SlideShare a Scribd company logo
Masayuki Tanaka
Learnable
Image Encryption
Big data for deep learning
1
Deep network
The deep learning is a very powerful tool.
Efficient algorithms High performance
computer
Big data
Big Data includes a Big Privacy Issue
2
Surveillance camera Big data
We cannot use those data
for learning.
Privacy protection
Only owner and police can access
with limited purpose.
Motivation:
How can we take advantage of
the big data
with privacy protection?
Practical Case
3
Shopping mall owner:
They want to analyze customer’s behavior.
They have a big data, but they don’t have
enough knowledge to develop software.
They have to protect customer’s privacy.
Engineering company:
They want to develop analysis system.
They have enough knowledge to develop
software, but they don’t have a big data.
They face privacy issue.
Police:
They don’t care about customer’s behavior.
Image Encryption
4
Image encryption helps to protect the privacy.
Original data Encrypted data
Key
Encryption
Decryption
Image encryption can protect the privacy.
But, we cannot use the encrypted data for the learning.
Human understandable
Machine learnable
Human non-understandable
Machine non-learnable
Homomorphic Encryption
5 𝐸𝑛𝑐 𝑋 + 𝐸𝑛𝑐 𝑌 = 𝐸𝑛𝑐(𝑋 + 𝑌)
Homomorphic Encryption will solve that problem.
Original data Encrypted data
Homomorphic
encryption
+ − × ÷ + − × ÷
Calculation after encryption
Encryption after calculation
=
Human non-understandable
Machine calculable
Still developing
Very limited calculation
Very heavy computation
Learnable Image Encryption
6
We propose a novel concept of a learnable image encryption.
Original data
Relatively weak
encryption
Powerful calculation
(Deep learning)
Encrypted data
Human non-understandable
Machine learnable
This combination allows us
the deep learning with the encrypted data.
It means that we can avoid the privacy issue.
Summary of learning frameworks
7
Traditional learning framework
Naive combination of image encryption and learning
Proposed learnable image encryption
Training with
human understandable
data
Training with
human understandable
data
Training with
humannon-understandable
data
-1 -1 -1 -1
1 2
3 4
1 2
3 4
Algorithm of learnable image encryption
8
Input
original image
Block-wise
operation
1 2 3 41 2 3 4 1 2 3 4
1 2
3 4
Rearrange intensity values
in a row
Shuffling
12 34 1 234 12 3 4
12 34 1 234 12 3 4
Reverse several values
3 2
3 1
1
1 4
42
4
2
3
Rearrange intensity values
as an RGB image
Block-wise
operation
Output
encrypted image
Block-size
BxB
Key
-1 -1 -1 -1
1 2
3 4
1 2
3 4
Image decryption
9
Output
original image
Block-wise
operation
1 2 3 41 2 3 4 1 2 3 4
1 2
3 4
Rearrange intensity values
in a row
Inverse shuffling
12 34 1 234 12 3 4
12 34 1 234 12 3 4
Reverse several values
3 2
3 1
1
1 4
42
4
2
3
Rearrange intensity values
as an RGB image
Block-wise
operation
Input
encrypted image
Block-size
BxB
Key
Network for encrypted images
10
Block-size
BxB
Encrypted image
Conv2D
BxB sized filter
with BxB stride
Upsampling
network
BxB factor
Classical
network
Experimental results
11
Proposed
High accuracy, but
human understandable
Plain image
Comparable high accuracy, and
human non-understandable
Summary
12
Proposed learnable image encryption
Training with
humannon-understandable
data
We have proposed a novel concept of learnable image encryption.
It has potential to learn with encrypted image data.
Keys: Block-wise relatively weak image encryption.
Powerful calculation with the deep learning.
Code available:
http://www.ok.sc.e.titech.ac.jp/~mtanaka/proj/imagescramble/
Google by “learnable image encryption”
Human non-understandable and machine learnable

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
KARNAN L S
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
Rc4
Rc4Rc4
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
Dr.Florence Dayana
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
Jay Nagar
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
saqib1611
 
Cryptography
CryptographyCryptography
Cryptography
AnandKaGe
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Rc4
Rc4Rc4
Rc4
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Learnable Image Encryption

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
Papitha Velumani
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
Ajinkya Nikam
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
CSCJournals
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
ZTech Proje
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
Editor IJMTER
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
swapnalithakur7
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
IRJET Journal
 
Machine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainMachine learning_ Replicating Human Brain
Machine learning_ Replicating Human Brain
Nishant Jain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
Alexander Decker
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
AnIsh Kumar
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
IJERA Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
International Journal of Technical Research & Application
 

Similar to Learnable Image Encryption (20)

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
H43064650
H43064650H43064650
H43064650
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
Machine learning_ Replicating Human Brain
Machine learning_ Replicating Human BrainMachine learning_ Replicating Human Brain
Machine learning_ Replicating Human Brain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUEREAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
 

More from Masayuki Tanaka

Slideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationSlideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptation
Masayuki Tanaka
 
PRMU201902 Presentation document
PRMU201902 Presentation documentPRMU201902 Presentation document
PRMU201902 Presentation document
Masayuki Tanaka
 
Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image Enhancement
Masayuki Tanaka
 
Year-End Seminar 2018
Year-End Seminar 2018Year-End Seminar 2018
Year-End Seminar 2018
Masayuki Tanaka
 
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
Masayuki Tanaka
 
クリエイティブ・コモンズ
クリエイティブ・コモンズクリエイティブ・コモンズ
クリエイティブ・コモンズ
Masayuki Tanaka
 
デザイン4原則
デザイン4原則デザイン4原則
デザイン4原則
Masayuki Tanaka
 
メラビアンの法則
メラビアンの法則メラビアンの法則
メラビアンの法則
Masayuki Tanaka
 
類似性の法則
類似性の法則類似性の法則
類似性の法則
Masayuki Tanaka
 
権威に訴える論証
権威に訴える論証権威に訴える論証
権威に訴える論証
Masayuki Tanaka
 
Chain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationChain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagation
Masayuki Tanaka
 
Give Me Four
Give Me FourGive Me Four
Give Me Four
Masayuki Tanaka
 
Tech art 20170315
Tech art 20170315Tech art 20170315
Tech art 20170315
Masayuki Tanaka
 
My Slide Theme
My Slide ThemeMy Slide Theme
My Slide Theme
Masayuki Tanaka
 
Font Memo
Font MemoFont Memo
Font Memo
Masayuki Tanaka
 
One-point for presentation
One-point for presentationOne-point for presentation
One-point for presentation
Masayuki Tanaka
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL
Masayuki Tanaka
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image Reconstruction
Masayuki Tanaka
 
Least Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintLeast Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 Constraint
Masayuki Tanaka
 
Lasso regression
Lasso regressionLasso regression
Lasso regression
Masayuki Tanaka
 

More from Masayuki Tanaka (20)

Slideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptationSlideshare breaking inter layer co-adaptation
Slideshare breaking inter layer co-adaptation
 
PRMU201902 Presentation document
PRMU201902 Presentation documentPRMU201902 Presentation document
PRMU201902 Presentation document
 
Gradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image EnhancementGradient-Based Low-Light Image Enhancement
Gradient-Based Low-Light Image Enhancement
 
Year-End Seminar 2018
Year-End Seminar 2018Year-End Seminar 2018
Year-End Seminar 2018
 
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
遠赤外線カメラと可視カメラを利用した悪条件下における画像取得
 
クリエイティブ・コモンズ
クリエイティブ・コモンズクリエイティブ・コモンズ
クリエイティブ・コモンズ
 
デザイン4原則
デザイン4原則デザイン4原則
デザイン4原則
 
メラビアンの法則
メラビアンの法則メラビアンの法則
メラビアンの法則
 
類似性の法則
類似性の法則類似性の法則
類似性の法則
 
権威に訴える論証
権威に訴える論証権威に訴える論証
権威に訴える論証
 
Chain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagationChain rule of deep neural network layer for back propagation
Chain rule of deep neural network layer for back propagation
 
Give Me Four
Give Me FourGive Me Four
Give Me Four
 
Tech art 20170315
Tech art 20170315Tech art 20170315
Tech art 20170315
 
My Slide Theme
My Slide ThemeMy Slide Theme
My Slide Theme
 
Font Memo
Font MemoFont Memo
Font Memo
 
One-point for presentation
One-point for presentationOne-point for presentation
One-point for presentation
 
ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL ADMM algorithm in ProxImaL
ADMM algorithm in ProxImaL
 
Intensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image ReconstructionIntensity Constraint Gradient-Based Image Reconstruction
Intensity Constraint Gradient-Based Image Reconstruction
 
Least Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 ConstraintLeast Square with L0, L1, and L2 Constraint
Least Square with L0, L1, and L2 Constraint
 
Lasso regression
Lasso regressionLasso regression
Lasso regression
 

Recently uploaded

NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
pablovgd
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
muralinath2
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
Sérgio Sacani
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
kumarmathi863
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
sachin783648
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
IqrimaNabilatulhusni
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
moosaasad1975
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
Richard Gill
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
Areesha Ahmad
 

Recently uploaded (20)

NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
platelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptxplatelets_clotting_biogenesis.clot retractionpptx
platelets_clotting_biogenesis.clot retractionpptx
 
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
Structures and textures of metamorphic rocks
Structures and textures of metamorphic rocksStructures and textures of metamorphic rocks
Structures and textures of metamorphic rocks
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
 
general properties of oerganologametal.ppt
general properties of oerganologametal.pptgeneral properties of oerganologametal.ppt
general properties of oerganologametal.ppt
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
 

Learnable Image Encryption

  • 2. Big data for deep learning 1 Deep network The deep learning is a very powerful tool. Efficient algorithms High performance computer Big data
  • 3. Big Data includes a Big Privacy Issue 2 Surveillance camera Big data We cannot use those data for learning. Privacy protection Only owner and police can access with limited purpose. Motivation: How can we take advantage of the big data with privacy protection?
  • 4. Practical Case 3 Shopping mall owner: They want to analyze customer’s behavior. They have a big data, but they don’t have enough knowledge to develop software. They have to protect customer’s privacy. Engineering company: They want to develop analysis system. They have enough knowledge to develop software, but they don’t have a big data. They face privacy issue. Police: They don’t care about customer’s behavior.
  • 5. Image Encryption 4 Image encryption helps to protect the privacy. Original data Encrypted data Key Encryption Decryption Image encryption can protect the privacy. But, we cannot use the encrypted data for the learning. Human understandable Machine learnable Human non-understandable Machine non-learnable
  • 6. Homomorphic Encryption 5 𝐸𝑛𝑐 𝑋 + 𝐸𝑛𝑐 𝑌 = 𝐸𝑛𝑐(𝑋 + 𝑌) Homomorphic Encryption will solve that problem. Original data Encrypted data Homomorphic encryption + − × ÷ + − × ÷ Calculation after encryption Encryption after calculation = Human non-understandable Machine calculable Still developing Very limited calculation Very heavy computation
  • 7. Learnable Image Encryption 6 We propose a novel concept of a learnable image encryption. Original data Relatively weak encryption Powerful calculation (Deep learning) Encrypted data Human non-understandable Machine learnable This combination allows us the deep learning with the encrypted data. It means that we can avoid the privacy issue.
  • 8. Summary of learning frameworks 7 Traditional learning framework Naive combination of image encryption and learning Proposed learnable image encryption Training with human understandable data Training with human understandable data Training with humannon-understandable data
  • 9. -1 -1 -1 -1 1 2 3 4 1 2 3 4 Algorithm of learnable image encryption 8 Input original image Block-wise operation 1 2 3 41 2 3 4 1 2 3 4 1 2 3 4 Rearrange intensity values in a row Shuffling 12 34 1 234 12 3 4 12 34 1 234 12 3 4 Reverse several values 3 2 3 1 1 1 4 42 4 2 3 Rearrange intensity values as an RGB image Block-wise operation Output encrypted image Block-size BxB Key
  • 10. -1 -1 -1 -1 1 2 3 4 1 2 3 4 Image decryption 9 Output original image Block-wise operation 1 2 3 41 2 3 4 1 2 3 4 1 2 3 4 Rearrange intensity values in a row Inverse shuffling 12 34 1 234 12 3 4 12 34 1 234 12 3 4 Reverse several values 3 2 3 1 1 1 4 42 4 2 3 Rearrange intensity values as an RGB image Block-wise operation Input encrypted image Block-size BxB Key
  • 11. Network for encrypted images 10 Block-size BxB Encrypted image Conv2D BxB sized filter with BxB stride Upsampling network BxB factor Classical network
  • 12. Experimental results 11 Proposed High accuracy, but human understandable Plain image Comparable high accuracy, and human non-understandable
  • 13. Summary 12 Proposed learnable image encryption Training with humannon-understandable data We have proposed a novel concept of learnable image encryption. It has potential to learn with encrypted image data. Keys: Block-wise relatively weak image encryption. Powerful calculation with the deep learning. Code available: http://www.ok.sc.e.titech.ac.jp/~mtanaka/proj/imagescramble/ Google by “learnable image encryption” Human non-understandable and machine learnable

Editor's Notes

  1. I’m Masayuki Tanaka from Japan. Today, I will introduce a new concept of a learnable image encryption.
  2. Now a day, a big data based learning or the deep learning is know as very powerful tool. We can find the deep learning in everywhere. Here is three key components for the deep learning: Big data, high performance computer, and efficient algorithm. For the high performance computer, many companies are investing a lot of money to get many many GPUs. We also need the efficient algorithms, in other words, we need talented and smart young researchers. OK, those two components are, of course, important. However, in this presentation, I will be focusing on the big data.
  3. We can get billions or trillions of mages everyday. However, we cannot utilize those billions of images for the deep learning. There are several challenges. But, one of those challenges is privacy issue. I can say big data includes big privacy issue. For example, let’s consider the surveillance camera case. As I said, each surveillance camera produces a lot of images everyday. However, almost all images are just threw away without using for the deep learning. The reason is the privacy protection. Usually, we cannot access those data. Only surveillance camera owner or the police can access those data, but with very limited purpose. So, my motivation is: How can we take advantage of the big data with the privacy protection.
  4. Let’s consider more practical case. First is the shopping mall owner. They want to analyze customer’s behavior. They already have a big data, but they don’t have enough knowledge to develop software which analyze customer’s behavior. Of course, they have to protect customer’s privacy. Second is engineering company. Usually, we are in those categories. They want to develop analysis system for business. They have enough knowledge to develop software, but they don’t have a big data. They have tried to access the big data which the shopping mall owner has. However, they faced privacy issue. Third is police or other authorized association. It is very simple. They might be able to access any kind of data, may be. But, they don’t care about customer’s behavior and to develop the software.
  5. Now, I will move to technical aspect. Image encryption is very helpful to protect the privacy. There are already a lot of encryption algorithms. Here, I’d like to introduce very simple case. The original data is encrypted with the special key. Then, only the person who knows that key can reconstruct or decrypted to the original image. We have good news in terms of the privacy. The encrypted data is human non-understandable. It means the privacy can be protected. However, nobody can utilized those encrypted data for the deep learning.
  6. To overcome this problem. Homomorphic encryption algorithm has been intensively researched. Homomorphic encryption has very good properties. We can apply arithmetic operation or we can calculate in encrypted domain. Namely, it is guaranteed that Calculation after Encryption equals Encryption after Calculation. It is very very good property. I can say the encrypted data by the homomorphic encryption is human non-understandable and machine calculable. That is great properties and many people want to use. However, this technique is still developing, and very very limited calculation and very heavy computation. I hope that this homomorphic encryption will work soon, however, right now, we can not use this homomorphic encryption is very challenge to apply the deep learning. 演算 Arithmetic operation
  7. Then, in this presentation, I’d like to propose a new concept of the learnable image encryption. The learnable image encryption consists of two components: relatively weak encryption and powerful calculation like deep learning. Even if the encryption is relatively weak, human cannot understand the encrypted data. In addition, the powerful calculation algorithm like the deep learning can lean the encrypted data. This is the proposed concept. If we can find that kind of balance, this combination allows us the deep learning with the encrypted data. Again, human cannot understand the encrypted data. So, we can avoid the privacy issue.
  8. Here is summary of learning frameworks with privacy issues. First is the traditional learning framework without considering the privacy issue. Plain images are directly used for the network learning. It is normal case, but in terms of the privacy, it is not good because every data is human understandable. Second is the naive combination of the image encryption and the learning. It apply image encryption. In this sense, the stored data is human non-understandable. However, of course, original data or the plain images should be reconstructed for the network learning. Actually, it is same as the traditional learning framework. Third, this is my proposal, is the learnable image encryption. We can learn with the encrypted and human non-understandable data. So, once we apply the learnable image encryption, we are free from the privacy issue.
  9. Now, I will explain processing pipeline of the proposed encryption algorithm. First and it is very important, the proposed algorithm is block-wise operation. We apply following operation block-by-block. I picked two-by-two bock for example. Those intensity data is rearrange into a single row. Then, apply the shuffling and reverse several values. This process corresponds to the key. Then, we have the encrypted single row data. This single row data is rearrange into the RGB image block. This encrypted image block is stored back. Again, the point is the block wise operation. Even if we apply the shuffling and the reverse operation to each block, each block still have the original information. It is the point.
  10. The image decryption is simple reverse process of the image encryption. Each block of encrypted image is rearranged into a single row data. Then, apply the reverse operation and the inverse shuffling. This operation is associated the key. If the person knows the shuffling algorithm and the position of the reverse, that person easily can reconstruct data. However, if the person don’t know those information, it is difficult to reconstruct the data.
  11. Next, I will show the network structure for the encrypted data. The image encryption is performed block-by-block. As I told you, each block includes original information. So, first, the network extracts those information block-wise operation manner. Then, the extracted features are upsampled to obtain the same size of input data. After that, we can apply the classical network. For this reason, the block-wise operation is very important and the key of this algorithm.
  12. I will show kind of the preliminary results. We have evaluated with cifar-10 and cifar-100 dataset. There are four approach, first, training with the plain image, it is the classical approach, second, is existing image shuffling algorithm, third, is the naive block wise pixel shuffling algorithm, fourth, is the proposed algorithm. As you can see, the plain image is human understandable, it is bad in terms of the privacy. However, the validation accuracy of the plain image is very good. Exsiting image shuffling algorithm, in terms of the privacy, it is done pretty good job. Human cannot understand the data. But, in the same time, machine cannot learn. As a result, we can get very lower validation accuracies compared with the results of the plain image. Naive block wise pixel shuffling, the performance or the validation accuracy of this is comparable to results of the plain image case. However, human can get some information from shuffled image. Compared to those encrypted image, I think that human cannot get meaningfull information from the data encrypted by the proposed algorithm. However, the machine can learn with those data. Actually, the performance is very comparable to the results of the plain image.
  13. Finally, I’d like to conclude as follows: We have propose the novel concept of the learning image encryption. Key components of the proposed algorithm are block-wise relatively weak image encryption and powerful calculation with the deep learning. The important properties of the proposed framework is human non-understandable and machine learnable. The code if available online, if you have interests, please try by yourself. Thanks,