this post was submitted on 25 Oct 2023
127 points (100.0% liked)
Technology
37720 readers
505 users here now
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It wouldn't be expensive, you could do it on a laptop in a few seconds.
Unless, of course, we decide only large corporations should be allowed to generate images and completely outlaw all of the open source / free image generation software - that's not going to happen.
Most images are created with a "diffusion" model where you take an image, and run an algorithm that slightly modifies it. Over and over and over until you get what you want. You don't have to (and commonly don't - for the best results) start with a blank image. And you can run just a single pass, with the output being almost indistinguishable from the input.
This is a hard problem to solve and I think catching abuse after it happens is increasingly going to be more difficult. Better to focus on stopping the abuse from happening in the first place. E.g. by flagging and investigating questionable behaviour by kids in schools. That approach is proven and works well.
The image generation can be cheap, but I was imagining this sort of watermark wouldn't be so much a visible part of the image, but an embedded signature that hashes the image.
Require enough PoW to generate the signature, and this would at least cut down the volumes of images created, and possibly limit them to groups or businesses with clusters that could be monitored, without clamping down on image generation in general.
A modified version of what you mentioned could work too, but where just these specific images have to be vetted and signed by a central authority using a private key. Image generation software wouldn't be restricted for general purposes, but no signature on suspicious content and it's off to jail.