Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services

被引:0
作者
Chi, Po-Wen [1 ]
Hsiao, Pin-Hsin [1 ]
机构
[1] Natl Taiwan Normal Univ, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019) | 2019年
关键词
Learnable Encryption; Audio Encryption; Machine Learning;
D O I
10.1109/AsiaJCIS.2019.00029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Applying machine learning to problems has become an avoidable trend. With the help of machine learning techniques, people can make predictions more accurately and can get more benefits. However, the machine learning technique relies on training from lots of data. That is, data should be open to the machine learning service provider. Considering the user privacy issue, the release of user data is not acceptable. In this paper, we propose an approach to take care both the machine learning feature and the data privacy. We focus on audio data and propose an audio encryption technique to keep audio data credential. In the meantime, we make the encrypted audio be able to be trained though machine learning service providers.
引用
收藏
页码:151 / 156
页数:6
相关论文
共 25 条
  • [1] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [2] [Anonymous], 2004, IACR Cryptol.ePrint Arch.
  • [3] Boneh D., 2010, 2010543 CRYPT EPR AR
  • [4] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
  • [5] Chabanne H., 2017, IACR Cryptol. ePrint Arch, V2017, P35
  • [6] Encrypted Image Feature Extraction By Privacy-Preserving MFS
    Chen, Guoming
    Chen, Qiang
    Zhu, Xiongyong
    Chen, Yiqun
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME (ICDH 2018), 2018, : 42 - 45
  • [7] Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images
    Chuman, Tatsuya
    Sirichotedumrong, Warit
    Kiya, Hitoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1515 - 1525
  • [8] Dowlin N, 2016, PR MACH LEARN RES, V48
  • [9] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [10] Ghasemzadeh H., 2017, CORRABS170105601, V1701