[PDF][PDF] An overview of compressible and learnable image transformation with secret key and its applications

H Kiya, APM Maung, Y Kinoshita… - … on Signal and …, 2022 - nowpublishers.com
This article presents an overview of image transformation with a secret key and its
applications. Image transformation with a secret key enables us not only to protect visual …

The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

Block-wise image transformation with secret key for adversarially robust defense

MM AprilPyone, H Kiya - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In this paper, we propose a novel defensive transformation that enables us to maintain a
high classification accuracy under the use of both clean images and adversarial examples …

A gan-based image transformation scheme for privacy-preserving deep neural networks

W Sirichotedumrong, H Kiya - 2020 28th European Signal …, 2021 - ieeexplore.ieee.org
We propose a novel image transformation scheme using generative adversarial networks
(GANs) for privacy-preserving deep neural networks (DNNs). The proposed scheme …

Image to perturbation: An image transformation network for generating visually protected images for privacy-preserving deep neural networks

H Ito, Y Kinoshita, M Aprilpyone, H Kiya - IEEE Access, 2021 - ieeexplore.ieee.org
We propose a novel image transformation network for generating visually protected images
for privacy-preserving deep neural networks (DNNs). The proposed transformation network …

[HTML][HTML] Research on cloud data encryption algorithm based on bidirectional activation neural network

Z Man, J Li, X Di, R Zhang, X Li, X Sun - Information Sciences, 2023 - Elsevier
Recently, it has been found that cloud storage still has security risks, and research on the
security and privacy of user data and information is still in the early stage. This paper studies …

Privacy-preserving image classification using an isotropic network

MM AprilPyone, H Kiya - IEEE MultiMedia, 2022 - ieeexplore.ieee.org
In this article, we propose a privacy-preserving image classification method that uses
encrypted images and an isotropic network, such as the vision transformer. The proposed …

Privacy-preserving face recognition in the frequency domain

Y Wang, J Liu, M Luo, L Yang, L Wang - Proceedings of the AAAI …, 2022 - ojs.aaai.org
Some applications may require performing face recognition (FR) on third-party servers,
which could be accessed by attackers with malicious intents to compromise the privacy of …

Privacy-preserving deep learning with learnable image encryption on medical images

QX Huang, WL Yap, MY Chiu, HM Sun - IEEE Access, 2022 - ieeexplore.ieee.org
The need for cloud servers for training deep neural network (DNN) models is increasing as
more complex architecture designs of DNN models are developed. Nevertheless, cloud …

Privacy-preserving image classification using vision transformer

Z Qi, AP MaungMaung, Y Kinoshita… - 2022 30th European …, 2022 - ieeexplore.ieee.org
In this paper, we propose a privacy-preserving image classification method that is based on
the combined use of encrypted images and the vision transformer (ViT). The proposed …