Secure Image Inference Using Pairwise Activation Functions

被引:1
|
作者
Agyepong, Jonas T. [1 ]
Soliman, Mostafa [1 ]
Wada, Yasutaka [2 ]
Kimura, Keiji [3 ]
El-Mahdy, Ahmed [1 ]
机构
[1] Egypt Japan Univ Sci & Technol, Comp Sci & Engn Dept, Alexandria 21934, Egypt
[2] Meisei Univ, Dept Informat Sci, Tokyo 1918506, Japan
[3] Waseda Univ, Dept Comp Sci & Engn, Tokyo 1698555, Japan
关键词
Cryptography; Encryption; Task analysis; Neural networks; Servers; Deep learning; Space exploration; Exploratory analysis; homomorphic encryption scheme; homomorphic image inference; pairwise functions; polynomial approximation; privacy-preserving machine learning;
D O I
10.1109/ACCESS.2021.3106888
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Polynomial approximation has for the past few years been used to derive polynomials as an approximation to activation functions for use in image prediction or inference employing homomorphic encryption technique to induce data privacy and security. Most proposed works thus far have only been limited to deriving very few polynomials to use for these tasks. While the literature has considered forming new activation functions as pairwise multiplication of well-known activation functions, the design space is mostly unexplored. In some practical applications, there is usually a mix of activation functions used, so looking ahead, there is the need to explore into using other potential functions that can also improve performance whiles not relying on a few ones proposed such as ReLU and Swish. This paper explores the design space of such pairwise, multiplied activation functions and their application in homomorphic image inference or prediction using the widely popular MNIST and CIFAR-10 benchmark datasets. Moreover, we analyzed corresponding curve fitting parameters (range and degree), homomorphic-friendly pooling methods, and optimization methods in the ciphertext domain to avoid incurring huge computation costs but not compromising accuracy. Results show new activation function combinations yielding similar or better results in ciphertext as compared to the ones in plaintext.
引用
收藏
页码:118271 / 118290
页数:20
相关论文
共 50 条
  • [31] Secure Image Authentication Using Watermarking and Blockchain
    Abrar, Alsehli
    Abdul, Wadood
    Ghouzali, Sanaa
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 28 (02): : 577 - 591
  • [32] Secure Image Classification Using Deep Learning
    Gururaj, K.
    Ananth, Alaka
    Bhat, Sachin S.
    SMART SENSORS MEASUREMENT AND INSTRUMENTATION, CISCON 2021, 2023, 957 : 513 - 523
  • [33] Image Secure Transmission Using Chaotic Synchronization
    Bouridah, Mohammed Salah
    Bouden, Toufik
    Boulkroune, Abdesselem
    2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [34] Secure Image Deduplication Using SPIHT Compression
    Bini, Preetha S.
    Abirami, S.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 276 - 280
  • [35] Image colorization using Bayesian nonlocal inference
    Yao, Chen
    Yang, Xiaokang
    Chen, Li
    Xu, Yi
    JOURNAL OF ELECTRONIC IMAGING, 2011, 20 (02)
  • [36] Bayesian inference for the pairwise probability of agreement using data from several measurement systems
    de Castro, Mario
    Galea, Manuel
    QUALITY ENGINEERING, 2021, 33 (04) : 571 - 580
  • [37] On transformative adaptive activation functions in neural networks for gene expression inference
    Kunc, Vladimir
    Klema, Jiri
    PLOS ONE, 2021, 16 (01):
  • [38] Bayesian inference for a variance component model using pairwise composite likelihood with survey data
    Thompson, Mary E.
    Sedransk, Joseph
    Fang, Junhan
    Yi, Grace Y.
    SURVEY METHODOLOGY, 2022, 48 (01) : 73 - 93
  • [39] Inference of differentially expressed genes using generalized linear mixed models in a pairwise fashion
    Machado, Douglas Terra
    Bernardes Brustolini, Otavio Jose
    Martins, Yasmmin Cortes
    Grivet Mattoso Maia, Marco Antonio
    Ribeiro de Vasconcelos, Ana Tereza
    PEERJ, 2023, 11
  • [40] INFERENCE SECURE MULTILEVEL DATABASES
    LIN, TY
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 21 : 317 - 332