, reducing computational overhead, and standardizing evaluation. This survey systematizes GAN-based and diffusion-based, as well as reversible-network approaches, and compiles reported results on common benchmarks to surface trade-offs among robustness, fidelity, and efficiency. We conclude with open problems and directions, including architecture-agnostic objectives, reversible carriers for authentication and near-lossless recovery, cross-modal immunity transfer, and energy-efficient substrates (e.g., quantum encodings, neuromorphic processing).

Original languageEnglish
Title of host publicationProceedings - 2025 IEEE 12th International Conference on Cyber Security and Cloud Computing, CSCloud 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages221-226
Number of pages6
ISBN (Electronic)9798331587819
DOIs
Publication statusPublished - 2025
Event12th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2025 - New York City, United States
Duration: 7 Nov 20259 Nov 2025

Publication series

NameProceedings - 2025 IEEE 12th International Conference on Cyber Security and Cloud Computing, CSCloud 2025

Conference

Conference12th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2025
Country/TerritoryUnited States
CityNew York City
Period7/11/259/11/25

Keywords

  • Diffusion Model Attacks
  • Generative Model Defense
  • Image Immunization
  • Proactive Defense

Fingerprint

Dive into the research topics of 'A Survey on Image Immunization Techniques'. Together they form a unique fingerprint.

Cite this