Access Control with Encrypted Feature Maps for Object Detection Models

09/29/2022
by   Teru Nagamori, et al.
0

In this paper, we propose an access control method with a secret key for object detection models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models. The method enables us not only to provide a high detection performance to authorized users but to also degrade the performance for unauthorized users. The use of transformed images was proposed for the access control of image classification models, but these images cannot be used for object detection models due to performance degradation. Accordingly, in this paper, selected feature maps are encrypted with a secret key for training and testing models, instead of input images. In an experiment, the protected models allowed authorized users to obtain almost the same performance as that of non-protected models but also with robustness against unauthorized access without a key.

READ FULL TEXT

page 4

page 5

page 7

page 9

research
06/11/2022

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

In this paper, we propose an access control method with a secret key for...
research
02/01/2022

Access Control of Object Detection Models Using Encrypted Feature Maps

In this paper, we propose an access control method for object detection ...
research
09/03/2021

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

In this paper, we propose an access control method that uses the spatial...
research
08/28/2022

An Access Control Method with Secret Key for Semantic Segmentation Models

A novel method for access control with a secret key is proposed to prote...
research
07/12/2022

Image and Model Transformation with Secret Key for Vision Transformer

In this paper, we propose a combined use of transformed images and visio...
research
09/01/2021

A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access

In this paper, we propose a model protection method for convolutional ne...
research
09/05/2023

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

In recent years, deep neural networks (DNNs) trained with transformed da...

Please sign up or login with your details

Forgot password? Click here to reset