PID: Prompt-Independent Data Protection Against Latent Diffusion Models

Ang Li,Yichuan Mo,Mingjie Li,Yisen Wang
2024-06-14
Abstract:The few-shot fine-tuning of Latent Diffusion Models (LDMs) has enabled them to grasp new concepts from a limited number of images. However, given the vast amount of personal images accessible online, this capability raises critical concerns about civil privacy. While several previous defense methods have been developed to prevent such misuse of LDMs, they typically assume that the textual prompts used by data protectors exactly match those employed by data exploiters. In this paper, we first empirically demonstrate that breaking this assumption, i.e., in cases where discrepancies exist between the textual conditions used by protectors and exploiters, could substantially reduce the effectiveness of these defenses. Furthermore, considering the visual encoder's independence from textual prompts, we delve into the visual encoder and thoroughly investigate how manipulating the visual encoder affects the few-shot fine-tuning process of LDMs. Drawing on these insights, we propose a simple yet effective method called \textbf{Prompt-Independent Defense (PID)} to safeguard privacy against LDMs. We show that PID can act as a strong privacy shield on its own while requiring significantly less computational power. We believe our studies, along with the comprehensive understanding and new defense method, provide a notable advance toward reliable data protection against LDMs.
Cryptography and Security,Artificial Intelligence
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to protect personal image data from malicious use during the few - shot fine - tuning process of Latent Diffusion Models (LDMs). Specifically, existing defense methods usually assume that the text prompts used in the data protection stage (adding protective perturbations) and the data utilization stage (malicious fine - tuning) are exactly the same. However, this assumption may not hold in practical applications because data protectors cannot predict what text prompts data utilizers will use. This situation of text - prompt mismatch may significantly reduce the effectiveness of existing defense algorithms. To meet this challenge, the authors first experimentally demonstrated that text - prompt mismatch does indeed weaken the effectiveness of existing defense algorithms. Then, they conducted in - depth research on the visual encoder in LDMs and explored how to manipulate the visual encoder to influence the few - shot fine - tuning process, thereby proposing a new, text - prompt - independent defense method - Prompt - Independent Defense (PID). PID can not only serve as a powerful privacy - protection shield, but also requires far fewer computational resources than existing defense methods. In addition, the authors also explored the possibility of combining PID with existing defense methods to further improve the defense effect. Overall, this research aims to provide a more reliable data - protection method to combat the malicious use of unauthorized images by LDMs.