224 research outputs found
Block-Wise Encryption for Reliable Vision Transformer models
This article presents block-wise image encryption for the vision transformer
and its applications. Perceptual image encryption for deep learning enables us
not only to protect the visual information of plain images but to also embed
unique features controlled with a key into images and models. However, when
using conventional perceptual encryption methods, the performance of models is
degraded due to the influence of encryption. In this paper, we focus on
block-wise encryption for the vision transformer, and we introduce three
applications: privacy-preserving image classification, access control, and the
combined use of federated learning and encrypted images. Our scheme can have
the same performance as models without any encryption, and it does not require
any network modification. It also allows us to easily update the secret key. In
experiments, the effectiveness of the scheme is demonstrated in terms of
performance degradation and access control on the CIFAR10 and CIFAR-100
datasets.Comment: 7 figures, 3 tables. arXiv admin note: substantial text overlap with
arXiv:2207.0536
Visual Privacy Protection Based on Type-I Adversarial Attack
With the development of online artificial intelligence systems, many deep
neural networks (DNNs) have been deployed in cloud environments. In practical
applications, developers or users need to provide their private data to DNNs,
such as faces. However, data transmitted and stored in the cloud is insecure
and at risk of privacy leakage. In this work, inspired by Type-I adversarial
attack, we propose an adversarial attack-based method to protect visual privacy
of data. Specifically, the method encrypts the visual information of private
data while maintaining them correctly predicted by DNNs, without modifying the
model parameters. The empirical results on face recognition tasks show that the
proposed method can deeply hide the visual information in face images and
hardly affect the accuracy of the recognition models. In addition, we further
extend the method to classification tasks and also achieve state-of-the-art
performance
- …