{"title":"人工智能生成图像内容的实时安全身份验证传输机制","authors":"Xiao Feng, Zheng Yuan","doi":"10.1007/s11554-024-01508-7","DOIUrl":null,"url":null,"abstract":"<p>The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial intelligence generated image content (AIGIC) as an important application of natural language processing models. This has resulted in a significant shift and advancement in the way image content is created. As AIGIC requires the acquisition of substantial image datasets from user devices for training purposes, the data transmission link is highly complex, and the datasets are susceptible to illegal attacks from multiple parties during transmission, which has a detrimental impact on the integrity and real-time nature of the training data and affects the accuracy of the training results of the AIGIC model. Consequently, this paper proposed a real-time authentication mechanism to guarantee the secure transmission of AIGIC image datasets. The mechanism achieves anonymous identity protection for the user device providing the image dataset by introducing a certificate-less encryption system. In turn, an aggregated signature scheme with key negotiation algorithm is introduced to authenticate the user devices of legitimate image datasets. A performance analysis indicates that the mechanism proposed in this paper outperforms other related methods in terms of security and accuracy of AIGIC image model training results, while guaranteeing real-time transmission of AIGIC image datasets, at the same time, the time complexity is also lower, which can effectively ensure the timeliness of the algorithm.</p>","PeriodicalId":51224,"journal":{"name":"Journal of Real-Time Image Processing","volume":"181 1","pages":""},"PeriodicalIF":2.9000,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content\",\"authors\":\"Xiao Feng, Zheng Yuan\",\"doi\":\"10.1007/s11554-024-01508-7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial intelligence generated image content (AIGIC) as an important application of natural language processing models. This has resulted in a significant shift and advancement in the way image content is created. As AIGIC requires the acquisition of substantial image datasets from user devices for training purposes, the data transmission link is highly complex, and the datasets are susceptible to illegal attacks from multiple parties during transmission, which has a detrimental impact on the integrity and real-time nature of the training data and affects the accuracy of the training results of the AIGIC model. Consequently, this paper proposed a real-time authentication mechanism to guarantee the secure transmission of AIGIC image datasets. The mechanism achieves anonymous identity protection for the user device providing the image dataset by introducing a certificate-less encryption system. In turn, an aggregated signature scheme with key negotiation algorithm is introduced to authenticate the user devices of legitimate image datasets. A performance analysis indicates that the mechanism proposed in this paper outperforms other related methods in terms of security and accuracy of AIGIC image model training results, while guaranteeing real-time transmission of AIGIC image datasets, at the same time, the time complexity is also lower, which can effectively ensure the timeliness of the algorithm.</p>\",\"PeriodicalId\":51224,\"journal\":{\"name\":\"Journal of Real-Time Image Processing\",\"volume\":\"181 1\",\"pages\":\"\"},\"PeriodicalIF\":2.9000,\"publicationDate\":\"2024-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Real-Time Image Processing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11554-024-01508-7\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Real-Time Image Processing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11554-024-01508-7","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content
The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial intelligence generated image content (AIGIC) as an important application of natural language processing models. This has resulted in a significant shift and advancement in the way image content is created. As AIGIC requires the acquisition of substantial image datasets from user devices for training purposes, the data transmission link is highly complex, and the datasets are susceptible to illegal attacks from multiple parties during transmission, which has a detrimental impact on the integrity and real-time nature of the training data and affects the accuracy of the training results of the AIGIC model. Consequently, this paper proposed a real-time authentication mechanism to guarantee the secure transmission of AIGIC image datasets. The mechanism achieves anonymous identity protection for the user device providing the image dataset by introducing a certificate-less encryption system. In turn, an aggregated signature scheme with key negotiation algorithm is introduced to authenticate the user devices of legitimate image datasets. A performance analysis indicates that the mechanism proposed in this paper outperforms other related methods in terms of security and accuracy of AIGIC image model training results, while guaranteeing real-time transmission of AIGIC image datasets, at the same time, the time complexity is also lower, which can effectively ensure the timeliness of the algorithm.
期刊介绍:
Due to rapid advancements in integrated circuit technology, the rich theoretical results that have been developed by the image and video processing research community are now being increasingly applied in practical systems to solve real-world image and video processing problems. Such systems involve constraints placed not only on their size, cost, and power consumption, but also on the timeliness of the image data processed.
Examples of such systems are mobile phones, digital still/video/cell-phone cameras, portable media players, personal digital assistants, high-definition television, video surveillance systems, industrial visual inspection systems, medical imaging devices, vision-guided autonomous robots, spectral imaging systems, and many other real-time embedded systems. In these real-time systems, strict timing requirements demand that results are available within a certain interval of time as imposed by the application.
It is often the case that an image processing algorithm is developed and proven theoretically sound, presumably with a specific application in mind, but its practical applications and the detailed steps, methodology, and trade-off analysis required to achieve its real-time performance are not fully explored, leaving these critical and usually non-trivial issues for those wishing to employ the algorithm in a real-time system.
The Journal of Real-Time Image Processing is intended to bridge the gap between the theory and practice of image processing, serving the greater community of researchers, practicing engineers, and industrial professionals who deal with designing, implementing or utilizing image processing systems which must satisfy real-time design constraints.