• 𝒍𝒆𝒎𝒂𝒏𝒏@lemmy.one
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      1 year ago

      It might be resistant to screenshots - unless I missed it, the article didn’t clarify whether the obfuscation process is applied to the image on a per-pixel basis, or within the file format itself…

      If it was that easy to bypass it would be a pretty futile mechanism IMO, one would just need to convert the image to strip out the obfuscation 🫠 or just take a screenshot as you said

      • SheeEttin@lemmy.world
        link
        fedilink
        arrow-up
        18
        ·
        1 year ago

        Sounds like it’s tiny changes to the image data to trick it. But it also sounds dependent on each algorithm. So while you might trick Stable Diffusion, another like Midjourney would be unaffected.

        And either way, I’d bet mere jpeg compression would be enough to destroy your tiny changes.

      • diffuselight@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        These things never work in the real world. We’ve seen this over and over. It’s snakeoil. Latent space mapping may survive compression but don’t work across encoders.

        • Cybersteel@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          It’s as good as scanning a random marking of a human bone that somehow installs a virus in your pc

    • dan1101@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      Yeah it might work in the original format under some conditions but won’t survive a screenshot or saving to another format.

  • andruid@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    The white paper linked’s title is very pragmatic sounding “Raising the Cost of Malicious AI-Powered Image Edit”. Would like to read it deeper later to see what the actual mechanisms deployed are. I know ive considered some form of attestation embedding both in the data and form linked with cryptographic signature. You know for emportant things like politics, diplomacy and celeberty endorsement. /s