International Workshop on Advanced Imaging Technology (IWAIT) 2020 2020
DOI: 10.1117/12.2566272
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving machine learning using EtC images

Abstract: We propose a privacy-preserving machine learning scheme with encryption-then-compression (EtC) images, where EtC images are images encrypted by using a block-based encryption method proposed for EtC systems with JPEG compression. In this paper, a novel property of EtC images is first discussed, although EtC ones was already shown to be compressible as a property. The novel property allows us to directly apply EtC images to machine learning algorithms non-specialized for computing encrypted data. In addition, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Kawamura et al (2019) proposed a privacy-conserving ML system with encryption-then-compression (EtC) images. A new property enables us to adapt EtC images without any degradation in classification quality to some ML algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Kawamura et al (2019) proposed a privacy-conserving ML system with encryption-then-compression (EtC) images. A new property enables us to adapt EtC images without any degradation in classification quality to some ML algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Ergun et al [12] proposed a Privacy Preserved Face Recognition (PPFR) framework, which encrypted the plaintext by random cryptographic keys based on the continuous chaotic system [22] and directly recognized the encrypted data. Block-based encryption methods were popular in this area, such as Combined Cat Map (CCM) [23] based on hybrid chaotic maps and dynamic random growth technique, encryption method of histograms of oriented gradients (HOG) features [24], and Encryption-then-Compression (EtC) framework [25]. Moreover, Chuman et al [26] presented a block scrambling-based encryption scheme to enhance the security of EtC framework with JPEG compression.…”
Section: A Visual Information Hidingmentioning
confidence: 99%
“…3) Comparison with Others: To evaluate the effectiveness, we compare the proposed MIAIS framework with some other visual information hiding methods on AFD datasets. Take the face recognition result on secret image as upper bound, the competing methods include Combined Cat Map (CCM) [23], Learnable Encryption (LE) [27], PBIE [29], Encryption-Then-Compression (EtC) [25], Extended Learnable Encryption (ELE) [13], EM-HOG [24], Defeating Image Obfuscation (DIO) [30], Privacy Preserving Face Recognition (PPFR) [12] and a naive Block-Wise pixel Shuffle (BWS). BWS only naively shuffles the 4 × 4 pixel blocks without consideration for privacy protection.…”
Section: ) Ablation Studymentioning
confidence: 99%
“…Therefore, encrypted images can be directly applied to image processing algorithms. Some encryption methods have been studied for applying encrypted images to traditional machine learning algorithms, such as support vector machine (SVM), under the use of the kernel trick [21], [22], but they cannot be applied to DNNs [15]. There are four perceptual encryption methods [10], [14]- [16] for privacy-preserving DNNs.…”
Section: Related Work a Visual Information Protectionmentioning
confidence: 99%