Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack

02/01/2022
by   Tatsuya Chuman, et al.
0

The aim of this paper is to evaluate the security of a block-based image encryption for the vision transformer against jigsaw puzzle solver attacks. The vision transformer, a model for image classification based on the transformer architecture, is carried out by dividing an image into a grid of square patches. Some encryption schemes for the vision transformer have been proposed by applying block-based image encryption such as block scrambling and rotating to patches of the image. On the other hand, the security of encryption scheme for the vision transformer has never evaluated. In this paper, jigsaw puzzle solver attacks are utilized to evaluate the security of encrypted images by regarding the divided patches as pieces of a jigsaw puzzle. In experiments, an image is resized and divided into patches to apply block scrambling-based image encryption, and then the security of encrypted images for the vision transformer against jigsaw puzzle solver attacks is evaluated.

READ FULL TEXT

page 3

page 4

research
07/17/2022

Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks

The security of learnable image encryption schemes for image classificat...
research
08/04/2023

Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks

Several learnable image encryption schemes have been developed for priva...
research
08/07/2018

Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks

Encryption-then-Compression (EtC) systems have been considered for the u...
research
08/15/2023

Block-Wise Encryption for Reliable Vision Transformer models

This article presents block-wise image encryption for the vision transfo...
research
07/29/2019

A Deep Learning Based Attack for The Chaos-based Image Encryption

In this letter, as a proof of concept, we propose a deep learning-based ...
research
05/08/2023

Recovering the Block-wise Relationship in an Encryption-Then-Compression System

Joint encryption and compression is an ideal solution for protecting sec...
research
10/04/2018

Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems

Encryption-then-Compression (EtC) systems have been proposed to securely...

Please sign up or login with your details

Forgot password? Click here to reset