InstaHide: Instance-hiding Schemes for Private Distributed Learning

10/06/2020
by   Yangsibo Huang, et al.
5

How can multiple distributed entities collaboratively train a shared deep net on their private data while preserving privacy? This paper introduces InstaHide, a simple encryption of training images, which can be plugged into existing distributed deep learning pipelines. The encryption is efficient and applying it during training has minor effect on test accuracy. InstaHide encrypts each training image with a "one-time secret key" which consists of mixing a number of randomly chosen images and applying a random pixel-wise mask. Other contributions of this paper include: (a) Using a large public dataset (e.g. ImageNet) for mixing during its encryption, which improves security. (b) Experimental results to show effectiveness in preserving privacy against known attacks with only minor effects on accuracy. (c) Theoretical analysis showing that successfully attacking privacy requires attackers to solve a difficult computational problem. (d) Demonstrating that use of the pixel-wise mask is important for security, since Mixup alone is shown to be insecure to some some efficient attacks. (e) Release of a challenge dataset https://github.com/Hazelsuko07/InstaHide_Challenge Our code is available at https://github.com/Hazelsuko07/InstaHide

READ FULL TEXT

page 11

page 12

page 13

page 14

research
10/12/2020

TextHide: Tackling Data Privacy in Language Understanding Tasks

An unsolved challenge in distributed or federated learning is to effecti...
research
09/11/2023

Tortoise: An Authenticated Encryption Scheme

We present Tortoise, an experimental nonce-based authenticated encryptio...
research
01/06/2020

Regression and Learning with Pixel-wise Attention for Retinal Fundus Glaucoma Segmentation and Detection

Observing retinal fundus images by an ophthalmologist is a major diagnos...
research
03/31/2022

A Pixel-based Encryption Method for Privacy-Preserving Deep Learning Models

In the recent years, pixel-based perceptual algorithms have been success...
research
05/04/2023

Adversarially-Guided Portrait Matting

We present a method for generating alpha mattes using a limited data sou...
research
06/14/2023

Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning

In this work, we investigate the effectiveness of deep-learning-based pa...
research
05/31/2023

Bytes Are All You Need: Transformers Operating Directly On File Bytes

Modern deep learning approaches usually transform inputs into a modality...

Please sign up or login with your details

Forgot password? Click here to reset