Skip to main content

Showing 1–12 of 12 results for author: Sirichotedumrong, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2412.13702  [pdf, other

    cs.CL cs.AI

    Typhoon 2: A Family of Open Text and Multimodal Thai Large Language Models

    Authors: Kunat Pipatanakul, Potsawee Manakul, Natapong Nitarach, Warit Sirichotedumrong, Surapon Nonesung, Teetouch Jaknamon, Parinthapat Pengpun, Pittawat Taveekitworachai, Adisai Na-Thalang, Sittipong Sripaisarnmongkol, Krisanapong Jirayoot, Kasima Tharnpipitchai

    Abstract: This paper introduces Typhoon 2, a series of text and multimodal large language models optimized for the Thai language. The series includes models for text, vision, and audio. Typhoon2-Text builds on state-of-the-art open models, such as Llama 3 and Qwen2, and we perform continual pre-training on a mixture of English and Thai data. We employ post-training techniques to enhance Thai language perfor… ▽ More

    Submitted 19 December, 2024; v1 submitted 18 December, 2024; originally announced December 2024.

    Comments: technical report, 55 pages

  2. arXiv:2409.10999  [pdf, other

    cs.CL cs.AI cs.SD eess.AS

    Enhancing Low-Resource Language and Instruction Following Capabilities of Audio Language Models

    Authors: Potsawee Manakul, Guangzhi Sun, Warit Sirichotedumrong, Kasima Tharnpipitchai, Kunat Pipatanakul

    Abstract: Audio language models process audio inputs using textual prompts for tasks like speech recognition and audio captioning. Although built on multilingual pre-trained components, most are trained primarily on English, limiting their usability for other languages. This paper evaluates audio language models on Thai, a low-resource language, and finds that they lack emergent cross-lingual abilities desp… ▽ More

    Submitted 23 May, 2025; v1 submitted 17 September, 2024; originally announced September 2024.

    Comments: Interspeech 2025

  3. arXiv:2010.06198  [pdf, ps, other

    cs.CR

    Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks

    Authors: Warit Sirichotedumrong, Hitoshi Kiya

    Abstract: Various visual information protection methods have been proposed for privacy-preserving deep neural networks (DNNs). In contrast, attack methods on such protection methods have been studied simultaneously. In this paper, we evaluate state-of-the-art visual protection methods for privacy-preserving DNNs in terms of visual security against ciphertext-only attacks (COAs). We focus on brute-force atta… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

    Comments: To be appeared in APSIPA ASC 2020

  4. arXiv:2006.01342  [pdf, ps, other

    cs.CR eess.IV

    A GAN-Based Image Transformation Scheme for Privacy-Preserving Deep Neural Networks

    Authors: Warit Sirichotedumrong, Hitoshi Kiya

    Abstract: We propose a novel image transformation scheme using generative adversarial networks (GANs) for privacy-preserving deep neural networks (DNNs). The proposed scheme enables us not only to apply images without visual information to DNNs, but also to enhance robustness against ciphertext-only attacks (COAs) including DNN-based attacks. In this paper, the proposed transformation scheme is demonstrated… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: To be appeared on 28th European Signal Processing Conference (EUSIPCO 2020)

  5. arXiv:1912.04746  [pdf, ps, other

    cs.CR

    On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks

    Authors: Warit Sirichotedumrong, Yuma Kinoshita, Hitoshi Kiya

    Abstract: This paper aims to evaluate the safety of a pixel-based image encryption method, which has been proposed to apply images with no visual information to deep neural networks (DNN), in terms of robustness against ciphertext-only attacks (COA). In addition, we propose a novel DNN-based COA that aims to reconstruct the visual information of encrypted images. The effectiveness of the proposed attack is… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

    Comments: Accepted in 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE 2019). arXiv admin note: substantial text overlap with arXiv:1905.01827

  6. arXiv:1907.13342  [pdf, ps, other

    eess.IV cs.CV

    Adversarial Test on Learnable Image Encryption

    Authors: MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya

    Abstract: Data for deep learning should be protected for privacy preserving. Researchers have come up with the notion of learnable image encryption to satisfy the requirement. However, existing privacy preserving approaches have never considered the threat of adversarial attacks. In this paper, we ran an adversarial test on learnable image encryption in five different scenarios. The results show different b… ▽ More

    Submitted 31 July, 2019; originally announced July 2019.

    Comments: To be appeared in 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE 2019)

  7. arXiv:1905.01827  [pdf, ps, other

    cs.CR eess.IV

    Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain

    Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya

    Abstract: We present a novel privacy-preserving scheme for deep neural networks (DNNs) that enables us not to only apply images without visual information to DNNs for both training and testing but to also consider data augmentation in the encrypted domain for the first time. In this paper, a novel pixel-based image encryption method is first proposed for privacy-preserving DNNs. In addition, a novel adaptat… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

    Comments: Accepted in the 26th IEEE International Conference on Image Processing (ICIP2019)

  8. arXiv:1812.06799  [pdf, ps, other

    cs.CR cs.MM eess.IV

    Grayscale-Based Image Encryption Considering Color Sub-sampling Operation for Encryption-then-Compression Systems

    Authors: Warit Sirichotedumrong, Tatsuya Chuman, Hitoshi Kiya

    Abstract: A new grayscale-based block scrambling image encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems, which are used to securely transmit images through an untrusted channel provider. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the conventional scheme. Images encrypted using the proposed scheme include l… ▽ More

    Submitted 14 December, 2018; originally announced December 2018.

    Comments: Accepted in 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE 2018). arXiv admin note: text overlap with arXiv:1810.13067

  9. arXiv:1811.00236  [pdf, ps, other

    cs.CR

    Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images

    Authors: Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya

    Abstract: A block scrambling-based encryption scheme is presented to enhance the security of Encryption-then-Compression (EtC) systems with JPEG compression, which allow us to securely transmit images through an untrusted channel provider, such as social network service providers. The proposed scheme enables the use of a smaller block size and a larger number of blocks than the conventional scheme. Images e… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

    Comments: Accepted in IEEE Transactions on Information Forensics & Security

  10. arXiv:1810.13067  [pdf

    cs.CR

    Compression Performance of Grayscale-based Image Encryption for Encryption-then-Compression Systems

    Authors: Warit Sirichotedumrong, Tatsuya Chuman, Hitoshi Kiya

    Abstract: This paper considers a new grayscale-based image encryption for Encryption-then-Compression (EtC) systems with JPEG compression. Firstly, generation methods of grayscale-based images are discussed in terms of the selection of color space. In addition, a new JPEG quantization table for the grayscale-based images is proposed to provide a better compression performance. Moreover, the quality of both… ▽ More

    Submitted 30 October, 2018; originally announced October 2018.

    Comments: Accepted in International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018

  11. Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems

    Authors: Tatsuya Chuman, Kenta Iida, Warit Sirichotedumrong, Hitoshi Kiya

    Abstract: Encryption-then-Compression (EtC) systems have been proposed to securely transmit images through an untrusted channel provider. In this study, EtC systems were applied to social media like Twitter that carry out image manipulations. The block scrambling-based encryption schemes used in EtC systems were evaluated in terms of their robustness against image manipulation on social media. The aim was t… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: To be appeared in IEICE Transactions on Information and Systems, January 2019

  12. arXiv:1806.03787  [pdf, ps, other

    cs.CR cs.MM

    Grayscale-based Block Scrambling Image Encryption for Social Networking Services

    Authors: Warit Sirichotedumrong, Tatsuya Chuman, Shoko Imaizumi, Hitoshi Kiya

    Abstract: This paper proposes a new block scrambling encryption scheme that enhances the security of encryption-then-compression (EtC) systems for JPEG images, which are used, for example, to securely transmit images through an untrusted channel provider. The proposed method allows the use of a smaller block size and a larger number of blocks than the conventional ones. Moreover, images encrypted using prop… ▽ More

    Submitted 10 June, 2018; originally announced June 2018.

    Comments: To be appeared in ICME2018 proceedings, 23rd July, 2018