An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

01/26/2022
by   Hitoshi Kiya, et al.
0

This article presents an overview of image transformation with a secret key and its applications. Image transformation with a secret key enables us not only to protect visual information on plain images but also to embed unique features controlled with a key into images. In addition, numerous encryption methods can generate encrypted images that are compressible and learnable for machine learning. Various applications of such transformation have been developed by using these properties. In this paper, we focus on a class of image transformation referred to as learnable image encryption, which is applicable to privacy-preserving machine learning and adversarially robust defense. Detailed descriptions of both transformation algorithms and performances are provided. Moreover, we discuss robustness against various attacks.

READ FULL TEXT

page 2

page 6

page 7

page 11

page 12

page 13

page 14

page 15

research
08/15/2023

Block-Wise Encryption for Reliable Vision Transformer models

This article presents block-wise image encryption for the vision transfo...
research
08/04/2023

Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks

Several learnable image encryption schemes have been developed for priva...
research
07/31/2019

Adversarial Test on Learnable Image Encryption

Data for deep learning should be protected for privacy preserving. Resea...
research
09/10/2019

Image Steganography: Protection of Digital Properties against Eavesdropping

Steganography is the art of hiding the fact that communication is taking...
research
08/11/2020

Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors

Modern cameras are not designed with computer vision or machine learning...
research
10/02/2020

Block-wise Image Transformation with Secret Key for Adversarially Robust Defense

In this paper, we propose a novel defensive transformation that enables ...
research
12/25/2022

Data class-specific all-optical transformations and encryption

Diffractive optical networks provide rich opportunities for visual compu...

Please sign up or login with your details

Forgot password? Click here to reset