IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images
with Deep Learning
- URL: http://arxiv.org/abs/2211.11565v1
- Date: Fri, 18 Nov 2022 12:20:40 GMT
- Title: IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images
with Deep Learning
- Authors: Vrizlynn L. L. Thing
- Abstract summary: In this paper, we describe our solution which is based on state-of-the-art deep convolutional neural networks and various data augmentation techniques.
Our solution achieved 1st place at the IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images Challenge.
- Score: 1.179179628317559
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Smart sensors, devices and systems deployed in smart cities have brought
improved physical protections to their citizens. Enhanced crime prevention, and
fire and life safety protection are achieved through these technologies that
perform motion detection, threat and actors profiling, and real-time alerts.
However, an important requirement in these increasingly prevalent deployments
is the preservation of privacy and enforcement of protection of personal
identifiable information. Thus, strong encryption and anonymization techniques
should be applied to the collected data. In this IEEE Big Data Cup 2022
challenge, different masking, encoding and homomorphic encryption techniques
were applied to the images to protect the privacy of their contents.
Participants are required to develop detection solutions to perform privacy
preserving matching of these images. In this paper, we describe our solution
which is based on state-of-the-art deep convolutional neural networks and
various data augmentation techniques. Our solution achieved 1st place at the
IEEE Big Data Cup 2022: Privacy Preserving Matching of Encrypted Images
Challenge.
Related papers
- CausalVE: Face Video Privacy Encryption via Causal Video Prediction [13.577971999457164]
With the proliferation of video and live-streaming websites, public-face video distribution and interactions pose greater privacy risks.
We propose a neural network framework, CausalVE, to address these shortcomings.
Our framework has good security in public video dissemination and outperforms state-of-the-art methods from a qualitative, quantitative, and visual point of view.
arXiv Detail & Related papers (2024-09-28T10:34:22Z) - Boosting Digital Safeguards: Blending Cryptography and Steganography [0.30783046172997025]
Steganography involves hiding data within another medium, thereby facilitating covert communication by making the message invisible.
This proposed approach takes advantage of the latest advancements in Artificial Intelligence (AI) and Deep Learning (DL), especially through the application of Generative Adversarial Networks (GANs)
The application of GANs enables a smart, secure system that utilizes the inherent sensitivity of neural networks to slight alterations in data.
arXiv Detail & Related papers (2024-04-09T03:36:39Z) - Privacy-Preserving Deep Learning Using Deformable Operators for Secure Task Learning [14.187385349716518]
Existing methods for privacy preservation rely on image encryption or perceptual transformation approaches.
We propose a novel Privacy-Preserving framework that uses a set of deformable operators for secure task learning.
arXiv Detail & Related papers (2024-04-08T19:46:20Z) - Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Diff-Privacy: Diffusion-based Face Privacy Protection [58.1021066224765]
In this paper, we propose a novel face privacy protection method based on diffusion models, dubbed Diff-Privacy.
Specifically, we train our proposed multi-scale image inversion module (MSI) to obtain a set of SDM format conditional embeddings of the original image.
Based on the conditional embeddings, we design corresponding embedding scheduling strategies and construct different energy functions during the denoising process to achieve anonymization and visual identity information hiding.
arXiv Detail & Related papers (2023-09-11T09:26:07Z) - OPOM: Customized Invisible Cloak towards Face Privacy Protection [58.07786010689529]
We investigate the face privacy protection from a technology standpoint based on a new type of customized cloak.
We propose a new method, named one person one mask (OPOM), to generate person-specific (class-wise) universal masks.
The effectiveness of the proposed method is evaluated on both common and celebrity datasets.
arXiv Detail & Related papers (2022-05-24T11:29:37Z) - Privacy-Preserving Image Acquisition Using Trainable Optical Kernel [50.1239616836174]
We propose a trainable image acquisition method that removes the sensitive identity revealing information in the optical domain before it reaches the image sensor.
As the sensitive content is suppressed before it reaches the image sensor, it does not enter the digital domain therefore is unretrievable by any sort of privacy attack.
arXiv Detail & Related papers (2021-06-28T11:08:14Z) - InfoScrub: Towards Attribute Privacy by Targeted Obfuscation [77.49428268918703]
We study techniques that allow individuals to limit the private information leaked in visual data.
We tackle this problem in a novel image obfuscation framework.
We find our approach generates obfuscated images faithful to the original input images, and additionally increase uncertainty by 6.2$times$ (or up to 0.85 bits) over the non-obfuscated counterparts.
arXiv Detail & Related papers (2020-05-20T19:48:04Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.