Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks

10/13/2020
by   Warit Sirichotedumrong, et al.
0

Various visual information protection methods have been proposed for privacy-preserving deep neural networks (DNNs). In contrast, attack methods on such protection methods have been studied simultaneously. In this paper, we evaluate state-of-the-art visual protection methods for privacy-preserving DNNs in terms of visual security against ciphertext-only attacks (COAs). We focus on brute-force attack, feature reconstruction attack (FR-Attack), inverse transformation attack (ITN-Attack), and GAN-based attack (GAN-Attack), which have been proposed to reconstruct visual information on plain images from the visually-protected images. The detail of various attack is first summarized, and then visual security of the protection methods is evaluated. Experimental results demonstrate that most of protection methods, including pixel-wise encryption, have not enough robustness against GAN-Attack, while a few protection methods are robust enough against GAN-Attack.

READ FULL TEXT

page 2

page 5

research
11/04/2022

A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs

Privacy-preserving deep neural networks (DNNs) have been proposed for pr...
research
08/07/2020

Image Transformation Network for Privacy-Preserving Deep Neural Networks and Its Security Evaluation

We propose a transformation network for generating visually-protected im...
research
09/30/2022

Visual Privacy Protection Based on Type-I Adversarial Attack

With the development of online artificial intelligence systems, many dee...
research
08/07/2019

Cryptanalyzing a Medical Privacy Protection Scheme based on DNA Coding and Chaos

Recently, a medical privacy protection scheme (MPPS) based on DNA encodi...
research
04/28/2023

faulTPM: Exposing AMD fTPMs' Deepest Secrets

Trusted Platform Modules constitute an integral building block of modern...
research
09/12/2021

CropDefender: deep watermark which is more convenient to train and more robust against cropping

Digital image watermarking, which is a technique for invisibly embedding...
research
09/19/2018

Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks

Existing distributed denial-of-service attack detection in software defi...

Please sign up or login with your details

Forgot password? Click here to reset