no code implementations • 9 Mar 2023 • AprilPyone MaungMaung, Hitoshi Kiya
By taking advantage of leaked information from encrypted images, we propose a guided generative model as an attack on learnable image encryption to recover personally identifiable visual information.
no code implementations • 23 Jan 2023 • Teru Nagamori, Hitoshi Kiya
In recent years, privacy-preserving methods for deep learning have become an urgent problem.
no code implementations • 12 Jan 2023 • Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya
In recent years, with the development of cloud computing platforms, privacy-preserving methods for deep learning have become an urgent problem.
no code implementations • 10 Jan 2023 • Rei Aso, Tatsuya Chuman, Hitoshi Kiya
In this paper, a privacy preserving image classification method is proposed under the use of ConvMixer models.
no code implementations • 29 Sep 2022 • Teru Nagamori, Hiroki Ito, AprilPyone MaungMaung, Hitoshi Kiya
In an experiment, the protected models allowed authorized users to obtain almost the same performance as that of non-protected models but also with robustness against unauthorized access without a key.
no code implementations • 19 Sep 2022 • Ryota Iijima, Miki Tanaka, Isao Echizen, Hitoshi Kiya
Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).
no code implementations • 16 Sep 2022 • AprilPyone MaungMaung, Hitoshi Kiya
In this paper, we propose an attack method to block scrambled face images, particularly Encryption-then-Compression (EtC) applied images by utilizing the existing powerful StyleGAN encoder and decoder for the first time.
no code implementations • 7 Sep 2022 • Miki Tanaka, Isao Echizen, Hitoshi Kiya
Deep neural networks (DNNs) are well known to be vulnerable to adversarial examples (AEs).
no code implementations • 28 Aug 2022 • Teru Nagamori, Ryota Iijima, Hitoshi Kiya
A novel method for access control with a secret key is proposed to protect models from unauthorized access in this paper.
no code implementations • 10 Aug 2022 • Shoko Niwa, Miki Tanaka, Hitoshi Kiya
In addition, videos are temporally operated such as the insertion of new frames and the permutation of frames, of which operations are difficult to be detected by using conventional methods.
no code implementations • 4 Aug 2022 • Zheng Qi, AprilPyone MaungMaung, Hitoshi Kiya
In this paper, we propose a privacy-preserving image classification method using encrypted images under the use of the ConvMixer structure.
no code implementations • 3 Aug 2022 • Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel template matching method with a white balancing adjustment, called N-white balancing, which was proposed for multi-illuminant scenes.
no code implementations • 25 Jul 2022 • Ryota Iijima, Hitoshi Kiya
In an experiment, the effectiveness of the proposed method is evaluated in terms of classification accuracy and model protection in an image classification task on the CIFAR10 dataset.
no code implementations • 12 Jul 2022 • Hitoshi Kiya, Ryota Iijima, MaungMaung AprilPyone, Yuma Kinoshita
In this paper, we propose a combined use of transformed images and vision transformer (ViT) models transformed with a secret key.
no code implementations • 11 Jun 2022 • Hiroki Ito, AprilPyone MaungMaung, Sayaka Shiota, Hitoshi Kiya
In this paper, we propose an access control method with a secret key for semantic segmentation models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models.
no code implementations • 24 May 2022 • Zheng Qi, AprilPyone MaungMaung, Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a privacy-preserving image classification method that is based on the combined use of encrypted images and the vision transformer (ViT).
no code implementations • 16 Apr 2022 • AprilPyone MaungMaung, Hitoshi Kiya
In addition, compressible encrypted images, called encryption-then-compression (EtC) images, can be used for both training and testing without any adaptation network.
no code implementations • 5 Feb 2022 • Ching-Chun Chang, Xu Wang, Sisheng Chen, Hitoshi Kiya, Isao Echizen
The core strength of neural networks is the ability to render accurate predictions for a bewildering variety of data.
no code implementations • 5 Feb 2022 • Takayuki Osakabe, MaungMaung AprilPyone, Sayaka Shiota, Hitoshi Kiya
Deep neural network (DNN) models are wellknown to easily misclassify prediction results by using input images with small perturbations, called adversarial examples.
no code implementations • 1 Feb 2022 • Teru Nagamori, Hiroki Ito, April Pyone Maung Maung, Hitoshi Kiya
In this paper, the use of encrypted feature maps is shown to be effective in access control of object detection models for the first time.
no code implementations • 1 Feb 2022 • Kenta Iida, Hitoshi Kiya
In this paper, we propose a novel content-based image-retrieval scheme that allows us to use a mixture of plain images and compressible encrypted ones called "encryption-then-compression (EtC) images."
no code implementations • 26 Jan 2022 • Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota
In this paper, we focus on a class of image transformation referred to as learnable image encryption, which is applicable to privacy-preserving machine learning and adversarially robust defense.
no code implementations • 17 Nov 2021 • Ryota Iijima, AprilPyone MaungMaung, Hitoshi Kiya
In this paper, we propose a block-wise image transformation method with a secret key for support vector machine (SVM) models.
no code implementations • 5 Nov 2021 • Yuma Kinoshita, Hitoshi Kiya
Intrinsic image decomposition aims to decompose an image into illumination-invariant and illumination-variant components, referred to as ``reflectance'' and ``shading,'' respectively.
no code implementations • 4 Sep 2021 • Kenta Iida, Hitoshi Kiya
In an experiment, the proposed scheme is demonstrated to maintain a high retrieval performance, even if codebooks are generated from a plain image dataset independent of image owners' encrypted images.
no code implementations • 3 Sep 2021 • Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya
In an experiment, the protected models were demonstrated to allow rightful users to obtain almost the same performance as that of non-protected models but also to be robust against access by unauthorized users without a key.
no code implementations • 3 Sep 2021 • Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel white balance adjustment, called "spatially varying white balancing," for single, mixed, and non-uniform illuminants.
no code implementations • 1 Sep 2021 • MaungMaung AprilPyone, Hitoshi Kiya
In this paper, we propose a model protection method for convolutional neural networks (CNNs) with a secret key so that authorized users get a high classification accuracy, and unauthorized users get a low classification accuracy.
no code implementations • 4 Aug 2021 • Miki Tanaka, Sayaka Shiota, Hitoshi Kiya
In addition, an ensemble of the proposed detector with emphasized spectrums and a conventional detector is proposed to improve the performance of these methods.
no code implementations • 20 Jul 2021 • Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya
Since production-level trained deep neural networks (DNNs) are of a great business value, protecting such DNN models against copyright infringement and unauthorized access is in a rising demand.
no code implementations • 1 Jun 2021 • Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel method for separately estimating spectral distributions from images captured by a typical RGB camera.
no code implementations • 31 May 2021 • AprilPyone MaungMaung, Hitoshi Kiya
In this paper, we propose a novel method for protecting convolutional neural network (CNN) models with a secret key set so that unauthorized users without the correct key set cannot access trained models.
no code implementations • 21 May 2021 • Teruaki Akazawa, Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel multi-color balance adjustment for color constancy.
no code implementations • 9 Apr 2021 • MaungMaung AprilPyone, Hitoshi Kiya
In this paper, we propose a novel DNN watermarking method that utilizes a learnable image transformation method with a secret key.
no code implementations • 3 Apr 2021 • Masaki Kitayama, Hitoshi Kiya
In this paper, we propose a method for generating visually protected images, referred to as gradient-preserving images.
no code implementations • 5 Mar 2021 • MaungMaung AprilPyone, Hitoshi Kiya
Models with pre-trained weights are fine-tuned by using such transformed images.
no code implementations • 16 Dec 2020 • Masaki Kitayama, Hitoshi Kiya
In this paper, we evaluate dimensionality reduction methods in terms of difficulty in estimating visual information on original images from dimensionally reduced ones.
no code implementations • 1 Dec 2020 • Takayuki Osakabe, Miki Tanaka, Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel CycleGAN without checkerboard artifacts for counter-forensics of fake-image detection.
no code implementations • 16 Nov 2020 • MaungMaung AprilPyone, Hitoshi Kiya
In the proposed ensemble, a number of models are trained by using images transformed with different keys and block sizes, and then a voting ensemble is applied to the models.
no code implementations • 31 Oct 2020 • Kenta Iida, Hitoshi Kiya
In an experiment, the proposed scheme is demonstrated to have the same performance as conventional retrieval methods with plain images, even under the mixed use of plain images and EtC ones.
no code implementations • 13 Oct 2020 • Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel convolutional neural network (CNN) that never causes checkerboard artifacts, for image enhancement.
no code implementations • 2 Oct 2020 • MaungMaung AprilPyone, Hitoshi Kiya
In the best-case scenario, a model trained by using images transformed by FFX Encryption (block size of 4) yielded an accuracy of 92. 30% on clean images and 91. 48% under PGD attack with a noise distance of 8/255, which is close to the non-robust accuracy (95. 45%) for the CIFAR-10 dataset, and it yielded an accuracy of 72. 18% on clean images and 71. 43% under the same attack, which is also close to the standard accuracy (73. 70%) for the ImageNet dataset.
no code implementations • 11 Aug 2020 • Hiroyuki Kobayashi, Hitoshi Kiya
The proposed method has a two-layer structure similar to JPEG XT, which consists of JPEG XS coding and a lossless coding method.
no code implementations • 7 Aug 2020 • Hiroki Ito, Yuma Kinoshita, Hitoshi Kiya
We propose a transformation network for generating visually-protected images for privacy-preserving DNNs.
no code implementations • 6 Aug 2020 • MaungMaung AprilPyone, Hitoshi Kiya
In this paper, we propose a model protection method by using block-wise pixel shuffling with a secret key as a preprocessing technique to input images for the first time.
no code implementations • 16 May 2020 • MaungMaung AprilPyone, Hitoshi Kiya
The experiments are carried out on both adaptive and non-adaptive maximum-norm bounded white-box attacks while considering obfuscated gradients.
no code implementations • 6 Feb 2020 • Yuma Kinoshita, Hitoshi Kiya
In an image-classification experiment with four CNNs: a simple CNN, VGG8, ResNet-18, and ResNet-101, applying the fixed layers to these CNNs is shown to improve the classification performance of all CNNs.
no code implementations • 1 Nov 2019 • Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya
In this paper, we propose a novel privacy-preserving machine learning scheme with encrypted images, called EtC (Encryption-then-Compression) images.
no code implementations • 22 Aug 2019 • Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya
This paper proposes a novel multi-exposure image fusion (MEF) scheme for single-shot high dynamic range imaging with spatially varying exposures (SVE).
no code implementations • 1 Aug 2019 • Chihiro Go, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya
We proposes a novel single-shot high dynamic range imaging scheme with spatially varying exposures (SVE) considering hue distortion.
no code implementations • 31 Jul 2019 • MaungMaung AprilPyone, Warit Sirichotedumrong, Hitoshi Kiya
Data for deep learning should be protected for privacy preserving.
no code implementations • 25 Jul 2019 • Hiroyuki Kobayashi, Hitoshi Kiya
We proposed a lossless two-layer HDR coding method using a histogram packing technique.
no code implementations • 9 May 2019 • Hiroyuki Kobayashi, Osamu Watanabe, Hitoshi Kiya
The experimental results indicate that the proposed method exhibits not only a better near-lossless compression performance than that of the two-layer coding method of the JPEG XT, but also there are no issue regarding the combination of parameter values without losing backward compatibility to the JPEG standard.
no code implementations • 7 May 2019 • Yuma Kinoshita, Hitoshi Kiya
To handle both local and global features, the proposed architecture consists of three networks: a local encoder, a global encoder, and a decoder.
no code implementations • 29 Apr 2019 • Masaki Kitayama, Hitoshi Kiya
In this paper, we propose an extraction method of HOG (histograms-of-oriented-gradients) features from encryption-then-compression (EtC) images for privacy-preserving machine learning, where EtC images are images encrypted by a block-based encryption method proposed for EtC systems with JPEG compression, and HOG is a feature descriptor used in computer vision for the purpose of object detection and image classification.
no code implementations • 25 Apr 2019 • Hiroyuki Kobayashi, Hitoshi Kiya
In order to suppress the color distortion, we apply a novel hue compensation method based on the maximally saturated colors.
no code implementations • 24 Apr 2019 • Chien-Cheng Chien, Yuma Kinoshita, Hitoshi Kiya
These methods, however, have two problems: (1) The loss of details in bright regions due to over-enhancement of contrast.
Multimedia
no code implementations • 17 Jan 2019 • Yuma Kinoshita, Hitoshi Kiya
Most of conventional image enhancement methods, including Retinex based methods, do not take into account restoring lost pixel values caused by clipping and quantizing.
no code implementations • 8 Nov 2018 • Chien Cheng Chien, Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya
This paper proposes a novel image contrast enhancement method based on both a noise aware shadow-up function and Retinex (retina and cortex) decomposition.
no code implementations • 1 Nov 2018 • Tatsuya Chuman, Warit Sirichotedumrong, Hitoshi Kiya
These features enhance security against various attacks such as jigsaw puzzle solver and brute-force attacks.
Cryptography and Security
no code implementations • 17 Aug 2018 • Hiroyuki Kobayashi, Hitoshi Kiya
An encryption scheme of JPEG images in the bitstream domain is proposed.
no code implementations • 2 Aug 2018 • Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya
The experimental results demonstrate that not only the proposed method has a better lossless compression performance than that of the JPEG XT, but also there is no need to determine image-dependent parameter values for good compression performance without losing the backward compatibility to the well known legacy JPEG standard.
no code implementations • 1 Aug 2018 • Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya
The proposed method enables us to produce pseudo multi-exposure images from a single image.
no code implementations • 28 Jun 2018 • Osamu Watanabe, Hiroyuki Kobayashi, Hitoshi Kiya
The experimental results demonstrate that not only the proposed method has a better lossless compression performance than that of the JPEG XT, but also there is no need to determine image-dependent parameter values for good compression performance in spite of having the backward compatibility to the well known legacy JPEG standard.
no code implementations • 23 Jun 2018 • Yuma Kinoshita, Taichi Yoshida, Sayaka Shiota, Hitoshi Kiya
This paper proposes a novel multi-exposure image fusion method based on exposure compensation.
1 code implementation • 7 Jun 2018 • Yusuke Sugawara, Sayaka Shiota, Hitoshi Kiya
It is well-known that a number of excellent super-resolution (SR) methods using convolutional neural networks (CNNs) generate checkerboard artifacts.
no code implementations • 29 May 2018 • Yuma Kinoshita, Sayaka Shiota, Hitoshi Kiya
In conventional works, it has been pointed out that the quality of those multi-exposure images can be improved by adjusting the luminance of them.