DeepAI AI Chat
Log In Sign Up

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

01/26/2022
by   Hitoshi Kiya, et al.
0

This article presents an overview of image transformation with a secret key and its applications. Image transformation with a secret key enables us not only to protect visual information on plain images but also to embed unique features controlled with a key into images. In addition, numerous encryption methods can generate encrypted images that are compressible and learnable for machine learning. Various applications of such transformation have been developed by using these properties. In this paper, we focus on a class of image transformation referred to as learnable image encryption, which is applicable to privacy-preserving machine learning and adversarially robust defense. Detailed descriptions of both transformation algorithms and performances are provided. Moreover, we discuss robustness against various attacks.

READ FULL TEXT

page 2

page 6

page 7

page 11

page 12

page 13

page 14

page 15

07/31/2019

Adversarial Test on Learnable Image Encryption

Data for deep learning should be protected for privacy preserving. Resea...
03/09/2023

Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

In this paper, we propose a novel generative model-based attack on learn...
07/25/2022

An Encryption Method of ConvMixer Models without Performance Degradation

In this paper, we propose an encryption method for ConvMixer models with...
09/10/2019

Image Steganography: Protection of Digital Properties against Eavesdropping

Steganography is the art of hiding the fact that communication is taking...
08/11/2020

Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors

Modern cameras are not designed with computer vision or machine learning...
04/09/2021

Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key

In this paper, we propose a novel DNN watermarking method that utilizes ...
07/12/2022

Image and Model Transformation with Secret Key for Vision Transformer

In this paper, we propose a combined use of transformed images and visio...