SlideShare une entreprise Scribd logo
1  sur  13
Masayuki Tanaka
Learnable
Image Encryption
Big data for deep learning
1
Deep network
The deep learning is a very powerful tool.
Efficient algorithms High performance
computer
Big data
Big Data includes a Big Privacy Issue
2
Surveillance camera Big data
We cannot use those data
for learning.
Privacy protection
Only owner and police can access
with limited purpose.
Motivation:
How can we take advantage of
the big data
with privacy protection?
Practical Case
3
Shopping mall owner:
They want to analyze customer’s behavior.
They have a big data, but they don’t have
enough knowledge to develop software.
They have to protect customer’s privacy.
Engineering company:
They want to develop analysis system.
They have enough knowledge to develop
software, but they don’t have a big data.
They face privacy issue.
Police:
They don’t care about customer’s behavior.
Image Encryption
4
Image encryption helps to protect the privacy.
Original data Encrypted data
Key
Encryption
Decryption
Image encryption can protect the privacy.
But, we cannot use the encrypted data for the learning.
Human understandable
Machine learnable
Human non-understandable
Machine non-learnable
Homomorphic Encryption
5 𝐸𝑛𝑐 𝑋 + 𝐸𝑛𝑐 𝑌 = 𝐸𝑛𝑐(𝑋 + 𝑌)
Homomorphic Encryption will solve that problem.
Original data Encrypted data
Homomorphic
encryption
+ − × ÷ + − × ÷
Calculation after encryption
Encryption after calculation
=
Human non-understandable
Machine calculable
Still developing
Very limited calculation
Very heavy computation
Learnable Image Encryption
6
We propose a novel concept of a learnable image encryption.
Original data
Relatively weak
encryption
Powerful calculation
(Deep learning)
Encrypted data
Human non-understandable
Machine learnable
This combination allows us
the deep learning with the encrypted data.
It means that we can avoid the privacy issue.
Summary of learning frameworks
7
Traditional learning framework
Naive combination of image encryption and learning
Proposed learnable image encryption
Training with
human understandable
data
Training with
human understandable
data
Training with
humannon-understandable
data
-1 -1 -1 -1
1 2
3 4
1 2
3 4
Algorithm of learnable image encryption
8
Input
original image
Block-wise
operation
1 2 3 41 2 3 4 1 2 3 4
1 2
3 4
Rearrange intensity values
in a row
Shuffling
12 34 1 234 12 3 4
12 34 1 234 12 3 4
Reverse several values
3 2
3 1
1
1 4
42
4
2
3
Rearrange intensity values
as an RGB image
Block-wise
operation
Output
encrypted image
Block-size
BxB
Key
-1 -1 -1 -1
1 2
3 4
1 2
3 4
Image decryption
9
Output
original image
Block-wise
operation
1 2 3 41 2 3 4 1 2 3 4
1 2
3 4
Rearrange intensity values
in a row
Inverse shuffling
12 34 1 234 12 3 4
12 34 1 234 12 3 4
Reverse several values
3 2
3 1
1
1 4
42
4
2
3
Rearrange intensity values
as an RGB image
Block-wise
operation
Input
encrypted image
Block-size
BxB
Key
Network for encrypted images
10
Block-size
BxB
Encrypted image
Conv2D
BxB sized filter
with BxB stride
Upsampling
network
BxB factor
Classical
network
Experimental results
11
Proposed
High accuracy, but
human understandable
Plain image
Comparable high accuracy, and
human non-understandable
Summary
12
Proposed learnable image encryption
Training with
humannon-understandable
data
We have proposed a novel concept of learnable image encryption.
It has potential to learn with encrypted image data.
Keys: Block-wise relatively weak image encryption.
Powerful calculation with the deep learning.
Code available:
http://www.ok.sc.e.titech.ac.jp/~mtanaka/proj/imagescramble/
Google by “learnable image encryption”
Human non-understandable and machine learnable

Contenu connexe

Tendances

Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystemxlyle
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 

Tendances (20)

Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Unit 2
Unit 2Unit 2
Unit 2
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography
SteganographySteganography
Steganography
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Cryptography
CryptographyCryptography
Cryptography
 
Steganography
Steganography Steganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Message authentication
Message authenticationMessage authentication
Message authentication
 

Similaire à Learnable Image Encryption

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIRJET Journal
 
Machine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainMachine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainNishant Jain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 

Similaire à Learnable Image Encryption (20)

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
H43064650
H43064650H43064650
H43064650
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
Machine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainMachine learning_ Replicating Human Brain
Machine learning_ Replicating Human Brain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 

Plus de Masayuki Tanaka

Slideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationSlideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationMasayuki Tanaka
 
PRMU201902 Presentation document
PRMU201902 Presentation documentPRMU201902 Presentation document
PRMU201902 Presentation documentMasayuki Tanaka
 
Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementMasayuki Tanaka
 
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得Masayuki Tanaka
 
クリエイティブ・コモンズ
クリエイティブ・コモンズクリエイティブ・コモンズ
クリエイティブ・コモンズMasayuki Tanaka
 
メラビアンの法則
メラビアンの法則メラビアンの法則
メラビアンの法則Masayuki Tanaka
 
権威に訴える論証
権威に訴える論証権威に訴える論証
権威に訴える論証Masayuki Tanaka
 
Chain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationChain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationMasayuki Tanaka
 
One-point for presentation
One-point for presentationOne-point for presentation
One-point for presentationMasayuki Tanaka
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL Masayuki Tanaka
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionMasayuki Tanaka
 
Least Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintLeast Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintMasayuki Tanaka
 

Plus de Masayuki Tanaka (20)

Slideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationSlideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptation
 
PRMU201902 Presentation document
PRMU201902 Presentation documentPRMU201902 Presentation document
PRMU201902 Presentation document
 
Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image Enhancement
 
Year-End Seminar 2018
Year-End Seminar 2018Year-End Seminar 2018
Year-End Seminar 2018
 
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
 
クリエイティブ・コモンズ
クリエイティブ・コモンズクリエイティブ・コモンズ
クリエイティブ・コモンズ
 
デザイン4原則
デザイン4原則デザイン4原則
デザイン4原則
 
メラビアンの法則
メラビアンの法則メラビアンの法則
メラビアンの法則
 
類似性の法則
類似性の法則類似性の法則
類似性の法則
 
権威に訴える論証
権威に訴える論証権威に訴える論証
権威に訴える論証
 
Chain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationChain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagation
 
Give Me Four
Give Me FourGive Me Four
Give Me Four
 
Tech art 20170315
Tech art 20170315Tech art 20170315
Tech art 20170315
 
My Slide Theme
My Slide ThemeMy Slide Theme
My Slide Theme
 
Font Memo
Font MemoFont Memo
Font Memo
 
One-point for presentation
One-point for presentationOne-point for presentation
One-point for presentation
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image Reconstruction
 
Least Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintLeast Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 Constraint
 
Lasso regression
Lasso regressionLasso regression
Lasso regression
 

Dernier

Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxRizalinePalanog2
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfSumit Kumar yadav
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptxAlMamun560346
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...ssuser79fe74
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...chandars293
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Monika Rani
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...Lokesh Kothari
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptxRajatChauhan518211
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 

Dernier (20)

Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
Seismic Method Estimate velocity from seismic data.pptx
Seismic Method Estimate velocity from seismic  data.pptxSeismic Method Estimate velocity from seismic  data.pptx
Seismic Method Estimate velocity from seismic data.pptx
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 

Learnable Image Encryption

  • 2. Big data for deep learning 1 Deep network The deep learning is a very powerful tool. Efficient algorithms High performance computer Big data
  • 3. Big Data includes a Big Privacy Issue 2 Surveillance camera Big data We cannot use those data for learning. Privacy protection Only owner and police can access with limited purpose. Motivation: How can we take advantage of the big data with privacy protection?
  • 4. Practical Case 3 Shopping mall owner: They want to analyze customer’s behavior. They have a big data, but they don’t have enough knowledge to develop software. They have to protect customer’s privacy. Engineering company: They want to develop analysis system. They have enough knowledge to develop software, but they don’t have a big data. They face privacy issue. Police: They don’t care about customer’s behavior.
  • 5. Image Encryption 4 Image encryption helps to protect the privacy. Original data Encrypted data Key Encryption Decryption Image encryption can protect the privacy. But, we cannot use the encrypted data for the learning. Human understandable Machine learnable Human non-understandable Machine non-learnable
  • 6. Homomorphic Encryption 5 𝐸𝑛𝑐 𝑋 + 𝐸𝑛𝑐 𝑌 = 𝐸𝑛𝑐(𝑋 + 𝑌) Homomorphic Encryption will solve that problem. Original data Encrypted data Homomorphic encryption + − × ÷ + − × ÷ Calculation after encryption Encryption after calculation = Human non-understandable Machine calculable Still developing Very limited calculation Very heavy computation
  • 7. Learnable Image Encryption 6 We propose a novel concept of a learnable image encryption. Original data Relatively weak encryption Powerful calculation (Deep learning) Encrypted data Human non-understandable Machine learnable This combination allows us the deep learning with the encrypted data. It means that we can avoid the privacy issue.
  • 8. Summary of learning frameworks 7 Traditional learning framework Naive combination of image encryption and learning Proposed learnable image encryption Training with human understandable data Training with human understandable data Training with humannon-understandable data
  • 9. -1 -1 -1 -1 1 2 3 4 1 2 3 4 Algorithm of learnable image encryption 8 Input original image Block-wise operation 1 2 3 41 2 3 4 1 2 3 4 1 2 3 4 Rearrange intensity values in a row Shuffling 12 34 1 234 12 3 4 12 34 1 234 12 3 4 Reverse several values 3 2 3 1 1 1 4 42 4 2 3 Rearrange intensity values as an RGB image Block-wise operation Output encrypted image Block-size BxB Key
  • 10. -1 -1 -1 -1 1 2 3 4 1 2 3 4 Image decryption 9 Output original image Block-wise operation 1 2 3 41 2 3 4 1 2 3 4 1 2 3 4 Rearrange intensity values in a row Inverse shuffling 12 34 1 234 12 3 4 12 34 1 234 12 3 4 Reverse several values 3 2 3 1 1 1 4 42 4 2 3 Rearrange intensity values as an RGB image Block-wise operation Input encrypted image Block-size BxB Key
  • 11. Network for encrypted images 10 Block-size BxB Encrypted image Conv2D BxB sized filter with BxB stride Upsampling network BxB factor Classical network
  • 12. Experimental results 11 Proposed High accuracy, but human understandable Plain image Comparable high accuracy, and human non-understandable
  • 13. Summary 12 Proposed learnable image encryption Training with humannon-understandable data We have proposed a novel concept of learnable image encryption. It has potential to learn with encrypted image data. Keys: Block-wise relatively weak image encryption. Powerful calculation with the deep learning. Code available: http://www.ok.sc.e.titech.ac.jp/~mtanaka/proj/imagescramble/ Google by “learnable image encryption” Human non-understandable and machine learnable

Notes de l'éditeur

  1. I’m Masayuki Tanaka from Japan. Today, I will introduce a new concept of a learnable image encryption.
  2. Now a day, a big data based learning or the deep learning is know as very powerful tool. We can find the deep learning in everywhere. Here is three key components for the deep learning: Big data, high performance computer, and efficient algorithm. For the high performance computer, many companies are investing a lot of money to get many many GPUs. We also need the efficient algorithms, in other words, we need talented and smart young researchers. OK, those two components are, of course, important. However, in this presentation, I will be focusing on the big data.
  3. We can get billions or trillions of mages everyday. However, we cannot utilize those billions of images for the deep learning. There are several challenges. But, one of those challenges is privacy issue. I can say big data includes big privacy issue. For example, let’s consider the surveillance camera case. As I said, each surveillance camera produces a lot of images everyday. However, almost all images are just threw away without using for the deep learning. The reason is the privacy protection. Usually, we cannot access those data. Only surveillance camera owner or the police can access those data, but with very limited purpose. So, my motivation is: How can we take advantage of the big data with the privacy protection.
  4. Let’s consider more practical case. First is the shopping mall owner. They want to analyze customer’s behavior. They already have a big data, but they don’t have enough knowledge to develop software which analyze customer’s behavior. Of course, they have to protect customer’s privacy. Second is engineering company. Usually, we are in those categories. They want to develop analysis system for business. They have enough knowledge to develop software, but they don’t have a big data. They have tried to access the big data which the shopping mall owner has. However, they faced privacy issue. Third is police or other authorized association. It is very simple. They might be able to access any kind of data, may be. But, they don’t care about customer’s behavior and to develop the software.
  5. Now, I will move to technical aspect. Image encryption is very helpful to protect the privacy. There are already a lot of encryption algorithms. Here, I’d like to introduce very simple case. The original data is encrypted with the special key. Then, only the person who knows that key can reconstruct or decrypted to the original image. We have good news in terms of the privacy. The encrypted data is human non-understandable. It means the privacy can be protected. However, nobody can utilized those encrypted data for the deep learning.
  6. To overcome this problem. Homomorphic encryption algorithm has been intensively researched. Homomorphic encryption has very good properties. We can apply arithmetic operation or we can calculate in encrypted domain. Namely, it is guaranteed that Calculation after Encryption equals Encryption after Calculation. It is very very good property. I can say the encrypted data by the homomorphic encryption is human non-understandable and machine calculable. That is great properties and many people want to use. However, this technique is still developing, and very very limited calculation and very heavy computation. I hope that this homomorphic encryption will work soon, however, right now, we can not use this homomorphic encryption is very challenge to apply the deep learning. 演算 Arithmetic operation
  7. Then, in this presentation, I’d like to propose a new concept of the learnable image encryption. The learnable image encryption consists of two components: relatively weak encryption and powerful calculation like deep learning. Even if the encryption is relatively weak, human cannot understand the encrypted data. In addition, the powerful calculation algorithm like the deep learning can lean the encrypted data. This is the proposed concept. If we can find that kind of balance, this combination allows us the deep learning with the encrypted data. Again, human cannot understand the encrypted data. So, we can avoid the privacy issue.
  8. Here is summary of learning frameworks with privacy issues. First is the traditional learning framework without considering the privacy issue. Plain images are directly used for the network learning. It is normal case, but in terms of the privacy, it is not good because every data is human understandable. Second is the naive combination of the image encryption and the learning. It apply image encryption. In this sense, the stored data is human non-understandable. However, of course, original data or the plain images should be reconstructed for the network learning. Actually, it is same as the traditional learning framework. Third, this is my proposal, is the learnable image encryption. We can learn with the encrypted and human non-understandable data. So, once we apply the learnable image encryption, we are free from the privacy issue.
  9. Now, I will explain processing pipeline of the proposed encryption algorithm. First and it is very important, the proposed algorithm is block-wise operation. We apply following operation block-by-block. I picked two-by-two bock for example. Those intensity data is rearrange into a single row. Then, apply the shuffling and reverse several values. This process corresponds to the key. Then, we have the encrypted single row data. This single row data is rearrange into the RGB image block. This encrypted image block is stored back. Again, the point is the block wise operation. Even if we apply the shuffling and the reverse operation to each block, each block still have the original information. It is the point.
  10. The image decryption is simple reverse process of the image encryption. Each block of encrypted image is rearranged into a single row data. Then, apply the reverse operation and the inverse shuffling. This operation is associated the key. If the person knows the shuffling algorithm and the position of the reverse, that person easily can reconstruct data. However, if the person don’t know those information, it is difficult to reconstruct the data.
  11. Next, I will show the network structure for the encrypted data. The image encryption is performed block-by-block. As I told you, each block includes original information. So, first, the network extracts those information block-wise operation manner. Then, the extracted features are upsampled to obtain the same size of input data. After that, we can apply the classical network. For this reason, the block-wise operation is very important and the key of this algorithm.
  12. I will show kind of the preliminary results. We have evaluated with cifar-10 and cifar-100 dataset. There are four approach, first, training with the plain image, it is the classical approach, second, is existing image shuffling algorithm, third, is the naive block wise pixel shuffling algorithm, fourth, is the proposed algorithm. As you can see, the plain image is human understandable, it is bad in terms of the privacy. However, the validation accuracy of the plain image is very good. Exsiting image shuffling algorithm, in terms of the privacy, it is done pretty good job. Human cannot understand the data. But, in the same time, machine cannot learn. As a result, we can get very lower validation accuracies compared with the results of the plain image. Naive block wise pixel shuffling, the performance or the validation accuracy of this is comparable to results of the plain image case. However, human can get some information from shuffled image. Compared to those encrypted image, I think that human cannot get meaningfull information from the data encrypted by the proposed algorithm. However, the machine can learn with those data. Actually, the performance is very comparable to the results of the plain image.
  13. Finally, I’d like to conclude as follows: We have propose the novel concept of the learning image encryption. Key components of the proposed algorithm are block-wise relatively weak image encryption and powerful calculation with the deep learning. The important properties of the proposed framework is human non-understandable and machine learnable. The code if available online, if you have interests, please try by yourself. Thanks,