Skip to main content

Showing 1–12 of 12 results for author: AprilPyone, M

Searching in archive cs. Search in all archives.
.
  1. Image and Model Transformation with Secret Key for Vision Transformer

    Authors: Hitoshi Kiya, Ryota Iijima, MaungMaung Aprilpyone, Yuma Kinoshita

    Abstract: In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key. We show for the first time that models trained with plain images can be directly transformed to models trained with encrypted images on the basis of the ViT architecture, and the performance of the transformed models is the same as models trained with plain images when… ▽ More

    Submitted 20 July, 2022; v1 submitted 12 July, 2022; originally announced July 2022.

    Comments: 10 pages, 5 figures

  2. arXiv:2202.02503  [pdf, ps, other

    cs.CV cs.LG

    Adversarial Detector with Robust Classifier

    Authors: Takayuki Osakabe, Maungmaung Aprilpyone, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural network (DNN) models are wellknown to easily misclassify prediction results by using input images with small perturbations, called adversarial examples. In this paper, we propose a novel adversarial detector, which consists of a robust classifier and a plain one, to highly detect adversarial examples. The proposed adversarial detector is carried out in accordance with the logits of pla… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

  3. arXiv:2109.01332  [pdf, other

    cs.CV cs.LG

    Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

    Authors: Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: In this paper, we propose an access control method that uses the spatially invariant permutation of feature maps with a secret key for protecting semantic segmentation models. Segmentation models are trained and tested by permuting selected feature maps with a secret key. The proposed method allows rightful users with the correct key not only to access a model to full capacity but also to degrade… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

    Comments: To appear in 13th Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC 2021)

  4. arXiv:2109.00224  [pdf, other

    cs.CV

    A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: In this paper, we propose a model protection method for convolutional neural networks (CNNs) with a secret key so that authorized users get a high classification accuracy, and unauthorized users get a low classification accuracy. The proposed method applies a block-wise transformation with a secret key to feature maps in the network. Conventional key-based model protection methods cannot maintain… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: To appear in APSIPA 2021. arXiv admin note: text overlap with arXiv:2105.14756

  5. arXiv:2107.09362  [pdf, other

    eess.IV cs.CV cs.LG

    Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

    Authors: Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: Since production-level trained deep neural networks (DNNs) are of a great business value, protecting such DNN models against copyright infringement and unauthorized access is in a rising demand. However, conventional model protection methods focused only the image classification task, and these protection methods were never applied to semantic segmentation although it has an increasing number of a… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: To appear in 2021 International Workshop on Smart Info-Media Systems in Asia (SISA 2021)

  6. arXiv:2104.04241  [pdf, other

    cs.CV cs.CR eess.IV

    Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: In this paper, we propose a novel DNN watermarking method that utilizes a learnable image transformation method with a secret key. The proposed method embeds a watermark pattern in a model by using learnable transformed images and allows us to remotely verify the ownership of the model. As a result, it is piracy-resistant, so the original watermark cannot be overwritten by a pirated watermark, and… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

  7. arXiv:2103.03525  [pdf, other

    cs.LG

    Transfer Learning-Based Model Protection With Secret Key

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: We propose a novel method for protecting trained models with a secret key so that unauthorized users without the correct key cannot get the correct inference. By taking advantage of transfer learning, the proposed method enables us to train a large protected model like a model trained with ImageNet by using a small subset of a training dataset. It utilizes a learnable encryption step with a secret… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

    Comments: Under review

  8. arXiv:2011.07697  [pdf, other

    cs.CV

    Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: We propose a voting ensemble of models trained by using block-wise transformed images with secret keys for an adversarially robust defense. Key-based adversarial defenses were demonstrated to outperform state-of-the-art defenses against gradient-based (white-box) attacks. However, the key-based defenses are not effective enough against gradient-free (black-box) attacks without requiring any secret… ▽ More

    Submitted 15 November, 2020; originally announced November 2020.

    Comments: Under review

  9. arXiv:2010.00801  [pdf, other

    cs.CV cs.CR

    Block-wise Image Transformation with Secret Key for Adversarially Robust Defense

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: In this paper, we propose a novel defensive transformation that enables us to maintain a high classification accuracy under the use of both clean images and adversarial examples for adversarially robust defense. The proposed transformation is a block-wise preprocessing technique with a secret key to input images. We developed three algorithms to realize the proposed transformation: Pixel Shuffling… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: Under review

  10. arXiv:2008.02450  [pdf, other

    cs.LG cs.CR stat.ML

    Training DNN Model with Secret Key for Model Protection

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: In this paper, we propose a model protection method by using block-wise pixel shuffling with a secret key as a preprocessing technique to input images for the first time. The protected model is built by training with such preprocessed images. Experiment results show that the performance of the protected model is close to that of non-protected models when the key is correct, while the accuracy is s… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: to appear in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE 2020)

  11. arXiv:2005.07998  [pdf, other

    cs.LG cs.CR stat.ML

    Encryption Inspired Adversarial Defense for Visual Classification

    Authors: MaungMaung AprilPyone, Hitoshi Kiya

    Abstract: Conventional adversarial defenses reduce classification accuracy whether or not a model is under attacks. Moreover, most of image processing based defenses are defeated due to the problem of obfuscated gradients. In this paper, we propose a new adversarial defense which is a defensive transform for both training and test images inspired by perceptual image encryption methods. The proposed method u… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

    Comments: To be appeared on 27th IEEE International Conference on Image Processing (ICIP 2020)

  12. arXiv:1907.13342  [pdf, ps, other

    eess.IV cs.CV

    Adversarial Test on Learnable Image Encryption

    Authors: MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya

    Abstract: Data for deep learning should be protected for privacy preserving. Researchers have come up with the notion of learnable image encryption to satisfy the requirement. However, existing privacy preserving approaches have never considered the threat of adversarial attacks. In this paper, we ran an adversarial test on learnable image encryption in five different scenarios. The results show different b… ▽ More

    Submitted 31 July, 2019; originally announced July 2019.

    Comments: To be appeared in 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE 2019)