Speckle-based optical cryptosystem and its application for human face
recognition via deep learning
- URL: http://arxiv.org/abs/2201.11844v1
- Date: Wed, 26 Jan 2022 07:18:02 GMT
- Title: Speckle-based optical cryptosystem and its application for human face
recognition via deep learning
- Authors: Qi Zhao, Huanhao Li, Zhipeng Yu, Chi Man Woo, Tianting Zhong, Shengfu
Cheng, Yuanjin Zheng, Honglin Liu, Jie Tian, and Puxiang Lai
- Abstract summary: Face images are sensitive biometric data that should be carefully protected.
In this study, a plain yet high-efficient speckle-based optical cryptosystem is proposed and implemented.
The proposed cryptosystem has wide applicability, and it may open a new avenue for high-security complex information encryption and decryption.
- Score: 17.169570487230747
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Face recognition has recently become ubiquitous in many scenes for
authentication or security purposes. Meanwhile, there are increasing concerns
about the privacy of face images, which are sensitive biometric data that
should be carefully protected. Software-based cryptosystems are widely adopted
nowadays to encrypt face images, but the security level is limited by
insufficient digital secret key length or computing power. Hardware-based
optical cryptosystems can generate enormously longer secret keys and enable
encryption at light speed, but most reported optical methods, such as double
random phase encryption, are less compatible with other systems due to system
complexity. In this study, a plain yet high-efficient speckle-based optical
cryptosystem is proposed and implemented. A scattering ground glass is
exploited to generate physical secret keys of gigabit length and encrypt face
images via seemingly random optical speckles at light speed. Face images can
then be decrypted from the random speckles by a well-trained decryption neural
network, such that face recognition can be realized with up to 98% accuracy.
The proposed cryptosystem has wide applicability, and it may open a new avenue
for high-security complex information encryption and decryption by utilizing
optical speckles.
Related papers
- Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security [0.0]
We present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques.
Our approach leverages the E91 QKD protocol to generate a shared secret key between communicating parties.
This key is then hashed using the Secure Hash Algorithm (SHA) to provide a fixedlength, high-entropy key.
arXiv Detail & Related papers (2024-08-13T15:20:29Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Cryptanalysis and improvement of multimodal data encryption by
machine-learning-based system [0.0]
encryption algorithms to accommodate varied requirements of this field.
Best approach to analyzing an encryption algorithm is to identify a practical and efficient technique to break it.
arXiv Detail & Related papers (2024-02-24T10:02:21Z) - Lightweight Public Key Encryption in Post-Quantum Computing Era [0.0]
Confidentiality in our digital world is based on the security of cryptographic algorithms.
In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened.
Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class.
arXiv Detail & Related papers (2023-11-24T21:06:42Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Hiding Images in Deep Probabilistic Models [58.23127414572098]
We describe a different computational framework to hide images in deep probabilistic models.
Specifically, we use a DNN to model the probability density of cover images, and hide a secret image in one particular location of the learned distribution.
We demonstrate the feasibility of our SinGAN approach in terms of extraction accuracy and model security.
arXiv Detail & Related papers (2022-10-05T13:33:25Z) - Privacy-Preserving Face Recognition with Learnable Privacy Budgets in
Frequency Domain [77.8858706250075]
This paper proposes a privacy-preserving face recognition method using differential privacy in the frequency domain.
Our method performs very well with several classical face recognition test sets.
arXiv Detail & Related papers (2022-07-15T07:15:36Z) - High-dimensional encryption in optical fibers using machine learning [0.0]
We introduce a smart high-dimensional encryption protocol in which the propagation of spatial modes in multimode fibers is used as a natural mechanism for encryption.
Our on-fiber communication platform allows us to use spatial modes of light for high-dimensional bit-by-bit and byte-by-byte encoding.
arXiv Detail & Related papers (2021-08-13T22:36:33Z) - SISA: Securing Images by Selective Alteration [0.0]
We present a comparative analysis of the partial and full encryption of the photos.
Instead of encrypting or blurring the entire photograph, we only encode selected regions of the image.
We leverage the machine learning algorithms like Mask-RCNN and YOLO to select the region of interest.
arXiv Detail & Related papers (2021-06-20T05:31:47Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.