SIA-GAN: Scrambling Inversion Attack Using Generative Adversarial Network

被引:13
作者
Madono, Koki [1 ,2 ]
Tanaka, Masayuki [2 ,3 ]
Onishi, Masaki [2 ]
Ogawa, Tetsuji [1 ,2 ]
机构
[1] Waseda Univ, Dept Commun & Comp Engn, Tokyo 1698050, Japan
[2] Natl Inst Adv Ind Sci & Technol, Artificial Intelligence Res Ctr, Tokyo 1350064, Japan
[3] Tokyo Inst Technol, Sch Engn, Dept Syst & Control Engn, Tokyo 1528550, Japan
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Training; Feature extraction; Visualization; Generators; Generative adversarial networks; Transforms; Machine learning; Artificial intelligence; machine learning; computer vision; visual information hiding; image scrambling; IMAGE ENCRYPTION; SECURITY; SYSTEMS;
D O I
10.1109/ACCESS.2021.3112684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a scrambling inversion attack using a generative adversarial network (SIA-GAN). This method aims to evaluate the privacy protection level achieved by image scrambling method. For privacy-preserving machine learning, scrambled images are often used to protect visual information, assuming that searching the scramble parameters is highly difficult for an attacker due to the application of complex image scrambling operations. However, the security of such methods has not been thoroughly investigated. SIA-GAN learns the mapping between pairs of scrambled images and original images, then attempts to invert image scrambling. Therefore, the attacker is assumed to have real images whose domain is the same as that of scrambled images. Experimental results demonstrate that scrambled images cannot be recovered if block shuffling is applied as a scrambling operation. The experimental code of SIA-GAN is available at https://github.com/MADONOKOUKI/SIA-GAN.
引用
收藏
页码:129385 / 129393
页数:9
相关论文
共 25 条
[1]   Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [J].
Chuman, Tatsuya ;
Sirichotedumrong, Warit ;
Kiya, Hitoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1515-1525
[2]   On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks [J].
Chuman, Tatsuya ;
Kurihara, Kenta ;
Kiya, Hitoshi .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (01) :37-44
[3]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[4]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[5]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[6]   On the Security of Permutation-Only Image Encryption Schemes [J].
Jolfaei, Alireza ;
Wu, Xin-Wen ;
Muthukkumarasamy, Vallipuram .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :235-246
[7]   Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion [J].
Li, Ming ;
Lu, Dandan ;
Xiang, Yong ;
Zhang, Yushu ;
Ren, Hua .
NONLINEAR DYNAMICS, 2019, 96 (01) :31-47
[8]  
Lou Q., ARXIV191107101
[9]  
Lowe D. G., 1999, P INT C COMP VIS, V2, P1150, DOI [10.1109/ICCV.1999.790410, DOI 10.1109/ICCV.1999.790410]
[10]  
Madono K., 2020, ARTIF INTELL