2023
DOI: 10.1587/transinf.2022mui0001
|View full text |Cite
|
Sign up to set email alerts
|

Image and Model Transformation with Secret Key for Vision Transformer

Abstract: In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key. We show for the first time that models trained with plain images can be directly transformed to models trained with encrypted images on the basis of the ViT architecture, and the performance of the transformed models is the same as models trained with plain images when using test images encrypted with the key. In addition, the proposed scheme does not require any specially prepared … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 49 publications
(40 reference statements)
0
10
0
Order By: Relevance
“…Another approach for protecting copyright and privacy information in test images is to conceal the visual information. Image encryption is a typical technique for concealing visual information, and image-encryption methods have been actively studied to train encrypted images using deep neural networks [ 3 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]. The method in [ 3 ] combines federated learning with image encryption for test images.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Another approach for protecting copyright and privacy information in test images is to conceal the visual information. Image encryption is a typical technique for concealing visual information, and image-encryption methods have been actively studied to train encrypted images using deep neural networks [ 3 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]. The method in [ 3 ] combines federated learning with image encryption for test images.…”
Section: Introductionmentioning
confidence: 99%
“…Encrypted image classification via a cloud server assumes that a user encrypts test images and transmits the encrypted images to a server. Thus, it is desirable to be able to compress the encrypted images in terms of the transmission efficiency; however, most such methods [ 3 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 ] do not consider image compression. Aprilpyone et al employed the encryption-then-compression (EtC) system [ 18 ] as an image encryption algorithm so that the encrypted images (hereafter, EtC images) possess a high compression performance [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, data privacy such as personal medical records, may be compromised in that process, because a third party can access the uploaded data illegally, so it is necessary to protect data privacy in cloud environments, and privacy-preserving methods for deep learning have become an urgent challange [2]. One of the most efficient solutions is to encrypt data before the data uploading, so that data owners can train and then test their DNNs in a cloud server with the encrypted data directly [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%