SlideShare a Scribd company logo
1 of 13
Masayuki Tanaka
Learnable
Image Encryption
Big data for deep learning
1
Deep network
The deep learning is a very powerful tool.
Efficient algorithms High performance
computer
Big data
Big Data includes a Big Privacy Issue
2
Surveillance camera Big data
We cannot use those data
for learning.
Privacy protection
Only owner and police can access
with limited purpose.
Motivation:
How can we take advantage of
the big data
with privacy protection?
Practical Case
3
Shopping mall owner:
They want to analyze customer’s behavior.
They have a big data, but they don’t have
enough knowledge to develop software.
They have to protect customer’s privacy.
Engineering company:
They want to develop analysis system.
They have enough knowledge to develop
software, but they don’t have a big data.
They face privacy issue.
Police:
They don’t care about customer’s behavior.
Image Encryption
4
Image encryption helps to protect the privacy.
Original data Encrypted data
Key
Encryption
Decryption
Image encryption can protect the privacy.
But, we cannot use the encrypted data for the learning.
Human understandable
Machine learnable
Human non-understandable
Machine non-learnable
Homomorphic Encryption
5 𝐸𝑛𝑐 𝑋 + 𝐸𝑛𝑐 𝑌 = 𝐸𝑛𝑐(𝑋 + 𝑌)
Homomorphic Encryption will solve that problem.
Original data Encrypted data
Homomorphic
encryption
+ − × ÷ + − × ÷
Calculation after encryption
Encryption after calculation
=
Human non-understandable
Machine calculable
Still developing
Very limited calculation
Very heavy computation
Learnable Image Encryption
6
We propose a novel concept of a learnable image encryption.
Original data
Relatively weak
encryption
Powerful calculation
(Deep learning)
Encrypted data
Human non-understandable
Machine learnable
This combination allows us
the deep learning with the encrypted data.
It means that we can avoid the privacy issue.
Summary of learning frameworks
7
Traditional learning framework
Naive combination of image encryption and learning
Proposed learnable image encryption
Training with
human understandable
data
Training with
human understandable
data
Training with
humannon-understandable
data
-1 -1 -1 -1
1 2
3 4
1 2
3 4
Algorithm of learnable image encryption
8
Input
original image
Block-wise
operation
1 2 3 41 2 3 4 1 2 3 4
1 2
3 4
Rearrange intensity values
in a row
Shuffling
12 34 1 234 12 3 4
12 34 1 234 12 3 4
Reverse several values
3 2
3 1
1
1 4
42
4
2
3
Rearrange intensity values
as an RGB image
Block-wise
operation
Output
encrypted image
Block-size
BxB
Key
-1 -1 -1 -1
1 2
3 4
1 2
3 4
Image decryption
9
Output
original image
Block-wise
operation
1 2 3 41 2 3 4 1 2 3 4
1 2
3 4
Rearrange intensity values
in a row
Inverse shuffling
12 34 1 234 12 3 4
12 34 1 234 12 3 4
Reverse several values
3 2
3 1
1
1 4
42
4
2
3
Rearrange intensity values
as an RGB image
Block-wise
operation
Input
encrypted image
Block-size
BxB
Key
Network for encrypted images
10
Block-size
BxB
Encrypted image
Conv2D
BxB sized filter
with BxB stride
Upsampling
network
BxB factor
Classical
network
Experimental results
11
Proposed
High accuracy, but
human understandable
Plain image
Comparable high accuracy, and
human non-understandable
Summary
12
Proposed learnable image encryption
Training with
humannon-understandable
data
We have proposed a novel concept of learnable image encryption.
It has potential to learn with encrypted image data.
Keys: Block-wise relatively weak image encryption.
Powerful calculation with the deep learning.
Code available:
http://www.ok.sc.e.titech.ac.jp/~mtanaka/proj/imagescramble/
Google by “learnable image encryption”
Human non-understandable and machine learnable

More Related Content

What's hot

Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacywaseem ahmad
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processingpriyadharshini murugan
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Predictive coding
Predictive codingPredictive coding
Predictive codingp_ayal
 
Chapter 2 Image Processing: Pixel Relation
Chapter 2 Image Processing: Pixel RelationChapter 2 Image Processing: Pixel Relation
Chapter 2 Image Processing: Pixel RelationVarun Ojha
 
Simultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesSimultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesCristina Pérez Benito
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression modelslavanya marichamy
 
Image Degradation & Resoration
Image Degradation & ResorationImage Degradation & Resoration
Image Degradation & ResorationSanjay Saha
 
Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression techniquePriyanka Pachori
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Log Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleLog Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleMustak Ahmmed
 

What's hot (20)

Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
 
Steganography
SteganographySteganography
Steganography
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Graphical password
Graphical passwordGraphical password
Graphical password
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processing
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Run length encoding
Run length encodingRun length encoding
Run length encoding
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Predictive coding
Predictive codingPredictive coding
Predictive coding
 
Chapter 2 Image Processing: Pixel Relation
Chapter 2 Image Processing: Pixel RelationChapter 2 Image Processing: Pixel Relation
Chapter 2 Image Processing: Pixel Relation
 
Simultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color ImagesSimultaneous Smoothing and Sharpening of Color Images
Simultaneous Smoothing and Sharpening of Color Images
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 
Image Degradation & Resoration
Image Degradation & ResorationImage Degradation & Resoration
Image Degradation & Resoration
 
Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression technique
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Log Transformation in Image Processing with Example
Log Transformation in Image Processing with ExampleLog Transformation in Image Processing with Example
Log Transformation in Image Processing with Example
 
Application of image processing
Application of image processingApplication of image processing
Application of image processing
 
Point Processing
Point ProcessingPoint Processing
Point Processing
 

Similar to Learnable Image Encryption

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIRJET Journal
 
Machine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainMachine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainNishant Jain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 

Similar to Learnable Image Encryption (20)

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
H43064650
H43064650H43064650
H43064650
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
Machine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainMachine learning_ Replicating Human Brain
Machine learning_ Replicating Human Brain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 

More from Masayuki Tanaka

Slideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationSlideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationMasayuki Tanaka
 
PRMU201902 Presentation document
PRMU201902 Presentation documentPRMU201902 Presentation document
PRMU201902 Presentation documentMasayuki Tanaka
 
Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementMasayuki Tanaka
 
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得Masayuki Tanaka
 
クリエイティブ・コモンズ
クリエイティブ・コモンズクリエイティブ・コモンズ
クリエイティブ・コモンズMasayuki Tanaka
 
メラビアンの法則
メラビアンの法則メラビアンの法則
メラビアンの法則Masayuki Tanaka
 
権威に訴える論証
権威に訴える論証権威に訴える論証
権威に訴える論証Masayuki Tanaka
 
Chain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationChain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationMasayuki Tanaka
 
One-point for presentation
One-point for presentationOne-point for presentation
One-point for presentationMasayuki Tanaka
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL Masayuki Tanaka
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionMasayuki Tanaka
 
Least Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintLeast Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintMasayuki Tanaka
 

More from Masayuki Tanaka (20)

Slideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationSlideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptation
 
PRMU201902 Presentation document
PRMU201902 Presentation documentPRMU201902 Presentation document
PRMU201902 Presentation document
 
Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image Enhancement
 
Year-End Seminar 2018
Year-End Seminar 2018Year-End Seminar 2018
Year-End Seminar 2018
 
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
 
クリエイティブ・コモンズ
クリエイティブ・コモンズクリエイティブ・コモンズ
クリエイティブ・コモンズ
 
デザイン4原則
デザイン4原則デザイン4原則
デザイン4原則
 
メラビアンの法則
メラビアンの法則メラビアンの法則
メラビアンの法則
 
類似性の法則
類似性の法則類似性の法則
類似性の法則
 
権威に訴える論証
権威に訴える論証権威に訴える論証
権威に訴える論証
 
Chain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationChain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagation
 
Give Me Four
Give Me FourGive Me Four
Give Me Four
 
Tech art 20170315
Tech art 20170315Tech art 20170315
Tech art 20170315
 
My Slide Theme
My Slide ThemeMy Slide Theme
My Slide Theme
 
Font Memo
Font MemoFont Memo
Font Memo
 
One-point for presentation
One-point for presentationOne-point for presentation
One-point for presentation
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image Reconstruction
 
Least Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintLeast Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 Constraint
 
Lasso regression
Lasso regressionLasso regression
Lasso regression
 

Recently uploaded

Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformationAreesha Ahmad
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxFarihaAbdulRasheed
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...ssuser79fe74
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)Areesha Ahmad
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Servicenishacall1
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLkantirani197
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfSumit Kumar yadav
 
American Type Culture Collection (ATCC).pptx
American Type Culture Collection (ATCC).pptxAmerican Type Culture Collection (ATCC).pptx
American Type Culture Collection (ATCC).pptxabhishekdhamu51
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...Lokesh Kothari
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .Poonam Aher Patil
 

Recently uploaded (20)

Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Botany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdfBotany 4th semester series (krishna).pdf
Botany 4th semester series (krishna).pdf
 
American Type Culture Collection (ATCC).pptx
American Type Culture Collection (ATCC).pptxAmerican Type Culture Collection (ATCC).pptx
American Type Culture Collection (ATCC).pptx
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
GUIDELINES ON SIMILAR BIOLOGICS Regulatory Requirements for Marketing Authori...
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 

Learnable Image Encryption

  • 2. Big data for deep learning 1 Deep network The deep learning is a very powerful tool. Efficient algorithms High performance computer Big data
  • 3. Big Data includes a Big Privacy Issue 2 Surveillance camera Big data We cannot use those data for learning. Privacy protection Only owner and police can access with limited purpose. Motivation: How can we take advantage of the big data with privacy protection?
  • 4. Practical Case 3 Shopping mall owner: They want to analyze customer’s behavior. They have a big data, but they don’t have enough knowledge to develop software. They have to protect customer’s privacy. Engineering company: They want to develop analysis system. They have enough knowledge to develop software, but they don’t have a big data. They face privacy issue. Police: They don’t care about customer’s behavior.
  • 5. Image Encryption 4 Image encryption helps to protect the privacy. Original data Encrypted data Key Encryption Decryption Image encryption can protect the privacy. But, we cannot use the encrypted data for the learning. Human understandable Machine learnable Human non-understandable Machine non-learnable
  • 6. Homomorphic Encryption 5 𝐸𝑛𝑐 𝑋 + 𝐸𝑛𝑐 𝑌 = 𝐸𝑛𝑐(𝑋 + 𝑌) Homomorphic Encryption will solve that problem. Original data Encrypted data Homomorphic encryption + − × ÷ + − × ÷ Calculation after encryption Encryption after calculation = Human non-understandable Machine calculable Still developing Very limited calculation Very heavy computation
  • 7. Learnable Image Encryption 6 We propose a novel concept of a learnable image encryption. Original data Relatively weak encryption Powerful calculation (Deep learning) Encrypted data Human non-understandable Machine learnable This combination allows us the deep learning with the encrypted data. It means that we can avoid the privacy issue.
  • 8. Summary of learning frameworks 7 Traditional learning framework Naive combination of image encryption and learning Proposed learnable image encryption Training with human understandable data Training with human understandable data Training with humannon-understandable data
  • 9. -1 -1 -1 -1 1 2 3 4 1 2 3 4 Algorithm of learnable image encryption 8 Input original image Block-wise operation 1 2 3 41 2 3 4 1 2 3 4 1 2 3 4 Rearrange intensity values in a row Shuffling 12 34 1 234 12 3 4 12 34 1 234 12 3 4 Reverse several values 3 2 3 1 1 1 4 42 4 2 3 Rearrange intensity values as an RGB image Block-wise operation Output encrypted image Block-size BxB Key
  • 10. -1 -1 -1 -1 1 2 3 4 1 2 3 4 Image decryption 9 Output original image Block-wise operation 1 2 3 41 2 3 4 1 2 3 4 1 2 3 4 Rearrange intensity values in a row Inverse shuffling 12 34 1 234 12 3 4 12 34 1 234 12 3 4 Reverse several values 3 2 3 1 1 1 4 42 4 2 3 Rearrange intensity values as an RGB image Block-wise operation Input encrypted image Block-size BxB Key
  • 11. Network for encrypted images 10 Block-size BxB Encrypted image Conv2D BxB sized filter with BxB stride Upsampling network BxB factor Classical network
  • 12. Experimental results 11 Proposed High accuracy, but human understandable Plain image Comparable high accuracy, and human non-understandable
  • 13. Summary 12 Proposed learnable image encryption Training with humannon-understandable data We have proposed a novel concept of learnable image encryption. It has potential to learn with encrypted image data. Keys: Block-wise relatively weak image encryption. Powerful calculation with the deep learning. Code available: http://www.ok.sc.e.titech.ac.jp/~mtanaka/proj/imagescramble/ Google by “learnable image encryption” Human non-understandable and machine learnable

Editor's Notes

  1. I’m Masayuki Tanaka from Japan. Today, I will introduce a new concept of a learnable image encryption.
  2. Now a day, a big data based learning or the deep learning is know as very powerful tool. We can find the deep learning in everywhere. Here is three key components for the deep learning: Big data, high performance computer, and efficient algorithm. For the high performance computer, many companies are investing a lot of money to get many many GPUs. We also need the efficient algorithms, in other words, we need talented and smart young researchers. OK, those two components are, of course, important. However, in this presentation, I will be focusing on the big data.
  3. We can get billions or trillions of mages everyday. However, we cannot utilize those billions of images for the deep learning. There are several challenges. But, one of those challenges is privacy issue. I can say big data includes big privacy issue. For example, let’s consider the surveillance camera case. As I said, each surveillance camera produces a lot of images everyday. However, almost all images are just threw away without using for the deep learning. The reason is the privacy protection. Usually, we cannot access those data. Only surveillance camera owner or the police can access those data, but with very limited purpose. So, my motivation is: How can we take advantage of the big data with the privacy protection.
  4. Let’s consider more practical case. First is the shopping mall owner. They want to analyze customer’s behavior. They already have a big data, but they don’t have enough knowledge to develop software which analyze customer’s behavior. Of course, they have to protect customer’s privacy. Second is engineering company. Usually, we are in those categories. They want to develop analysis system for business. They have enough knowledge to develop software, but they don’t have a big data. They have tried to access the big data which the shopping mall owner has. However, they faced privacy issue. Third is police or other authorized association. It is very simple. They might be able to access any kind of data, may be. But, they don’t care about customer’s behavior and to develop the software.
  5. Now, I will move to technical aspect. Image encryption is very helpful to protect the privacy. There are already a lot of encryption algorithms. Here, I’d like to introduce very simple case. The original data is encrypted with the special key. Then, only the person who knows that key can reconstruct or decrypted to the original image. We have good news in terms of the privacy. The encrypted data is human non-understandable. It means the privacy can be protected. However, nobody can utilized those encrypted data for the deep learning.
  6. To overcome this problem. Homomorphic encryption algorithm has been intensively researched. Homomorphic encryption has very good properties. We can apply arithmetic operation or we can calculate in encrypted domain. Namely, it is guaranteed that Calculation after Encryption equals Encryption after Calculation. It is very very good property. I can say the encrypted data by the homomorphic encryption is human non-understandable and machine calculable. That is great properties and many people want to use. However, this technique is still developing, and very very limited calculation and very heavy computation. I hope that this homomorphic encryption will work soon, however, right now, we can not use this homomorphic encryption is very challenge to apply the deep learning. 演算 Arithmetic operation
  7. Then, in this presentation, I’d like to propose a new concept of the learnable image encryption. The learnable image encryption consists of two components: relatively weak encryption and powerful calculation like deep learning. Even if the encryption is relatively weak, human cannot understand the encrypted data. In addition, the powerful calculation algorithm like the deep learning can lean the encrypted data. This is the proposed concept. If we can find that kind of balance, this combination allows us the deep learning with the encrypted data. Again, human cannot understand the encrypted data. So, we can avoid the privacy issue.
  8. Here is summary of learning frameworks with privacy issues. First is the traditional learning framework without considering the privacy issue. Plain images are directly used for the network learning. It is normal case, but in terms of the privacy, it is not good because every data is human understandable. Second is the naive combination of the image encryption and the learning. It apply image encryption. In this sense, the stored data is human non-understandable. However, of course, original data or the plain images should be reconstructed for the network learning. Actually, it is same as the traditional learning framework. Third, this is my proposal, is the learnable image encryption. We can learn with the encrypted and human non-understandable data. So, once we apply the learnable image encryption, we are free from the privacy issue.
  9. Now, I will explain processing pipeline of the proposed encryption algorithm. First and it is very important, the proposed algorithm is block-wise operation. We apply following operation block-by-block. I picked two-by-two bock for example. Those intensity data is rearrange into a single row. Then, apply the shuffling and reverse several values. This process corresponds to the key. Then, we have the encrypted single row data. This single row data is rearrange into the RGB image block. This encrypted image block is stored back. Again, the point is the block wise operation. Even if we apply the shuffling and the reverse operation to each block, each block still have the original information. It is the point.
  10. The image decryption is simple reverse process of the image encryption. Each block of encrypted image is rearranged into a single row data. Then, apply the reverse operation and the inverse shuffling. This operation is associated the key. If the person knows the shuffling algorithm and the position of the reverse, that person easily can reconstruct data. However, if the person don’t know those information, it is difficult to reconstruct the data.
  11. Next, I will show the network structure for the encrypted data. The image encryption is performed block-by-block. As I told you, each block includes original information. So, first, the network extracts those information block-wise operation manner. Then, the extracted features are upsampled to obtain the same size of input data. After that, we can apply the classical network. For this reason, the block-wise operation is very important and the key of this algorithm.
  12. I will show kind of the preliminary results. We have evaluated with cifar-10 and cifar-100 dataset. There are four approach, first, training with the plain image, it is the classical approach, second, is existing image shuffling algorithm, third, is the naive block wise pixel shuffling algorithm, fourth, is the proposed algorithm. As you can see, the plain image is human understandable, it is bad in terms of the privacy. However, the validation accuracy of the plain image is very good. Exsiting image shuffling algorithm, in terms of the privacy, it is done pretty good job. Human cannot understand the data. But, in the same time, machine cannot learn. As a result, we can get very lower validation accuracies compared with the results of the plain image. Naive block wise pixel shuffling, the performance or the validation accuracy of this is comparable to results of the plain image case. However, human can get some information from shuffled image. Compared to those encrypted image, I think that human cannot get meaningfull information from the data encrypted by the proposed algorithm. However, the machine can learn with those data. Actually, the performance is very comparable to the results of the plain image.
  13. Finally, I’d like to conclude as follows: We have propose the novel concept of the learning image encryption. Key components of the proposed algorithm are block-wise relatively weak image encryption and powerful calculation with the deep learning. The important properties of the proposed framework is human non-understandable and machine learnable. The code if available online, if you have interests, please try by yourself. Thanks,