Image and Model Transformation with Secret Key for Vision Transformer

07/12/2022
by   Hitoshi Kiya, et al.
0

In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key. We show for the first time that models trained with plain images can be directly transformed to models trained with encrypted images on the basis of the ViT architecture, and the performance of the transformed models is the same as models trained with plain images when using test images encrypted with the key. In addition, the proposed scheme does not require any specially prepared data for training models or network modification, so it also allows us to easily update the secret key. In an experiment, the effectiveness of the proposed scheme is evaluated in terms of performance degradation and model protection performance in an image classification task on the CIFAR-10 dataset.

READ FULL TEXT

page 4

page 10

research
07/25/2022

An Encryption Method of ConvMixer Models without Performance Degradation

In this paper, we propose an encryption method for ConvMixer models with...
research
08/15/2023

Block-Wise Encryption for Reliable Vision Transformer models

This article presents block-wise image encryption for the vision transfo...
research
09/05/2023

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

In recent years, deep neural networks (DNNs) trained with transformed da...
research
11/17/2021

Protection of SVM Model with Secret Key from Unauthorized Access

In this paper, we propose a block-wise image transformation method with ...
research
06/27/2012

Modeling Images using Transformed Indian Buffet Processes

Latent feature models are attractive for image modeling, since images ge...
research
09/29/2022

Access Control with Encrypted Feature Maps for Object Detection Models

In this paper, we propose an access control method with a secret key for...
research
08/28/2022

An Access Control Method with Secret Key for Semantic Segmentation Models

A novel method for access control with a secret key is proposed to prote...

Please sign up or login with your details

Forgot password? Click here to reset