{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:01:47Z","timestamp":1760148107893,"version":"build-2065373602"},"reference-count":32,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T00:00:00Z","timestamp":1680048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072063","CYB22063"],"award-info":[{"award-number":["62072063","CYB22063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Graduate Student Research and Innovation Foundation of Chongqing, China","award":["62072063","CYB22063"],"award-info":[{"award-number":["62072063","CYB22063"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Since the advent of compressed sensing (CS), many reconstruction algorithms have been proposed, most of which are devoted to reconstructing images with better visual quality. However, higher-quality images tend to reveal more sensitive information in machine recognition tasks. In this paper, we propose a novel invertible privacy-preserving adversarial reconstruction method for image CS. While optimizing the quality, the reconstructed images are made to be adversarial samples at the moment of generation. For semi-authorized users, they can only obtain the adversarial reconstructed images, which provide little information for machine recognition or training deep models. For authorized users, they can reverse adversarial reconstructed images to clean samples with an additional restoration network. Experimental results show that while keeping good visual quality for both types of reconstructed images, the proposed scheme can provide semi-authorized users with adversarial reconstructed images with a very low recognizable rate, and allow authorized users to further recover sanitized reconstructed images with recognition performance approximating that of the traditional CS.<\/jats:p>","DOI":"10.3390\/s23073575","type":"journal-article","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T01:31:30Z","timestamp":1680139890000},"page":"3575","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Invertible Privacy-Preserving Adversarial Reconstruction for Image Compressed Sensing"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6958-5807","authenticated-orcid":false,"given":"Di","family":"Xiao","sequence":"first","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, China"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, China"}]},{"given":"Min","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science, Chongqing University, Chongqing 400044, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,3,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","article-title":"Compressed sensing","volume":"52","author":"Donoho","year":"2006","journal-title":"IEEE Trans. Inform. Theory"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4655","DOI":"10.1109\/TIT.2007.909108","article-title":"Signal Recovery from Random Measurements Via Orthogonal Matching Pursuit","volume":"53","author":"Tropp","year":"2007","journal-title":"IEEE Trans. Inform. Theory"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/JSTSP.2007.910281","article-title":"Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems","volume":"1","author":"Figueiredo","year":"2007","journal-title":"IEEE J. Sel. Top. Sign. Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1109\/TSP.2007.914345","article-title":"Bayesian compressive sensing","volume":"56","author":"Ji","year":"2008","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TMM.2020.3014561","article-title":"Multi-Channel Deep Networks for Block-Based Image Compressive Sensing","volume":"23","author":"Zhou","year":"2021","journal-title":"IEEE Trans. Multimed."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1109\/TCI.2018.2846413","article-title":"Convolutional Neural Networks for Noniterative Reconstruction of Compressively Sensed Images","volume":"4","author":"Lohit","year":"2018","journal-title":"IEEE Trans. Comput. Imaging"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhang, J., and Ghanem, B. (2018, January 18\u201321). ISTA-Net: Interpretable Optimization-Inspired Deep Network for Image Compressive Sensing. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00196"},{"key":"ref_8","unstructured":"Hill, K. (The New York Times, 2020). The secretive company that might end privacy as we know it, The New York Times."},{"key":"ref_9","unstructured":"Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H., and Zhao, B.Y. (2020, January 12\u201314). Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. Proceedings of the 29th USENIX Conference on Security Symposium, Boston, MA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 22\u201326). Towards Evaluating the Robustness of Neural Networks. Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Chen, K., Zeng, X., Ying, Q., Li, S., Qian, Z., and Zhang, X. (2022, January 18\u201322). Invertible Image Dataset Protection. Proceedings of the IEEE International Conference on Multimedia and Expo, Taipei, Taiwan.","DOI":"10.1109\/ICME52920.2022.9859698"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"You, Z., Li, S., Qian, Z., and Zhang, X. (2021, January 5\u20139). Reversible Privacy-Preserving Recognition. Proceedings of the IEEE International Conference on Multimedia and Expo, Shenzhen, China.","DOI":"10.1109\/ICME51207.2021.9428115"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zhou, S., Deng, X., Li, C., Liu, Y., and Jiang, H. (2022). Recognition-Oriented Image Compressive Sensing with Deep Learning. IEEE Trans. Multimed., in press.","DOI":"10.1109\/TMM.2022.3142952"},{"key":"ref_14","unstructured":"Mousavi, A., Patel, A.B., and Baraniuk, R.G. (October, January 29). A deep learning approach to structured signal recovery. Proceedings of the IEEE Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Kulkarni, K., Lohit, S., Turaga, P., Kerviche, R., and Ashok, A. (2016, January 27\u201330). ReconNet: Non-Iterative Reconstruction of Images from Compressively Sensed Measurements. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.55"},{"key":"ref_16","unstructured":"Gan, L. (2007, January 1\u20134). Block Compressed Sensing of Natural Images. Proceedings of the IEEE International Conference on Digital Signal Processing, Cardiff, UK."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.neucom.2019.05.006","article-title":"DR2-Net: Deep Residual Reconstruction Network for Image Compressive Sensing","volume":"359","author":"Yao","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Xie, X., Wang, Y., Shi, G., Wang, C., Du, J., and Han, X. (2017, January 11\u201314). Adaptive Measurement Network for CS Image Reconstruction. Proceedings of the Chinese Conference on Computer Vision, Tianjin, China.","DOI":"10.1007\/978-981-10-7302-1_34"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Shi, W., Jiang, F., Zhang, S., and Zhao, D. (2017, January 10\u201314). Deep networks for compressed image sensing. Proceedings of the IEEE International Conference on Multimedia and Expo, Hong Kong, China.","DOI":"10.1109\/ICME.2017.8019428"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1109\/TIP.2019.2928136","article-title":"Image Compressed Sensing Using Convolutional Neural Network","volume":"29","author":"Shi","year":"2020","journal-title":"IEEE Trans. Image Process."},{"key":"ref_21","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.J., and Fergus, R. (2013). Intriguing properties of neural networks. arXiv."},{"key":"ref_22","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv."},{"key":"ref_23","unstructured":"Kurakin, A., Goodfellow, I.J., and Bengio, S. (2016). Adversarial examples in the physical world. arXiv."},{"key":"ref_24","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. (2017). Towards Deep Learning Models Resistant to Adversarial Attacks. arXiv."},{"key":"ref_25","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014, January 8\u201313). Generative adversarial nets. Proceedings of the 27th International Conference on Neural Information Processing Systems, Montreal, QB, Canada."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Xiao, C., Li, B., Zhu, J., He, W., Liu, M., and Song, D. (2018, January 13\u201319). Generating Adversarial Examples with Adversarial Networks. Proceedings of the 27th International Joint Conference on Artificial Intelligence, Stockholm, Sweden.","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Jandial, S., Mangla, P., Varshney, S., and Balasubramanian, V. (2019, January 27\u201328). AdvGAN++: Harnessing Latent Layers for Adversary Generation. Proceedings of the IEEE International Conference on Computer Vision Workshop, Seoul, Republic of Korea.","DOI":"10.1109\/ICCVW.2019.00257"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., and Brox, T. (2015, January 5\u20139). U-net: Convolutional networks for biomedical image segmentation. Proceedings of the International Conference on Medical Image Computing and Computer-Assisted Intervention, Munich, Germany.","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref_30","unstructured":"Simonyan, K., and Zisserman, A. (2015, January 7\u20139). Very deep convolutional networks for large-scale image recognition. Proceedings of the International Conference on Learning Representations, San Diego, CA, USA."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Maaten, L.V.D., and Weinberger, K.Q. (2017, January 21\u201326). Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Johnson, J., Alahi, A., and Li, F. (2016, January 8\u201316). Perceptual losses for real-time style transfer and super-resolution. Proceedings of the European Conference on Computer Vision, Amsterdam, NL, USA.","DOI":"10.1007\/978-3-319-46475-6_43"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/7\/3575\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:06:10Z","timestamp":1760123170000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/7\/3575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,29]]},"references-count":32,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2023,4]]}},"alternative-id":["s23073575"],"URL":"https:\/\/doi.org\/10.3390\/s23073575","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,3,29]]}}}