Skip to main content

Showing 1–50 of 114 results for author: Kiya, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.19839  [pdf, other

    cs.CV eess.IV

    Scene-Segmentation-Based Exposure Compensation for Tone Mapping of High Dynamic Range Scenes

    Authors: Yuma Kinoshita, Hitoshi Kiya

    Abstract: We propose a novel scene-segmentation-based exposure compensation method for multi-exposure image fusion (MEF) based tone mapping. The aim of MEF-based tone mapping is to display high dynamic range (HDR) images on devices with limited dynamic range. To achieve this, this method generates a stack of differently exposed images from an input HDR image and fuses them into a single image. Our approach… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

    Comments: to be presented in APSIPA ASC 2024

  2. arXiv:2410.06522  [pdf, other

    cs.CR

    On the Security of Bitstream-level JPEG Encryption with Restart Markers

    Authors: Mare Hirose, Shoko Imaizumi, Hitoshi Kiya

    Abstract: This paper aims to evaluate the security of a bitstream-level JPEG encryption method using restart (RST) markers, where encrypted image can keep the JPEG file format with the same file size as non-encrypted image. Data encrypted using this method can be decoded without altering header information by employing a standard JPEG decoder. Moreover, the use of RST markers enables the definition of exten… ▽ More

    Submitted 8 October, 2024; originally announced October 2024.

    Comments: 6 pages, 11 figures

  3. arXiv:2409.19988  [pdf, other

    cs.CR

    Enhancing Security Using Random Binary Weights in Privacy-Preserving Federated Learning

    Authors: Hiroto Sawada, Shoko Imaizumi, Hitoshi Kiya

    Abstract: In this paper, we propose a novel method for enhancing security in privacy-preserving federated learning using the Vision Transformer. In federated learning, learning is performed by collecting updated information without collecting raw data from each client. However, the problem is that this raw data may be inferred from the updated information. Conventional data-guessing countermeasures (securit… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

    Comments: 6pages, 17figures

  4. arXiv:2408.08529  [pdf, other

    cs.CV

    Privacy-Preserving Vision Transformer Using Images Encrypted with Restricted Random Permutation Matrices

    Authors: Kouki Horio, Kiyoshi Nishikawa, Hitoshi Kiya

    Abstract: We propose a novel method for privacy-preserving fine-tuning vision transformers (ViTs) with encrypted images. Conventional methods using encrypted images degrade model performance compared with that of using plain images due to the influence of image encryption. In contrast, the proposed encryption method using restricted random permutation matrices can provide a higher performance than the conve… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

    Comments: 4 pages, 9 figures

  5. arXiv:2408.05737  [pdf, other

    cs.CR

    Disposable-key-based image encryption for collaborative learning of Vision Transformer

    Authors: Rei Aso, Sayaka Shiota, Hitoshi Kiya

    Abstract: We propose a novel method for securely training the vision transformer (ViT) with sensitive data shared from multiple clients similar to privacy-preserving federated learning. In the proposed method, training images are independently encrypted by each client where encryption keys can be prepared by each client, and ViT is trained by using these encrypted images for the first time. The method allow… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

  6. arXiv:2408.03897  [pdf, other

    eess.AS cs.CR cs.SD

    Speech privacy-preserving methods using secret key for convolutional neural network models and their robustness evaluation

    Authors: Shoko Niwa, Sayaka Shiota, Hitoshi Kiya

    Abstract: In this paper, we propose privacy-preserving methods with a secret key for convolutional neural network (CNN)-based models in speech processing tasks. In environments where untrusted third parties, like cloud servers, provide CNN-based systems, ensuring the privacy of speech queries becomes essential. This paper proposes encryption methods for speech queries using secret keys and a model structure… ▽ More

    Submitted 7 August, 2024; originally announced August 2024.

  7. arXiv:2402.08200  [pdf, other

    cs.CV

    Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation

    Authors: AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen

    Abstract: We propose a method for generating spurious features by leveraging large-scale text-to-image diffusion models. Although the previous work detects spurious features in a large-scale dataset like ImageNet and introduces Spurious ImageNet, we found that not all spurious images are spurious across different classifiers. Although spurious images help measure the reliance of a classifier, filtering many… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  8. arXiv:2402.07183  [pdf, other

    cs.AI

    A Random Ensemble of Encrypted Vision Transformers for Adversarially Robust Defense

    Authors: Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In previous studies, the use of models encrypted with a secret key was demonstrated to be robust against white-box attacks, but not against black-box ones. In this paper, we propose a novel method using the vision transformer (ViT) that is a random ensemble of encrypted models for enhancing robustness agains… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: 9 pages

  9. arXiv:2401.05126  [pdf, other

    cs.CV cs.LG

    Efficient Fine-Tuning with Domain Adaptation for Privacy-Preserving Vision Transformer

    Authors: Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

    Abstract: We propose a novel method for privacy-preserving deep neural networks (DNNs) with the Vision Transformer (ViT). The method allows us not only to train models and test with visually protected images but to also avoid the performance degradation caused from the use of encrypted images, whereas conventional methods cannot avoid the influence of image encryption. A domain adaptation method is used to… ▽ More

    Submitted 9 February, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

    Comments: Accepted by APSIPA Transactions on Signal and Information Processing. arXiv admin note: substantial text overlap with arXiv:2309.02556

  10. arXiv:2401.02633  [pdf, ps, other

    cs.CR cs.CV

    A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

    Authors: Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, which means AEs generated for a source model can fool another black-box model (target model) with a non-trivial probability. In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferab… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: 4 pages

  11. arXiv:2311.16577  [pdf, other

    cs.CV

    Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model

    Authors: AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

    Abstract: In this paper, we propose key-based defense model proliferation by leveraging pre-trained models and utilizing recent efficient fine-tuning techniques on ImageNet-1k classification. First, we stress that deploying key-based models on edge devices is feasible with the latest model deployment advancements, such as Apple CoreML, although the mainstream enterprise edge artificial intelligence (Edge AI… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  12. arXiv:2310.01983  [pdf, other

    cs.DM cs.CC cs.GT

    Turning Tiles is PSPACE-complete

    Authors: Kanae Yoshiwatari, Hironori Kiya, Koki Suetsugu, Tesshu Hanaka, Hirotaka Ono

    Abstract: In combinatorial game theory, the winning player for a position in normal play is analyzed and characterized via algebraic operations. Such analyses define a value for each position, called a game value. A game (ruleset) is called universal if any game value is achievable in some position in a play of the game. Although the universality of a game implies that the ruleset is rich enough (i.e., suff… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: 6 pages, 10 figures

    ACM Class: G.2.0

  13. arXiv:2309.02556  [pdf, other

    cs.CV cs.CR cs.LG

    Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

    Authors: Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

    Abstract: In recent years, deep neural networks (DNNs) trained with transformed data have been applied to various applications such as privacy-preserving learning, access control, and adversarial defenses. However, the use of transformed data decreases the performance of models. Accordingly, in this paper, we propose a novel method for fine-tuning models with transformed images under the use of the vision t… ▽ More

    Submitted 6 September, 2023; v1 submitted 5 September, 2023; originally announced September 2023.

    Comments: Accepted by APSIPA 2023

  14. arXiv:2309.01620  [pdf, other

    cs.CV

    Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings

    Authors: AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

    Abstract: In this paper, we propose a new key-based defense focusing on both efficiency and robustness. Although the previous key-based defense seems effective in defending against adversarial examples, carefully designed adaptive attacks can bypass the previous defense, and it is difficult to train the previous defense on large datasets like ImageNet. We build upon the previous defense with two major impro… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

    Comments: To appear in APSIPA ASC 2023

  15. arXiv:2308.07612  [pdf, other

    cs.CR

    Block-Wise Encryption for Reliable Vision Transformer models

    Authors: Hitoshi Kiya, Ryota Iijima, Teru Nagamori

    Abstract: This article presents block-wise image encryption for the vision transformer and its applications. Perceptual image encryption for deep learning enables us not only to protect the visual information of plain images but to also embed unique features controlled with a key into images and models. However, when using conventional perceptual encryption methods, the performance of models is degraded due… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: 7 figures, 3 tables. arXiv admin note: substantial text overlap with arXiv:2207.05366

  16. arXiv:2308.02227  [pdf, ps, other

    cs.CR

    Security Evaluation of Compressible and Learnable Image Encryption Against Jigsaw Puzzle Solver Attacks

    Authors: Tatsuya Chuman, Nobutaka Ono, Hitoshi Kiya

    Abstract: Several learnable image encryption schemes have been developed for privacy-preserving image classification. This paper focuses on the security block-based image encryption methods that are learnable and JPEG-friendly. Permuting divided blocks in an image is known to enhance robustness against ciphertext-only attacks (COAs), but recently jigsaw puzzle solver attacks have been demonstrated to be abl… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: To be appeared in 2023 IEEE 12th Global Conference on Consumer Electronics (GCCE 2023)

  17. arXiv:2308.00271  [pdf, other

    cs.CR

    Enhanced Security with Encrypted Vision Transformer in Federated Learning

    Authors: Rei Aso, Sayaka Shiota, Hitoshi Kiya

    Abstract: Federated learning is a learning method for training models over multiple participants without directly sharing their raw data, and it has been expected to be a privacy protection method for training data. In contrast, attack methods have been studied to restore learning data from model information shared with clients, so enhanced security against attacks has become an urgent problem. Accordingly,… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  18. arXiv:2307.13985  [pdf, other

    cs.CR cs.CV

    Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

    Authors: Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, which means AEs generated for a source model can fool another black-box model (target model) with a non-trivial probability. In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferab… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: 4 pages, 3 figures

  19. arXiv:2303.05036  [pdf, other

    cs.CV cs.CR

    Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a novel generative model-based attack on learnable image encryption methods proposed for privacy-preserving deep learning. Various learnable encryption methods have been studied to protect the sensitive visual information of plain images, and some of them have been investigated to be robust enough against all existing attacks. However, previous attacks on image encryption… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2209.07953

  20. arXiv:2301.09255  [pdf, other

    cs.CV cs.CR cs.LG

    Combined Use of Federated Learning and Image Encryption for Privacy-Preserving Image Classification with Vision Transformer

    Authors: Teru Nagamori, Hitoshi Kiya

    Abstract: In recent years, privacy-preserving methods for deep learning have become an urgent problem. Accordingly, we propose the combined use of federated learning (FL) and encrypted images for privacy-preserving image classification under the use of the vision transformer (ViT). The proposed method allows us not only to train models over multiple participants without directly sharing their raw data but t… ▽ More

    Submitted 3 March, 2023; v1 submitted 22 January, 2023; originally announced January 2023.

  21. arXiv:2301.04875  [pdf, other

    cs.CR cs.CV

    Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks

    Authors: Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In recent years, with the development of cloud computing platforms, privacy-preserving methods for deep learning have become an urgent problem. NeuraCrypt is a private random neural network for privacy-preserving that allows data owners to encrypt the medical data before the data uploading, and data owners can train and then test their models in a cloud server with the encrypted data directly. How… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

  22. arXiv:2301.03843  [pdf, other

    cs.CV

    A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models

    Authors: Rei Aso, Tatsuya Chuman, Hitoshi Kiya

    Abstract: In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models. To protect the visual information of test images, a test image is divided into blocks, and then every block is encrypted by using a random orthogonal matrix. Moreover, a ConvMixer model trained with plain images is transformed by the random orthogonal matrix used for encrypting test image… ▽ More

    Submitted 17 January, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: To appear in 2023 RISP International Workshop on Nonlinear Circuits, Communications and Signal Processing

  23. arXiv:2211.05307  [pdf, other

    cs.DS cs.DM cs.GT

    Winner Determination Algorithms for Graph Games with Matching Structures

    Authors: Tesshu Hanaka, Hironori Kiya, Hirotaka Ono, Kanae Yoshiwatari

    Abstract: Cram, Domineering, and Arc Kayles are well-studied combinatorial games. They are interpreted as edge-selecting-type games on graphs, and the selected edges during a game form a matching. In this paper, we define a generalized game called Colored Arc Kayles, which includes these games. Colored Arc Kayles is played on a graph whose edges are colored in black, white, or gray, and black (resp., white)… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: 13 pages, 5 figures

  24. arXiv:2211.02369  [pdf, ps, other

    cs.CR

    A Jigsaw Puzzle Solver-based Attack on Block-wise Image Encryption for Privacy-preserving DNNs

    Authors: Tatsuya Chuman, Hitoshi Kiya

    Abstract: Privacy-preserving deep neural networks (DNNs) have been proposed for protecting data privacy in the cloud server. Although several encryption schemes for visually protection have been proposed for privacy-preserving DNNs, several attacks enable to restore visual information from encrypted images. On the other hand, it has been confirmed that the block-wise image encryption scheme which utilizes b… ▽ More

    Submitted 10 November, 2022; v1 submitted 4 November, 2022; originally announced November 2022.

    Comments: To be appeared in IWAIT2023

  25. arXiv:2210.02835  [pdf, other

    cs.DS

    Sequentially Swapping Tokens: Further on Graph Classes

    Authors: Hironori Kiya, Yuto Okada, Hirotaka Ono, Yota Otachi

    Abstract: We study the following variant of the 15 puzzle. Given a graph and two token placements on the vertices, we want to find a walk of the minimum length (if any exists) such that the sequence of token swappings along the walk obtains one of the given token placements from the other one. This problem was introduced as Sequential Token Swapping by Yamanaka et al. [JGAA 2019], who showed that the proble… ▽ More

    Submitted 9 March, 2023; v1 submitted 6 October, 2022; originally announced October 2022.

    Comments: 24 pages, 15 figures, SOFSEM 2023

  26. Access Control with Encrypted Feature Maps for Object Detection Models

    Authors: Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose an access control method with a secret key for object detection models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models. The method enables us not only to provide a high detection performance to authorized users but to also degrade the performance for unauthorized users. The use of transformed images… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2206.05422

  27. arXiv:2209.08724  [pdf, other

    cs.LG

    On the Adversarial Transferability of ConvMixer Models

    Authors: Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, which means AEs generated for a source model can fool another black-box model (target model) with a non-trivial probability. In this paper, we investigate the property of adversarial transferability between models including ConvMixer, which is an isotropic n… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

    Comments: 5 pages, 5 figures, 5 tables. arXiv admin note: substantial text overlap with arXiv:2209.02997

  28. arXiv:2209.07953  [pdf, other

    cs.CV

    StyleGAN Encoder-Based Attack for Block Scrambled Face Images

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose an attack method to block scrambled face images, particularly Encryption-then-Compression (EtC) applied images by utilizing the existing powerful StyleGAN encoder and decoder for the first time. Instead of reconstructing identical images as plain ones from encrypted images, we focus on recovering styles that can reveal identifiable information from the encrypted images. T… ▽ More

    Submitted 16 September, 2022; originally announced September 2022.

    Comments: To appear in APSIPA ASC 2022

  29. arXiv:2209.02997  [pdf, other

    cs.CV

    On the Transferability of Adversarial Examples between Encrypted Models

    Authors: Miki Tanaka, Isao Echizen, Hitoshi Kiya

    Abstract: Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs). In addition, AEs have adversarial transferability, namely, AEs generated for a source model fool other (target) models. In this paper, we investigate the transferability of models encrypted for adversarially robust defense for the first time. To objectively verify the property of transferability, the robustn… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: to be appear in ISPACS 2022

  30. arXiv:2208.13135  [pdf, other

    cs.CV cs.CR cs.LG

    An Access Control Method with Secret Key for Semantic Segmentation Models

    Authors: Teru Nagamori, Ryota Iijima, Hitoshi Kiya

    Abstract: A novel method for access control with a secret key is proposed to protect models from unauthorized access in this paper. We focus on semantic segmentation models with the vision transformer (ViT), called segmentation transformer (SETR). Most existing access control methods focus on image classification tasks, or they are limited to CNNs. By using a patch embedding structure that ViT has, trained… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

    Comments: To appear in the International Conference on Machine Learning and Cybernetics 2022 (ICMLC 2022)

  31. arXiv:2208.05198  [pdf, other

    cs.CV

    A Detection Method of Temporally Operated Videos Using Robust Hashing

    Authors: Shoko Niwa, Miki Tanaka, Hitoshi Kiya

    Abstract: SNS providers are known to carry out the recompression and resizing of uploaded videos/images, but most conventional methods for detecting tampered videos/images are not robust enough against such operations. In addition, videos are temporally operated such as the insertion of new frames and the permutation of frames, of which operations are difficult to be detected by using conventional methods.… ▽ More

    Submitted 11 August, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: To appear in 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE 2022)

  32. arXiv:2208.02556  [pdf, other

    cs.CV cs.CR

    Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix

    Authors: Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image classification method using encrypted images under the use of the ConvMixer structure. Block-wise scrambled images, which are robust enough against various attacks, have been used for privacy-preserving image classification tasks, but the combined use of a classification network and an adaptation network is needed to reduce the influence of imag… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2205.12041

  33. arXiv:2208.02035  [pdf, other

    cs.CV

    Template matching with white balance adjustment under multiple illuminants

    Authors: Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya

    Abstract: In this paper, we propose a novel template matching method with a white balancing adjustment, called N-white balancing, which was proposed for multi-illuminant scenes. To reduce the influence of lighting effects, N-white balancing is applied to images for multi-illumination color constancy, and then a template matching method is carried out by using adjusted images. In experiments, the effectivene… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: \c{opyright} 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  34. arXiv:2207.11939  [pdf, other

    cs.CR cs.CV

    An Encryption Method of ConvMixer Models without Performance Degradation

    Authors: Ryota Iijima, Hitoshi Kiya

    Abstract: In this paper, we propose an encryption method for ConvMixer models with a secret key. Encryption methods for DNN models have been studied to achieve adversarial defense, model protection and privacy-preserving image classification. However, the use of conventional encryption methods degrades the performance of models compared with that of plain models. Accordingly, we propose a novel method for e… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: 6 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:2207.05366

  35. arXiv:2207.08109  [pdf, ps, other

    cs.CR

    Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks

    Authors: Tatsuya Chuman, Hitoshi Kiya

    Abstract: The security of learnable image encryption schemes for image classification using deep neural networks against several attacks has been discussed. On the other hand, block scrambling image encryption using the vision transformer has been proposed, which applies to lossless compression methods such as JPEG standard by dividing an image into permuted blocks. Although robustness of the block scrambli… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: To be appeared in International Conference on Machine Learning and Cybernetics 2022

  36. Image and Model Transformation with Secret Key for Vision Transformer

    Authors: Hitoshi Kiya, Ryota Iijima, MaungMaung Aprilpyone, Yuma Kinoshita

    Abstract: In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key. We show for the first time that models trained with plain images can be directly transformed to models trained with encrypted images on the basis of the ViT architecture, and the performance of the transformed models is the same as models trained with plain images when… ▽ More

    Submitted 20 July, 2022; v1 submitted 12 July, 2022; originally announced July 2022.

    Comments: 10 pages, 5 figures

  37. arXiv:2206.05422  [pdf, other

    cs.CV eess.IV

    Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

    Authors: Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya

    Abstract: In this paper, we propose an access control method with a secret key for semantic segmentation models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models. The method enables us not only to provide a high segmentation performance to authorized users but to also degrade the performance for unauthorized users. We first point out tha… ▽ More

    Submitted 11 June, 2022; originally announced June 2022.

  38. arXiv:2205.12041  [pdf, other

    cs.CV

    Privacy-Preserving Image Classification Using Vision Transformer

    Authors: Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image classification method that is based on the combined use of encrypted images and the vision transformer (ViT). The proposed method allows us not only to apply images without visual information to ViT models for both training and testing but to also maintain a high classification accuracy. ViT utilizes patch embedding and position embedding for im… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

  39. arXiv:2204.07707  [pdf, other

    cs.CV eess.IV

    Privacy-Preserving Image Classification Using Isotropic Network

    Authors: AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image classification method that uses encrypted images and an isotropic network such as the vision transformer. The proposed method allows us not only to apply images without visual information to deep neural networks (DNNs) for both training and testing but also to maintain a high classification accuracy. In addition, compressible encrypted images, c… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

  40. arXiv:2202.02518  [pdf, other

    cs.CV cs.MM eess.IV

    On the predictability in reversible steganography

    Authors: Ching-Chun Chang, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen

    Abstract: Artificial neural networks have advanced the frontiers of reversible steganography. The core strength of neural networks is the ability to render accurate predictions for a bewildering variety of data. Residual modulation is recognised as the most advanced reversible steganographic algorithm for digital images. The pivot of this algorithm is predictive analytics in which pixel intensities are pred… ▽ More

    Submitted 7 March, 2023; v1 submitted 5 February, 2022; originally announced February 2022.

    Journal ref: Telecommunication Systems (2023), vol. 82, no. 2, pp. 301-313

  41. arXiv:2202.02503  [pdf, ps, other

    cs.CV cs.LG

    Adversarial Detector with Robust Classifier

    Authors: Takayuki Osakabe, Maungmaung Aprilpyone, Sayaka Shiota, Hitoshi Kiya

    Abstract: Deep neural network (DNN) models are wellknown to easily misclassify prediction results by using input images with small perturbations, called adversarial examples. In this paper, we propose a novel adversarial detector, which consists of a robust classifier and a plain one, to highly detect adversarial examples. The proposed adversarial detector is carried out in accordance with the logits of pla… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

  42. arXiv:2202.00806  [pdf, ps, other

    cs.CR

    Security Evaluation of Block-based Image Encryption for Vision Transformer against Jigsaw Puzzle Solver Attack

    Authors: Tatsuya Chuman, Hitoshi Kiya

    Abstract: The aim of this paper is to evaluate the security of a block-based image encryption for the vision transformer against jigsaw puzzle solver attacks. The vision transformer, a model for image classification based on the transformer architecture, is carried out by dividing an image into a grid of square patches. Some encryption schemes for the vision transformer have been proposed by applying block-… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

    Comments: To be appeared in IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech 2022)

  43. arXiv:2202.00382  [pdf, ps, other

    eess.IV cs.MM

    A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images

    Authors: Kenta Iida, Hitoshi Kiya

    Abstract: In this paper, we propose a novel content-based image-retrieval scheme that allows us to use a mixture of plain images and compressible encrypted ones called "encryption-then-compression (EtC) images." In the proposed scheme, extended SIMPLE descriptors are extracted from EtC images as well as from plain ones, so the mixed use of plain and encrypted images is available for image retrieval. In an e… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

    Comments: This paper will be presented at IEEE LifeTech 2022. arXiv admin note: text overlap with arXiv:2011.00270

  44. arXiv:2202.00265  [pdf, other

    cs.CV cs.LG

    Access Control of Object Detection Models Using Encrypted Feature Maps

    Authors: Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya

    Abstract: In this paper, we propose an access control method for object detection models. The use of encrypted images or encrypted feature maps has been demonstrated to be effective in access control of models from unauthorized access. However, the effectiveness of the approach has been confirmed in only image classification models and semantic segmentation models, but not in object detection models. In thi… ▽ More

    Submitted 10 March, 2022; v1 submitted 1 February, 2022; originally announced February 2022.

    Comments: To appear in 2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech 2022)

  45. arXiv:2201.11006  [pdf, other

    cs.CV cs.CR

    An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

    Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota

    Abstract: This article presents an overview of image transformation with a secret key and its applications. Image transformation with a secret key enables us not only to protect visual information on plain images but also to embed unique features controlled with a key into images. In addition, numerous encryption methods can generate encrypted images that are compressible and learnable for machine learning.… ▽ More

    Submitted 15 April, 2022; v1 submitted 26 January, 2022; originally announced January 2022.

  46. arXiv:2201.03469  [pdf, other

    cs.OH

    Proxy System with JPEG Bitstream-Based File-Size Preserving Encryption for Cloud Photo Streams

    Authors: Hiroyuki Kobayashi, Hitoshi Kiya

    Abstract: In this paper, we propose a proxy system with JPEG bitstream-based file-size preserving encryption to securely store compressed images in cloud environments. The proposed system, which is settled between client's device and the Internet, allows us not only to have exact the same file size as that of original JPEG streams but also to maintain a predetermined image format. In an experiment, the prop… ▽ More

    Submitted 4 November, 2021; originally announced January 2022.

    Comments: to appear in 2022 International Workshop on Advanced Image Technology (IWAIT)

  47. arXiv:2111.08927  [pdf, other

    cs.CV

    Protection of SVM Model with Secret Key from Unauthorized Access

    Authors: Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya

    Abstract: In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models. Models trained by using transformed images offer a poor performance to unauthorized users without a key, while they can offer a high performance to authorized users with a key. The proposed method is demonstrated to be robust enough against unauthorized access even under th… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

    Comments: To appear in IWAIT 2022

  48. arXiv:2111.04506  [pdf, other

    cs.CV cs.MM

    Self-Supervised Intrinsic Image Decomposition Network Considering Reflectance Consistency

    Authors: Yuma Kinoshita, Hitoshi Kiya

    Abstract: We propose a novel intrinsic image decomposition network considering reflectance consistency. Intrinsic image decomposition aims to decompose an image into illumination-invariant and illumination-variant components, referred to as ``reflectance'' and ``shading,'' respectively. Although there are three consistencies that the reflectance and shading should satisfy, most conventional work does not su… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

  49. arXiv:2109.01841  [pdf, ps, other

    eess.IV cs.CV cs.MM

    A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated From Independent Plain-Image Dataset

    Authors: Kenta Iida, Hitoshi Kiya

    Abstract: In this paper, we propose a privacy-preserving image-retrieval scheme using a codebook generated by using a plain-image dataset. Encryption-then-compression (EtC) images, which were proposed for EtC systems, have been used in conventional privacy-preserving image-retrieval schemes, in which a codebook is generated from EtC images uploaded by image owners, and extended SIMPLE descriptors are then c… ▽ More

    Submitted 4 September, 2021; originally announced September 2021.

    Comments: This paper will be presented at APSIPA ASC 2021. arXiv admin note: text overlap with arXiv:2011.00270

  50. arXiv:2109.01350  [pdf, ps, other

    cs.CV

    Spatially varying white balancing for mixed and non-uniform illuminants

    Authors: Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya

    Abstract: In this paper, we propose a novel white balance adjustment, called "spatially varying white balancing," for single, mixed, and non-uniform illuminants. By using n diagonal matrices along with a weight, the proposed method can reduce lighting effects on all spatially varying colors in an image under such illumination conditions. In contrast, conventional white balance adjustments do not consider th… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.