SISA: Securing Images by Selective Alteration
- URL: http://arxiv.org/abs/2106.11770v1
- Date: Sun, 20 Jun 2021 05:31:47 GMT
- Title: SISA: Securing Images by Selective Alteration
- Authors: Prutha Gaherwar, Shraddha Joshi, Raviraj Joshi, Rahul Khengare
- Abstract summary: We present a comparative analysis of the partial and full encryption of the photos.
Instead of encrypting or blurring the entire photograph, we only encode selected regions of the image.
We leverage the machine learning algorithms like Mask-RCNN and YOLO to select the region of interest.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With an increase in mobile and camera devices' popularity, digital content in
the form of images has increased drastically. As personal life is being
continuously documented in pictures, the risk of losing it to eavesdroppers is
a matter of grave concern. Secondary storage is the most preferred medium for
the storage of personal and other images. Our work is concerned with the
security of such images. While encryption is the best way to ensure image
security, full encryption and decryption is a computationally-intensive
process. Moreover, as cameras are getting better every day, image quality, and
thus, the pixel density has increased considerably. The increased pixel density
makes encryption and decryption more expensive. We, therefore, delve into
selective encryption and selective blurring based on the region of interest.
Instead of encrypting or blurring the entire photograph, we only encode
selected regions of the image. We present a comparative analysis of the partial
and full encryption of the photos. This kind of encoding will help us lower the
encryption overhead without compromising security. The applications utilizing
this technique will become more usable due to the reduction in the decryption
time. Additionally, blurred images being more readable than encrypted ones,
allowed us to define the level of security. We leverage the machine learning
algorithms like Mask-RCNN (Region-based convolutional neural network) and YOLO
(You Only Look Once) to select the region of interest. These algorithms have
set new benchmarks for object recognition. We develop an end to end system to
demonstrate our idea of selective encryption.
Related papers
- Enabling Practical and Privacy-Preserving Image Processing [5.526464269029825]
Homomorphic Encryption (FHE) enables computations on encrypted data, preserving confidentiality without the need for decryption.
Traditional FHE methods often encrypt images by monolithic data blocks, instead of pixels.
We propose and implement a pixel-level homomorphic encryption approach, iCHEETAH, based on the CKKS scheme.
arXiv Detail & Related papers (2024-09-05T14:22:02Z) - Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption [0.4711628883579317]
This study delves into the prevalent cryptographic methods and algorithms utilized for prevention and stream encryption.
It examines their encoding techniques such as advanced encryp-tion standard (AES), Blowfish, Twofish, Salsa20, and ChaCha20.
The results showed that ChaCha20 had the best average time for both encryp-tion and decryption, being over 50% faster than some other algorithms.
arXiv Detail & Related papers (2024-07-23T08:26:05Z) - Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Lightweight Public Key Encryption in Post-Quantum Computing Era [0.0]
Confidentiality in our digital world is based on the security of cryptographic algorithms.
In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened.
Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class.
arXiv Detail & Related papers (2023-11-24T21:06:42Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Speckle-based optical cryptosystem and its application for human face
recognition via deep learning [17.169570487230747]
Face images are sensitive biometric data that should be carefully protected.
In this study, a plain yet high-efficient speckle-based optical cryptosystem is proposed and implemented.
The proposed cryptosystem has wide applicability, and it may open a new avenue for high-security complex information encryption and decryption.
arXiv Detail & Related papers (2022-01-26T07:18:02Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - A Study of Face Obfuscation in ImageNet [94.2949777826947]
In this paper, we explore image obfuscation in the ImageNet challenge.
Most categories in the ImageNet challenge are not people categories; nevertheless, many incidental people are in the images.
We benchmark various deep neural networks on face-blurred images and observe a disparate impact on different categories.
Results show that features learned on face-blurred images are equally transferable.
arXiv Detail & Related papers (2021-03-10T17:11:34Z) - HERS: Homomorphically Encrypted Representation Search [56.87295029135185]
We present a method to search for a probe (or query) image representation against a large gallery in the encrypted domain.
Our encryption scheme is agnostic to how the fixed-length representation is obtained and can therefore be applied to any fixed-length representation in any application domain.
arXiv Detail & Related papers (2020-03-27T01:10:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.