Leveraging Diffusion Perturbations for Measuring Fairness in Computer Vision
Authors:
Nicholas Lui,
Bryan Chia,
William Berrios,
Candace Ross,
Douwe Kiela
Abstract:
Computer vision models have been known to encode harmful biases, leading to the potentially unfair treatment of historically marginalized groups, such as people of color. However, there remains a lack of datasets balanced along demographic traits that can be used to evaluate the downstream fairness of these models. In this work, we demonstrate that diffusion models can be leveraged to create such…
▽ More
Computer vision models have been known to encode harmful biases, leading to the potentially unfair treatment of historically marginalized groups, such as people of color. However, there remains a lack of datasets balanced along demographic traits that can be used to evaluate the downstream fairness of these models. In this work, we demonstrate that diffusion models can be leveraged to create such a dataset. We first use a diffusion model to generate a large set of images depicting various occupations. Subsequently, each image is edited using inpainting to generate multiple variants, where each variant refers to a different perceived race. Using this dataset, we benchmark several vision-language models on a multi-class occupation classification task. We find that images generated with non-Caucasian labels have a significantly higher occupation misclassification rate than images generated with Caucasian labels, and that several misclassifications are suggestive of racial biases. We measure a model's downstream fairness by computing the standard deviation in the probability of predicting the true occupation label across the different perceived identity groups. Using this fairness metric, we find significant disparities between the evaluated vision-and-language models. We hope that our work demonstrates the potential value of diffusion methods for fairness evaluations.
△ Less
Submitted 11 February, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
Review and Test of Steganography Techniques
Authors:
Joab Kose,
Oscar Bautista Chia,
Vashish Baboolal
Abstract:
Steganography is the art of concealing a secret message within an appropriate-multimedia carrier such as images, audio, video files, and even network packets. Steganographic techniques have been used since ancient times to hide the message from third-parties deemed to be enemies. On one hand, Steganography is a useful technique that has been applied in various useful applications. On the other han…
▽ More
Steganography is the art of concealing a secret message within an appropriate-multimedia carrier such as images, audio, video files, and even network packets. Steganographic techniques have been used since ancient times to hide the message from third-parties deemed to be enemies. On one hand, Steganography is a useful technique that has been applied in various useful applications. On the other hand, however, the same technique has been applied and used for the wrong purposes by people who have ill intentions. The increase in computational power and increase in security-awareness over the past few years have propelled the application of steganography in computational security-techniques. Being robust, undetectable, and having a good capacity of hidden-data, steganography has been preferred for hiding data than watermarking and cryptographic-techniques. This paper clarifies the application of steganography on different multimedia-carriers by using various potential tools, methods, and principles to either apply or detect steganography techniques.
△ Less
Submitted 15 December, 2020;
originally announced December 2020.