Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks

被引:1
作者
Kou, Xiaoyu [1 ]
Wang, Fengwei [1 ,2 ]
Zhu, Hui [1 ]
Zheng, Yandong [1 ]
Yang, Xiaopeng [2 ]
Liu, Zhe [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
[2] Acad Network & Commun CETC, Sci & Technol Commun Networks Lab, Shijiazhuang 050081, Hebei, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[4] Zhejiang Lab, Hangzhou 311100, Zhejiang, Peoples R China
关键词
Privacy-Preserving; Image Dataset; CNN; Image Mask; Image Privacy; THEN-COMPRESSION SYSTEM; SUPPORT VECTOR MACHINE; ENCRYPTION;
D O I
10.1007/s12083-024-01718-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of the internet and advancements in computing and data storage technologies, large amounts of data can be collected and analyzed to explore hidden knowledge and patterns in various areas. Among different data types, images have become an increasingly important information carrier, especially in computer vision research. However, the image data often contains valuable sensitive information of users, such as personal identifiers and biometric information. During the transmission process, once adversaries obtain the image data, it may lead to severe consequences. To solve the image data leakage problem, a lot of image privacy-preserving schemes are proposed. Nevertheless, in most existing schemes, the utility of an image will also be broken while ensuring data privacy. Meanwhile, how to balance privacy and utility is always a nerve-wracking challenge in image privacy protection. In this paper, we focus on designing a privacy-preserving scheme that protects the visual content of an image while retaining its availability for convolutional neural networks (CNN) training and prediction. Specifically, we first use the edge detection technique to discover original image features. Then, we carefully design a noise generation method in which the generated noises can guarantee distance-based indistinguishability while minimally affecting image features. Therefore, with the proposed scheme, the visual content of an image can be protected, and it can still be used for CNN training and prediction. Moreover, we empirically evaluate our proposed scheme with various evaluation criteria. The results demonstrate that the visual content of an image is indeed protected while the accuracy of the trained CNN model is available.
引用
收藏
页码:2523 / 2537
页数:15
相关论文
共 34 条
[1]  
Beugnon S, 2019, IEEE IMAGE PROC, P679, DOI [10.1109/ICIP.2019.8803836, 10.1109/icip.2019.8803836]
[2]   Privacy Preserving Face Recognition Utilizing Differential Privacy [J].
Chamikara, M. A. P. ;
Bertok, P. ;
Khalil, I. ;
Liu, D. ;
Camtepe, S. .
COMPUTERS & SECURITY, 2020, 97
[3]   Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [J].
Chuman, Tatsuya ;
Sirichotedumrong, Warit ;
Kiya, Hitoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1515-1525
[4]  
Duggineni S., 2023, Science and Technology, V3, P29, DOI [10.5923/j.scit.20231302.04, DOI 10.5923/J.SCIT.20231302.04]
[5]   PRACTICAL IMAGE OBFUSCATION WITH PROVABLE PRIVACY [J].
Fan, Liyue .
2019 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2019, :784-789
[6]   Image Pixelization with Differential Privacy [J].
Fan, Liyue .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 :148-162
[7]   Privacy-Preserving Content-Based Image Retrieval in the Cloud [J].
Ferreira, Bernardo ;
Rodrigues, Joao ;
Leitao, Joao ;
Domingos, Henrique .
2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, :11-20
[8]  
Gaata M., 2016, Int J Mod Trends Eng Res, V3, P213, DOI DOI 10.21884/IJMTER.2016.3068.YIAPY
[9]   Recompression of JPEG Crypto-Compressed Images Without a Key [J].
Itier, Vincent ;
Puteaux, Pauline ;
Puech, William .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (03) :646-660
[10]   Image to Perturbation: An Image Transformation Network for Generating Visually Protected Images for Privacy-Preserving Deep Neural Networks [J].
Ito, Hiroki ;
Kinoshita, Yuma ;
Aprilpyone, Maungmaung ;
Kiya, Hitoshi .
IEEE ACCESS, 2021, 9 :64629-64638