<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-8-2-0-7</article-id><article-id pub-id-type="publisher-id">3147</article-id><article-categories><subj-group subj-group-type="heading"><subject>ARTIFICIAL INTELLIGENCE AND DECISION MAKING</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;PROTECTION AGAINST ADVERSARIAL ATTACKS&amp;nbsp;ON AUDIO AND IMAGES IN ARTIFICIAL&amp;nbsp;INTELLIGENCE MODELS USING THE SGEC METHOD&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;PROTECTION AGAINST ADVERSARIAL ATTACKS&amp;nbsp;ON AUDIO AND IMAGES IN ARTIFICIAL&amp;nbsp;INTELLIGENCE MODELS USING THE SGEC METHOD&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Gerasimov</surname><given-names>Viktor Mikhailovich</given-names></name><name xml:lang="en"><surname>Gerasimov</surname><given-names>Viktor Mikhailovich</given-names></name></name-alternatives><email>my.virus.kaspersky@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maslova</surname><given-names>Maria Alexandrovna</given-names></name><name xml:lang="en"><surname>Maslova</surname><given-names>Maria Alexandrovna</given-names></name></name-alternatives><email>mashechka-81@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Khalilayeva</surname><given-names>Emine Ilimdarovna</given-names></name><name xml:lang="en"><surname>Khalilayeva</surname><given-names>Emine Ilimdarovna</given-names></name></name-alternatives><email>emine.halilaeva@yandex.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2023</year></pub-date><volume>8</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2023/2/ИТ_НР_8.2_7_D4FfwrW.pdf" /><abstract xml:lang="ru"><p>In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks on audio and images. This article explores this issue and presents the SGEC method as a means to minimize these risks. Various types of attacks on audio and images are discussed, including label manipulation, white-box and black-box attacks, leakage through trained models, and hardware-level attacks. The main focus is on the SGEC method, which offers data encryption and ensures their integrity in AI models. The article also examines other approaches to protect audio and images, such as dual verification and ensemble methods, access restriction and data anonymization, as well as the use of provably robust AI models.</p></abstract><trans-abstract xml:lang="en"><p>In the modern world, the use of artificial intelligence (AI) is increasingly facing the risk of adversarial attacks on audio and images. This article explores this issue and presents the SGEC method as a means to minimize these risks. Various types of attacks on audio and images are discussed, including label manipulation, white-box and black-box attacks, leakage through trained models, and hardware-level attacks. The main focus is on the SGEC method, which offers data encryption and ensures their integrity in AI models. The article also examines other approaches to protect audio and images, such as dual verification and ensemble methods, access restriction and data anonymization, as well as the use of provably robust AI models.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>adversarial attacks</kwd><kwd>voiceprint protection</kwd><kwd>biometric data protection</kwd><kwd>steganography</kwd><kwd>data encryption</kwd><kwd>risks of adversarial attacks</kwd></kwd-group><kwd-group xml:lang="en"><kwd>adversarial attacks</kwd><kwd>voiceprint protection</kwd><kwd>biometric data protection</kwd><kwd>steganography</kwd><kwd>data encryption</kwd><kwd>risks of adversarial attacks</kwd></kwd-group></article-meta></front><back><ack><p>Работа выполнена в рамках Соглашения от 30.06.2022 г. № 40469-21/2022-к</p></ack><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1.&amp;nbsp; Esmaeilpour M., Cardinal P., Koerich A.L. A robust approach for securing audio classification against adversarial attacks //IEEE transactions on information forensics and security. &amp;ndash; 2019. &amp;ndash; T. 15. &amp;ndash; P. 2147-2159.</mixed-citation></ref><ref id="B2"><mixed-citation>2.&amp;nbsp; Xu H. et al. Adversarial attacks and defenses in images, graphs and text: A review // International Journal of Automation and Computing. &amp;ndash; 2020. &amp;ndash; T. 17. &amp;ndash; P. 151-178.</mixed-citation></ref><ref id="B3"><mixed-citation>3. Certificate of state registration of the computer program No. 2022663168 Russian Federation. SGEC-system &amp;quot;BIOM&amp;quot; for encrypting and hiding the voice data of users on the server: No. 2022662279: App. 06/27/2022: publ. July 12, 2022 / V.M. Gerasimov, M.A. Maslova; applicant Federal State Autonomous Educational Institution of Higher Education &amp;quot;Sevastopol State University&amp;quot;. &amp;ndash; EDN FJQWGB.</mixed-citation></ref><ref id="B4"><mixed-citation>4.&amp;nbsp; Clark D., Hunt S., Malacaria P. Quantitative analysis of the leakage of confidential data // Electronic Notes in Theoretical Computer Science. &amp;ndash; 2002. &amp;ndash; T. 59. &amp;ndash; №. 3. &amp;ndash; P. 238-251.</mixed-citation></ref><ref id="B5"><mixed-citation>5.&amp;nbsp; Martin K. The penalty for privacy violations: How privacy violations impact trust online // Journal of Business Research. &amp;ndash; 2018. &amp;ndash; T. 82. &amp;ndash; P. 103-116.</mixed-citation></ref><ref id="B6"><mixed-citation>6.&amp;nbsp; Yang J. et al. Msta-net: forgery detection by generating manipulation trace based on multi-scale self-texture attention // IEEE transactions on circuits and systems for video technology. &amp;ndash; 2021. &amp;ndash; T. 32. &amp;ndash; №. 7. &amp;ndash; P.&amp;nbsp;4854-4866.</mixed-citation></ref><ref id="B7"><mixed-citation>7.&amp;nbsp; Li G. et al. DeSVig: Decentralized swift vigilance against adversarial attacks in industrial artificial intelligence systems //IEEE Transactions on Industrial Informatics. &amp;ndash; 2019. &amp;ndash; T. 16. &amp;ndash; №. 5. &amp;ndash; P. 3267-3277.</mixed-citation></ref><ref id="B8"><mixed-citation>8.&amp;nbsp; Mee&amp;szlig;en S. M. et al. Trust is essential: positive effects of information systems on users&amp;rsquo; memory require trust in the system //Ergonomics. &amp;ndash; 2020. &amp;ndash; T. 63. &amp;ndash; №. 7. &amp;ndash; P. 909-926.</mixed-citation></ref><ref id="B9"><mixed-citation>9.&amp;nbsp; Lupton M. Some ethical and legal consequences of the application of artificial intelligence in the field of medicine //Trends Med. &amp;ndash; 2018. &amp;ndash; T. 18. &amp;ndash; №. 4. &amp;ndash; P. 100147.</mixed-citation></ref><ref id="B10"><mixed-citation>10. Gerasimov, V. M. Comprehensive system for protecting a biometric voice print from the effects of cyber fraudsters / V.M. Gerasimov // XI Congress of Young Scientists: Collection of scientific papers, St. Petersburg, April 04&amp;ndash;08, 2022. - St. Petersburg: Federal State Autonomous Educational Institution of Higher Education &amp;quot;National Research University ITMO&amp;quot;, 2022. &amp;ndash; P. 72-76. &amp;ndash; EDN VTVBBS.</mixed-citation></ref><ref id="B11"><mixed-citation>11. Gerasimov, V.M. Possible threats and attacks on the user&amp;#39;s voice identification system / V.M. Gerasimov, M.A. Maslova // Scientific result. Information Technology. &amp;ndash; 2022. &amp;ndash; V. 7, No. 1. &amp;ndash; P. 32-37. &amp;ndash; DOI 10.18413/2518-1092-2022-7-1-0-4. &amp;ndash; EDN JBCXMF.</mixed-citation></ref><ref id="B12"><mixed-citation>12. Ozhiganova M. I., Arvanova S. M., Abitov A. A., Unachev I. A. Development of a software module for a face recognition system using the Viola-Jones method // Digital transformation of science and education: Collection of scientific papers II International Scientific and Practical Conference, NALCHIK, October 01&amp;ndash;04, 2021. - NALCHIK, 2021. &amp;ndash; P. 271-277. &amp;ndash; EDN NRFFLF.</mixed-citation></ref></ref-list></back></article>