Search Results for author: Hitoshi Kiya

Found 76 papers, 2 papers with code

Fine-Tuning Text-To-Image Diffusion Models for Class-Wise Spurious Feature Generation

no code implementations13 Feb 2024 AprilPyone MaungMaung, Huy H. Nguyen, Hitoshi Kiya, Isao Echizen

To this end, we utilize an existing approach of personalizing large-scale text-to-image diffusion models with available discovered spurious images and propose a new spurious feature similarity loss based on neural features of an adversarially robust model.

A Random Ensemble of Encrypted models for Enhancing Robustness against Adversarial Examples

no code implementations5 Jan 2024 Ryota Iijima, Sayaka Shiota, Hitoshi Kiya

In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.

Efficient Key-Based Adversarial Defense for ImageNet by Using Pre-trained Model

no code implementations28 Nov 2023 AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

In this paper, we propose key-based defense model proliferation by leveraging pre-trained models and utilizing recent efficient fine-tuning techniques on ImageNet-1k classification.

Adversarial Defense Image Classification

A privacy-preserving method using secret key for convolutional neural network-based speech classification

no code implementations6 Oct 2023 Shoko Niwa, Sayaka Shiota, Hitoshi Kiya

To promote research on privacy preservation for speech classification, we provide an encryption method with a secret key in CNN-based speech classification systems.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +5

Domain Adaptation for Efficiently Fine-tuning Vision Transformer with Encrypted Images

no code implementations5 Sep 2023 Teru Nagamori, Sayaka Shiota, Hitoshi Kiya

In recent years, deep neural networks (DNNs) trained with transformed data have been applied to various applications such as privacy-preserving learning, access control, and adversarial defenses.

Domain Adaptation Privacy Preserving

Hindering Adversarial Attacks with Multiple Encrypted Patch Embeddings

no code implementations4 Sep 2023 AprilPyone MaungMaung, Isao Echizen, Hitoshi Kiya

In this paper, we propose a new key-based defense focusing on both efficiency and robustness.

Enhanced Security against Adversarial Examples Using a Random Ensemble of Encrypted Vision Transformer Models

no code implementations26 Jul 2023 Ryota Iijima, Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

In previous studies, it was confirmed that the vision transformer (ViT) is more robust against the property of adversarial transferability than convolutional neural network (CNN) models such as ConvMixer, and moreover encrypted ViT is more robust than ViT without any encryption.

Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

no code implementations9 Mar 2023 AprilPyone MaungMaung, Hitoshi Kiya

By taking advantage of leaked information from encrypted images, we propose a guided generative model as an attack on learnable image encryption to recover personally identifiable visual information.

Privacy Preserving Privacy Preserving Deep Learning

Color-NeuraCrypt: Privacy-Preserving Color-Image Classification Using Extended Random Neural Networks

no code implementations12 Jan 2023 Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya

In recent years, with the development of cloud computing platforms, privacy-preserving methods for deep learning have become an urgent problem.

Cloud Computing Image Classification +1

A Privacy Preserving Method with a Random Orthogonal Matrix for ConvMixer Models

no code implementations10 Jan 2023 Rei Aso, Tatsuya Chuman, Hitoshi Kiya

In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models.

Classification Image Classification +1

Access Control with Encrypted Feature Maps for Object Detection Models

no code implementations29 Sep 2022 Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya

In an experiment, the protected models allowed authorized users to obtain almost the same performance as that of non-protected models but also with robustness against unauthorized access without a key.

Image Classification object-detection +1

On the Adversarial Transferability of ConvMixer Models

no code implementations19 Sep 2022 Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya

Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).

Image Classification

StyleGAN Encoder-Based Attack for Block Scrambled Face Images

no code implementations16 Sep 2022 AprilPyone MaungMaung, Hitoshi Kiya

In this paper, we propose an attack method to block scrambled face images, particularly Encryption-then-Compression (EtC) applied images by utilizing the existing powerful StyleGAN encoder and decoder for the first time.

On the Transferability of Adversarial Examples between Encrypted Models

no code implementations7 Sep 2022 Miki Tanaka, Isao Echizen, Hitoshi Kiya

Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).

Image Classification

An Access Control Method with Secret Key for Semantic Segmentation Models

no code implementations28 Aug 2022 Teru Nagamori, Ryota Iijima, Hitoshi Kiya

A novel method for access control with a secret key is proposed to protect models from unauthorized access in this paper.

Image Classification Segmentation +1

A Detection Method of Temporally Operated Videos Using Robust Hashing

no code implementations10 Aug 2022 Shoko Niwa, Miki Tanaka, Hitoshi Kiya

In addition, videos are temporally operated such as the insertion of new frames and the permutation of frames, of which operations are difficult to be detected by using conventional methods.

Privacy-Preserving Image Classification Using ConvMixer with Adaptive Permutation Matrix

no code implementations4 Aug 2022 Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya

In this paper, we propose a privacy-preserving image classification method using encrypted images under the use of the ConvMixer structure.

Classification Image Classification +1

Template matching with white balance adjustment under multiple illuminants

no code implementations3 Aug 2022 Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a novel template matching method with a white balancing adjustment, called N-white balancing, which was proposed for multi-illuminant scenes.

Color Constancy object-detection +2

An Encryption Method of ConvMixer Models without Performance Degradation

no code implementations25 Jul 2022 Ryota Iijima, Hitoshi Kiya

In an experiment, the effectiveness of the proposed method is evaluated in terms of classification accuracy and model protection in an image classification task on the CIFAR10 dataset.

Adversarial Defense Classification +2

Image and Model Transformation with Secret Key for Vision Transformer

no code implementations12 Jul 2022 Hitoshi Kiya, Ryota Iijima, MaungMaung AprilPyone, Yuma Kinoshita

In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key.

Image Classification

Access Control of Semantic Segmentation Models Using Encrypted Feature Maps

no code implementations11 Jun 2022 Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya

In this paper, we propose an access control method with a secret key for semantic segmentation models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models.

Segmentation Semantic Segmentation

Privacy-Preserving Image Classification Using Vision Transformer

no code implementations24 May 2022 Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a privacy-preserving image classification method that is based on the combined use of encrypted images and the vision transformer (ViT).

Classification Image Classification +2

Privacy-Preserving Image Classification Using Isotropic Network

no code implementations16 Apr 2022 AprilPyone MaungMaung, Hitoshi Kiya

In addition, compressible encrypted images, called encryption-then-compression (EtC) images, can be used for both training and testing without any adaptation network.

Classification Image Classification +1

On the predictability in reversible steganography

no code implementations5 Feb 2022 Ching-Chun Chang, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen

The core strength of neural networks is the ability to render accurate predictions for a bewildering variety of data.

Adversarial Detector with Robust Classifier

no code implementations5 Feb 2022 Takayuki Osakabe, MaungMaung AprilPyone, Sayaka Shiota, Hitoshi Kiya

Deep neural network (DNN) models are wellknown to easily misclassify prediction results by using input images with small perturbations, called adversarial examples.

A Privacy-Preserving Image Retrieval Scheme with a Mixture of Plain and EtC Images

no code implementations1 Feb 2022 Kenta Iida, Hitoshi Kiya

In this paper, we propose a novel content-based image-retrieval scheme that allows us to use a mixture of plain images and compressible encrypted ones called "encryption-then-compression (EtC) images."

Content-Based Image Retrieval Privacy Preserving +1

Access Control of Object Detection Models Using Encrypted Feature Maps

no code implementations1 Feb 2022 Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya

In this paper, the use of encrypted feature maps is shown to be effective in access control of object detection models for the first time.

Image Classification Object +3

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

no code implementations26 Jan 2022 Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota

In this paper, we focus on a class of image transformation referred to as learnable image encryption, which is applicable to privacy-preserving machine learning and adversarially robust defense.

BIG-bench Machine Learning Privacy Preserving

Protection of SVM Model with Secret Key from Unauthorized Access

no code implementations17 Nov 2021 Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya

In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models.

Self-Supervised Intrinsic Image Decomposition Network Considering Reflectance Consistency

no code implementations5 Nov 2021 Yuma Kinoshita, Hitoshi Kiya

Intrinsic image decomposition aims to decompose an image into illumination-invariant and illumination-variant components, referred to as ``reflectance'' and ``shading,'' respectively.

Intrinsic Image Decomposition

A Privacy-Preserving Image Retrieval Scheme Using A Codebook Generated From Independent Plain-Image Dataset

no code implementations4 Sep 2021 Kenta Iida, Hitoshi Kiya

In an experiment, the proposed scheme is demonstrated to maintain a high retrieval performance, even if codebooks are generated from a plain image dataset independent of image owners' encrypted images.

Image Retrieval Privacy Preserving +1

Spatially varying white balancing for mixed and non-uniform illuminants

no code implementations3 Sep 2021 Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a novel white balance adjustment, called "spatially varying white balancing," for single, mixed, and non-uniform illuminants.

Access Control Using Spatially Invariant Permutation of Feature Maps for Semantic Segmentation Models

no code implementations3 Sep 2021 Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

In an experiment, the protected models were demonstrated to allow rightful users to obtain almost the same performance as that of non-protected models but also to be robust against access by unauthorized users without a key.

Image Classification Segmentation +1

A Protection Method of Trained CNN Model Using Feature Maps Transformed With Secret Key From Unauthorized Access

no code implementations1 Sep 2021 MaungMaung AprilPyone, Hitoshi Kiya

In this paper, we propose a model protection method for convolutional neural networks (CNNs) with a secret key so that authorized users get a high classification accuracy, and unauthorized users get a low classification accuracy.

Classification

A universal detector of CNN-generated images using properties of checkerboard artifacts in the frequency domain

no code implementations4 Aug 2021 Miki Tanaka, Sayaka Shiota, Hitoshi Kiya

In addition, an ensemble of the proposed detector with emphasized spectrums and a conventional detector is proposed to improve the performance of these methods.

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

no code implementations20 Jul 2021 Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

Since production-level trained deep neural networks (DNNs) are of a great business value, protecting such DNN models against copyright infringement and unauthorized access is in a rising demand.

Image Classification Segmentation +1

Separated-Spectral-Distribution Estimation Based on Bayesian Inference with Single RGB Camera

no code implementations1 Jun 2021 Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a novel method for separately estimating spectral distributions from images captured by a typical RGB camera.

Bayesian Inference

A Protection Method of Trained CNN Model with Secret Key from Unauthorized Access

no code implementations31 May 2021 AprilPyone MaungMaung, Hitoshi Kiya

In this paper, we propose a novel method for protecting convolutional neural network (CNN) models with a secret key set so that unauthorized users without the correct key set cannot access trained models.

Multi-color balance for color constancy

no code implementations21 May 2021 Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a novel multi-color balance adjustment for color constancy.

Color Constancy

Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key

no code implementations9 Apr 2021 MaungMaung AprilPyone, Hitoshi Kiya

In this paper, we propose a novel DNN watermarking method that utilizes a learnable image transformation method with a secret key.

Generation of Gradient-Preserving Images allowing HOG Feature Extraction

no code implementations3 Apr 2021 Masaki Kitayama, Hitoshi Kiya

In this paper, we propose a method for generating visually protected images, referred to as gradient-preserving images.

BIG-bench Machine Learning Face Recognition +1

Transfer Learning-Based Model Protection With Secret Key

no code implementations5 Mar 2021 MaungMaung AprilPyone, Hitoshi Kiya

Models with pre-trained weights are fine-tuned by using such transformed images.

Transfer Learning

Difficulty in estimating visual information from randomly sampled images

no code implementations16 Dec 2020 Masaki Kitayama, Hitoshi Kiya

In this paper, we evaluate dimensionality reduction methods in terms of difficulty in estimating visual information on original images from dimensionally reduced ones.

BIG-bench Machine Learning Dimensionality Reduction +2

Ensemble of Models Trained by Key-based Transformed Images for Adversarially Robust Defense Against Black-box Attacks

no code implementations16 Nov 2020 MaungMaung AprilPyone, Hitoshi Kiya

In the proposed ensemble, a number of models are trained by using images transformed with different keys and block sizes, and then a voting ensemble is applied to the models.

Image Classification

A Privacy-Preserving Content-Based Image Retrieval Scheme Allowing Mixed Use Of Encrypted And Plain Images

no code implementations31 Oct 2020 Kenta Iida, Hitoshi Kiya

In an experiment, the proposed scheme is demonstrated to have the same performance as conventional retrieval methods with plain images, even under the mixed use of plain images and EtC ones.

Content-Based Image Retrieval Privacy Preserving +1

Checkerboard-Artifact-Free Image-Enhancement Network Considering Local and Global Features

no code implementations13 Oct 2020 Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a novel convolutional neural network (CNN) that never causes checkerboard artifacts, for image enhancement.

Image Enhancement Image-to-Image Translation +2

Block-wise Image Transformation with Secret Key for Adversarially Robust Defense

no code implementations2 Oct 2020 MaungMaung AprilPyone, Hitoshi Kiya

In the best-case scenario, a model trained by using images transformed by FFX Encryption (block size of 4) yielded an accuracy of 92. 30% on clean images and 91. 48% under PGD attack with a noise distance of 8/255, which is close to the non-robust accuracy (95. 45%) for the CIFAR-10 dataset, and it yielded an accuracy of 72. 18% on clean images and 71. 43% under the same attack, which is also close to the standard accuracy (73. 70%) for the ImageNet dataset.

Extension of JPEG XS for Two-Layer Lossless Coding

no code implementations11 Aug 2020 Hiroyuki Kobayashi, Hitoshi Kiya

The proposed method has a two-layer structure similar to JPEG XT, which consists of JPEG XS coding and a lossless coding method.

Vocal Bursts Valence Prediction

Training DNN Model with Secret Key for Model Protection

no code implementations6 Aug 2020 MaungMaung AprilPyone, Hitoshi Kiya

In this paper, we propose a model protection method by using block-wise pixel shuffling with a secret key as a preprocessing technique to input images for the first time.

Encryption Inspired Adversarial Defense for Visual Classification

no code implementations16 May 2020 MaungMaung AprilPyone, Hitoshi Kiya

The experiments are carried out on both adaptive and non-adaptive maximum-norm bounded white-box attacks while considering obfuscated gradients.

Adversarial Defense Classification +1

Fixed smooth convolutional layer for avoiding checkerboard artifacts in CNNs

no code implementations6 Feb 2020 Yuma Kinoshita, Hitoshi Kiya

In an image-classification experiment with four CNNs: a simple CNN, VGG8, ResNet-18, and ResNet-101, applying the fixed layers to these CNNs is shown to improve the classification performance of all CNNs.

General Classification Image Classification +1

Privacy-Preserving Machine Learning Using EtC Images

no code implementations1 Nov 2019 Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya

In this paper, we propose a novel privacy-preserving machine learning scheme with encrypted images, called EtC (Encryption-then-Compression) images.

BIG-bench Machine Learning Dimensionality Reduction +1

An Image Fusion Scheme for Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures

no code implementations22 Aug 2019 Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

This paper proposes a novel multi-exposure image fusion (MEF) scheme for single-shot high dynamic range imaging with spatially varying exposures (SVE).

Multi-Exposure Image Fusion Scene Segmentation

Single-Shot High Dynamic Range Imaging with Spatially Varying Exposures Considering Hue Distortion

no code implementations1 Aug 2019 Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

We proposes a novel single-shot high dynamic range imaging scheme with spatially varying exposures (SVE) considering hue distortion.

Two-layer Near-lossless HDR Coding with Backward Compatibility to JPEG

no code implementations9 May 2019 Hiroyuki Kobayashi, Osamu Watanabe, Hitoshi Kiya

The experimental results indicate that the proposed method exhibits not only a better near-lossless compression performance than that of the two-layer coding method of the JPEG XT, but also there are no issue regarding the combination of parameter values without losing backward compatibility to the JPEG standard.

Image Compression Quantization +1

Convolutional Neural Networks Considering Local and Global features for Image Enhancement

no code implementations7 May 2019 Yuma Kinoshita, Hitoshi Kiya

To handle both local and global features, the proposed architecture consists of three networks: a local encoder, a global encoder, and a decoder.

Image Enhancement

HOG feature extraction from encrypted images for privacy-preserving machine learning

no code implementations29 Apr 2019 Masaki Kitayama, Hitoshi Kiya

In this paper, we propose an extraction method of HOG (histograms-of-oriented-gradients) features from encryption-then-compression (EtC) images for privacy-preserving machine learning, where EtC images are images encrypted by a block-based encryption method proposed for EtC systems with JPEG compression, and HOG is a feature descriptor used in computer vision for the purpose of object detection and image classification.

BIG-bench Machine Learning Cloud Computing +4

JPEG XT Image Compression with Hue Compensation for Two-Layer HDR Coding

no code implementations25 Apr 2019 Hiroyuki Kobayashi, Hitoshi Kiya

In order to suppress the color distortion, we apply a novel hue compensation method based on the maximally saturated colors.

Image Compression Tone Mapping

A Noise-aware Enhancement Method for Underexposed Images

no code implementations24 Apr 2019 Chien-Cheng Chien, Yuma Kinoshita, Hitoshi Kiya

These methods, however, have two problems: (1) The loss of details in bright regions due to over-enhancement of contrast.

Multimedia

Image Enhancement Network Trained by Using HDR images

no code implementations17 Jan 2019 Yuma Kinoshita, Hitoshi Kiya

Most of conventional image enhancement methods, including Retinex based methods, do not take into account restoring lost pixel values caused by clipping and quantizing.

Image Enhancement

A Retinex-based Image Enhancement Scheme with Noise Aware Shadow-up Function

no code implementations8 Nov 2018 Chien Cheng Chien, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

This paper proposes a novel image contrast enhancement method based on both a noise aware shadow-up function and Retinex (retina and cortex) decomposition.

Image Enhancement

Encryption-then-Compression Systems using Grayscale-based Image Encryption for JPEG Images

1 code implementation1 Nov 2018 Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya

These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks.

Cryptography and Security

Bitstream-Based JPEG Image Encryption with File-Size Preserving

no code implementations17 Aug 2018 Hiroyuki Kobayashi, Hitoshi Kiya

An encryption scheme of JPEG images in the bitstream domain is proposed.

Two-Layer Lossless HDR Coding using Histogram Packing Technique with Backward Compatibility to JPEG

no code implementations2 Aug 2018 Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya

The experimental results demonstrate that not only the proposed method has a better lossless compression performance than that of the JPEG XT, but also there is no need to determine image-dependent parameter values for good compression performance without losing the backward compatibility to the well known legacy JPEG standard.

Image Compression

A Pseudo Multi-Exposure Fusion Method Using Single Image

no code implementations1 Aug 2018 Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

The proposed method enables us to produce pseudo multi-exposure images from a single image.

Multi-Exposure Image Fusion

Two-layer Lossless HDR Coding considering Histogram Sparseness with Backward Compatibility to JPEG

no code implementations28 Jun 2018 Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya

The experimental results demonstrate that not only the proposed method has a better lossless compression performance than that of the JPEG XT, but also there is no need to determine image-dependent parameter values for good compression performance in spite of having the backward compatibility to the well known legacy JPEG standard.

Multi-Exposure Image Fusion Based on Exposure Compensation

no code implementations23 Jun 2018 Yuma Kinoshita, Taichi Yoshida, Sayaka Shiota, Hitoshi Kiya

This paper proposes a novel multi-exposure image fusion method based on exposure compensation.

Multi-Exposure Image Fusion

Super-Resolution using Convolutional Neural Networks without Any Checkerboard Artifacts

1 code implementation7 Jun 2018 Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya

It is well-known that a number of excellent super-resolution (SR) methods using convolutional neural networks (CNNs) generate checkerboard artifacts.

Super-Resolution

Automatic Exposure Compensation for Multi-Exposure Image Fusion

no code implementations29 May 2018 Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya

In conventional works, it has been pointed out that the quality of those multi-exposure images can be improved by adjusting the luminance of them.

Multi-Exposure Image Fusion

Cannot find the paper you are looking for? You can Submit a new open access paper.