A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks

被引:0
作者
Sirichotedumrong, Warit [1 ]
Kiya, Hitoshi [1 ]
机构
[1] Tokyo Metropolitan Univ, Dept Comp Sci, Hino, Tokyo, Japan
来源
28TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2020) | 2021年
关键词
Deep neural network; generative adversarial network; privacy-preserving; visual protection; ENCRYPTION;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
We propose a novel image transformation scheme using generative adversarial networks (GANs) for privacypreserving deep neural networks (DNNs). The proposed scheme enables us not only to apply images without visual information to DNNs, but also to enhance robustness against ciphertext-only attacks (COAs) including DNN-based attacks. In this paper, the proposed transformation scheme is demonstrated to be able to protect visual information on plain images, and the visually-protected images are directly applied to DNNs for privacypreserving image classification. Since the proposed scheme utilizes GANs, there is no need to manage encryption keys. In an image classification experiment, we evaluate the effectiveness of the proposed scheme in terms of classification accuracy and robustness against COAs.
引用
收藏
页码:745 / 749
页数:5
相关论文
共 28 条
[1]  
Basu S., 2019, ARXIV E PRINTS
[2]   Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images [J].
Chuman, Tatsuya ;
Sirichotedumrong, Warit ;
Kiya, Hitoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1515-1525
[3]  
Coates A., 2011, JMLR WORKSHOP C P
[4]  
Donahue J, 2014, PR MACH LEARN RES, V32
[5]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[6]  
Gaata M., 2016, Int J Mod Trends Eng Res, V3, P213, DOI DOI 10.21884/IJMTER.2016.3068.YIAPY
[7]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[8]   Recompression of JPEG Crypto-Compressed Images Without a Key [J].
Itier, Vincent ;
Puteaux, Pauline ;
Puech, William .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (03) :646-660
[9]   Perceptual Losses for Real-Time Style Transfer and Super-Resolution [J].
Johnson, Justin ;
Alahi, Alexandre ;
Li Fei-Fei .
COMPUTER VISION - ECCV 2016, PT II, 2016, 9906 :694-711
[10]  
King DB, 2015, ACS SYM SER, V1214, P1, DOI 10.1021/bk-2015-1214.ch001