Image and Model Transformation with Secret Key for Vision Transformer

被引:6
|
作者
Kiya, Hitoshi [1 ]
Iijima, Ryota [1 ]
Maungmaung, Aprilpyone [1 ]
Kinoshita, Yuma [1 ]
机构
[1] Tokyo Metropolitan Univ, Hino 1910065, Japan
关键词
perceptual image encryption; vision transformer; DNN; privacy preserving; PRIVACY; ENCRYPTION;
D O I
10.1587/transinf.2022MUI0001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key. We show for the first time that models trained with plain images can be directly transformed to models trained with encrypted images on the basis of the ViT architecture, and the performance of the transformed models is the same as models trained with plain images when using test images encrypted with the key. In addition, the proposed scheme does not require any specially prepared data for training models or network modification, so it also allows us to easily update the secret key. In an experiment, the effectiveness of the proposed scheme is evaluated in terms of performance degradation and model protection performance in an image classification task on the CIFAR-10 dataset.
引用
收藏
页码:2 / 11
页数:10
相关论文
共 50 条
  • [41] Image Quality Distortion Classification Using Vision Transformer
    Lynn, Nay Chi
    Shimamura, Tetsuya
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, AINA 2024, 2024, 199 : 353 - 361
  • [42] Secret-to-Image Reversible Transformation for Generative Steganography
    Zhou, Zhili
    Su, Yuecheng
    Li, Jin
    Yu, Keping
    Wu, Q. M. Jonathan
    Fu, Zhangjie
    Shi, Yunqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4118 - 4134
  • [43] A revised transformation protocol for unconditionally secure secret key exchange
    Koizumi, Koichi
    Mizuki, Takaaki
    Nishizeki, Takao
    THEORY OF COMPUTING SYSTEMS, 2008, 42 (02) : 187 - 221
  • [44] A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
    Koichi Koizumi
    Takaaki Mizuki
    Takao Nishizeki
    Theory of Computing Systems, 2008, 42 : 187 - 221
  • [45] Bearing Fault Diagnosis Based on Image Information Fusion and Vision Transformer Transfer Learning Model
    Zhang, Zichen
    Li, Jing
    Cai, Chaozhi
    Ren, Jianhua
    Xue, Yingfang
    APPLIED SCIENCES-BASEL, 2024, 14 (07):
  • [46] Fine-grained bird image classification based on counterfactual method of vision transformer model
    Chen, Tianhua
    Li, Yanyue
    Qiao, Qinghua
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (05): : 6221 - 6239
  • [47] Fine-grained bird image classification based on counterfactual method of vision transformer model
    Tianhua Chen
    Yanyue Li
    Qinghua Qiao
    The Journal of Supercomputing, 2024, 80 : 6221 - 6239
  • [48] Secret and public key image watermarking schemes for image authentication and ownership verification
    Wong, PW
    Memon, N
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) : 1593 - 1601
  • [49] Image authentication with a time-stamped signature of the image and secret key encryption
    Cheng, JY
    Chang, LW
    ELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY III, 2002, 4925 : 91 - 98
  • [50] FSwin Transformer: Feature-Space Window Attention Vision Transformer for Image Classification
    Yoo, Dayeon
    Kim, Jeesu
    Yoo, Jinwoo
    IEEE ACCESS, 2024, 12 : 72598 - 72606