IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning †
<p>Block-based perceptual encryption algorithms. (<b>a</b>) The conventional perceptual encryption scheme. (<b>b</b>) The proposed inter and intra block processing-based perceptual encryption scheme.</p> "> Figure 2
<p>Comparison of existing and proposed perceptual encryption methods for color image encryption. The label of a block shows its original location while the dashed square inside a block shows its orientation. The negative–positive transformed blocks are the shaded ones. The color of a block border shows shuffled channels. The dotted line shows sub-block division.</p> "> Figure 3
<p>Visual analysis of inter and intra block processing on example image from Tecnick dataset. (<b>a</b>) Plain image. (<b>b</b>) Conventional EtC method (16 × 16). (<b>c</b>–<b>e</b>) Encrypted image of the proposed method with sub–block size (8 × 8), (4 × 4), and (2 × 2), respectively. The last row shows enlarged image of the bottom left corner in each encrypted image. Compared to conventional methods, the proposed method achieves visual encryption of local details.</p> "> Figure 4
<p>Comparison of existing and proposed perceptual encryption methods for grayscale image encryption. The label of a block shows its original location while the dashed square inside a block shows its orientation. The negative–positive-transformed blocks are the shaded ones. The dotted line shows sub-block division.</p> "> Figure 5
<p>The DCT transform of the original and scrambled images. (<b>a</b>–<b>c</b>) DCT coefficients and (<b>d</b>–<b>f</b>) their quantized representations with <math display="inline"><semantics> <mrow> <mo> </mo> <msub> <mi>Q</mi> <mi>f</mi> </msub> <mo>=</mo> <mn>80</mn> </mrow> </semantics></math>. (<b>a</b>) Original image. (<b>b</b>) Conventional EtC image. (<b>c</b>) IIB–CPE image.</p> "> Figure 6
<p>The JPEG compression performance without chroma subsampling on different perceptual encryption methods in terms of rate distortion (RD) curves with respect to MS–SSIM (dB) on Tecnick color dataset. The number enclosed in parentheses at the end of each series name shows its performance rank. The overlapping regions in the graph are zoomed in and shown in the bottom right corner.</p> "> Figure 7
<p>The JPEG compression performance with chroma subsampling ratio (4:2:0) on different perceptual encryption methods in terms of rate distortion (RD) curves with respect to MS–SSIM (dB) on Tecnick color dataset. The number enclosed in parentheses at the end of each series name shows its performance rank. The overlapping regions in the graph are zoomed in and shown in the bottom right corner.</p> "> Figure 8
<p>The JPEG compression performance on different perceptual encryption methods in terms of rate distortion (RD) curves with respect to MS–SSIM (dB) on Shenzhen grayscale images dataset. The number enclosed in parentheses at the end of each series name shows its performance rank. The overlapping regions in the graph are zoomed in and shown in the bottom right corner.</p> "> Figure 9
<p>Images recovered from PE methods using different block sizes. The JPEG quality factor is 71. (<b>a</b>) The original image. (<b>b</b>) Image recovered from the plain image. (<b>c</b>–<b>f</b>) Images recovered from the Color–EtC method with block sizes (16 × 16, 8 × 8, 4 × 4, and 2 × 2), respectively. (<b>g</b>–<b>i</b>) Images recovered from the GS–EtC method with block sizes (8 × 8, 4 × 4, and 2 × 2), respectively. (<b>j</b>–<b>l</b>) Images recovered from the proposed with block sizes (8 × 8, 4 × 4, and 2 × 2), respectively. The boxed region in each image is zoomed in and shown on its left side.</p> "> Figure 10
<p>Images recovered from PE methods using different block sizes. The JPEG quality factor is 100. (<b>a</b>) The original image. (<b>b</b>) Image recovered from the plain image. (<b>c</b>–<b>f</b>) Images recovered from the Color–EtC method with block sizes (16 × 16, 8 × 8, 4 × 4, and 2 × 2), respectively. (<b>g</b>–<b>i</b>) Images recovered from the GS–EtC method with block sizes (8 × 8, 4 × 4, and 2 × 2), respectively. (<b>j</b>–<b>l</b>) Images recovered from the proposed with block sizes (8 × 8, 4 × 4, and 2 × 2), respectively. The boxed region in each image is zoomed in and shown on its left side.</p> "> Figure 11
<p>Classification accuracy (%) of the deep learning model in the encryption domain on CIFAR10 and CIFAR100 datasets.</p> ">
Abstract
:1. Introduction
2. Related Work
2.1. Perceptual Encryption Methods
2.2. Privacy-Preserving Deep Learning Methods
3. Methods
3.1. Conventional Compressible Perceptual Encryption Methods
Conventional EtC Methods for Grayscale Image Encryption
3.2. Proposed Method
3.2.1. Principle Design: Inside–Out Transformation
3.2.2. Proposed Compressible Perceptual Encryption Method
3.2.3. IIB–CPE for Grayscale Image Encryption
4. Simulation Results and Analysis
4.1. Energy Compaction Analysis
4.2. Compression Analysis
4.3. Encryption Analysis
4.4. Application: Privacy-Preserving Deep Learning
5. Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhang, Y. Test and Verification of AES Used for Image Encryption. 3d Res. 2018, 9, 3. [Google Scholar] [CrossRef]
- Arab, A.; Rostami, M.J.; Ghavami, B. An Image Encryption Method Based on Chaos System and AES Algorithm. J. Supercomput. 2019, 75, 6663–6682. [Google Scholar] [CrossRef] [Green Version]
- Ahmad, I.; Shin, S. A Novel Hybrid Image Encryption–Compression Scheme by Combining Chaos Theory and Number Theory. Signal Processing Image Commun. 2021, 98, 116418. [Google Scholar] [CrossRef]
- Chen, L.; Li, C.; Li, C. Security Measurement of a Medical Communication Scheme Based on Chaos and DNA Coding. J. Vis. Commun. Image Represent. 2022, 83, 103424. [Google Scholar] [CrossRef]
- Tanaka, M. Learnable Image Encryption. arXiv 2018, arXiv:1804.00490. [Google Scholar]
- Sirichotedumrong, W.; Kinoshita, Y.; Kiya, H. Pixel–Based Image Encryption Without Key Management for Privacy–Preserving Deep Neural Networks. IEEE Access 2019, 7, 177844–177855. [Google Scholar] [CrossRef]
- Madono, K.; Tanaka, M.; Onishi, M.; Ogawa, T. Block-Wise Scrambled Image Recognition Using Adaptation Network. arXiv 2020, arXiv:2001.07761. [Google Scholar]
- Ahmad, I.; Shin, S. A Pixel–Based Encryption Method for Privacy–Preserving Deep Learning Models. arXiv 2022, arXiv:2203.16780. [Google Scholar]
- Chang, A.H.; Case, B.M. Attacks on Image Encryption Schemes for Privacy–Preserving Deep Neural Networks. arXiv 2020, arXiv:2004.13263. [Google Scholar]
- Kurihara, K.; Shiota, S.; Kiya, H. An Encryption–Then–Compression System for JPEG Standard. In Proceedings of the 2015 Picture Coding Symposium (PCS), Cairns, Australia, 31 May–3 June 2015; IEEE: Cairns, Australia, 2015; pp. 119–123. [Google Scholar]
- Kurihara, K.; Kikuchi, M.; Imaizumi, S.; Shiota, S.; Kiya, H. An Encryption–Then–Compression System for JPEG/Motion JPEG Standard. IEICE Trans. Fundam. 2015, E98.A, 2238–2245. [Google Scholar] [CrossRef]
- Ahmad, I.; Shin, S. Encryption–Then–Compression System for Cloud–Based Medical Image Services. In Proceedings of the 2022 International Conference on Information Networking (ICOIN), Jeju–si, Korea, 12 January 2022; IEEE: Jeju–si, Korea, 2022; pp. 30–33. [Google Scholar]
- Chuman, T.; Sirichotedumrong, W.; Kiya, H. Encryption–Then–Compression Systems Using Grayscale–Based Image Encryption for JPEG Images. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1515–1525. [Google Scholar] [CrossRef] [Green Version]
- Sirichotedumrong, W.; Kiya, H. Grayscale–Based Block Scrambling Image Encryption Using YCbCr Color Space for Encryption–Then–Compression Systems. APSIPA Trans. Signal Inf. Processing 2019, 8, e7. [Google Scholar] [CrossRef] [Green Version]
- Kurihara, K.; Imaizumi, S.; Shiota, S.; Kiya, H. An Encryption–Then–Compression System for Lossless Image Compression Standards. IEICE Trans. Inf. Syst. 2017, E100.D, 52–56. [Google Scholar] [CrossRef] [Green Version]
- Imaizumi, S.; Kiya, H. A Block–Permutation–Based Encryption Scheme with Independent Processing of RGB Components. IEICE Trans. Inf. Syst. 2018, E101.D, 3150–3157. [Google Scholar] [CrossRef]
- Kawamura, A.; Kinoshita, Y.; Nakachi, T.; Shiota, S.; Kiya, H. A Privacy–Preserving Machine Learning Scheme Using EtC Images. IEICE Trans. Fundam. 2020, E103.A, 1571–1578. [Google Scholar] [CrossRef]
- Ahmad, I.; Kim, E.; Hwang, S.-S.; Shin, S. Privacy–Preserving Surveillance for Smart Cities. In Proceedings of the 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN), Barcelona, Spain, 5 July 2022. [Google Scholar]
- AprilPyone, M.; Kiya, H. Privacy–Preserving Image Classification Using an Isotropic Network. IEEE MultiMedia 2022, 29, 23–33. [Google Scholar] [CrossRef]
- Chuman, T.; Kurihara, K.; Kiya, H. On the Security of Block Scrambling–Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks. IEICE Trans. Inf. Syst. 2018, E101.D, 37–44. [Google Scholar] [CrossRef] [Green Version]
- Iida, K.; Kiya, H. Privacy–Preserving Content–Based Image Retrieval Using Compressible Encrypted Images. IEEE Access 2020, 8, 200038–200050. [Google Scholar] [CrossRef]
- Ahmad, I.; Shin, S. A Perceptual Encryption–Based Image Communication System for Deep Learning–Based Tuberculosis Diagnosis Using Healthcare Cloud Services. Electronics 2022, 11, 2514. [Google Scholar] [CrossRef]
- Gallagher, A.C. Jigsaw Puzzles with Pieces of Unknown Orientation. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012; IEEE: Providence, RI, USA, 2012; pp. 382–389. [Google Scholar]
- Nishchal, N.K. Optical Cryptosystems; IOP Publishing: Bristol, UK, 2020; ISBN 978-0-7503-2220-1. [Google Scholar]
- Alfalou, A.; Brosseau, C. Optical Image Compression and Encryption Methods. Adv. Opt. Photon. 2009, 1, 589. [Google Scholar] [CrossRef] [Green Version]
- Huang, Q.-X.; Yap, W.L.; Chiu, M.-Y.; Sun, H.-M. Privacy–Preserving Deep Learning with Learnable Image Encryption on Medical Images. IEEE Access 2022, 10, 66345–66355. [Google Scholar] [CrossRef]
- Yi, F.; Jeong, O.; Moon, I. Privacy–Preserving Image Classification with Deep Learning and Double Random Phase Encoding. IEEE Access 2021, 9, 136126–136134. [Google Scholar] [CrossRef]
- Martin, A.D.; Ahmadzadeh, E.; Moon, I. Privacy–Preserving Image Captioning with Deep Learning and Double Random Phase Encoding. Mathematics 2022, 10, 2859. [Google Scholar] [CrossRef]
- Asuni, N.; Giachetti, A. TESTIMAGES: A Large–Scale Archive for Testing Visual Devices and Basic Image Processing Algorithms. In Smart Tools and Apps for Graphics—Eurographics Italian Chapter Conference; The Eurographics Association: Reims, France, 2014; p. 8. [Google Scholar] [CrossRef]
- Jaeger, S.; Candemir, S.; Antani, S.; Wáng, Y.-X.J.; Lu, P.-X.; Thoma, G. Two Public Chest X–Ray Datasets for Computer–Aided Screening of Pulmonary Diseases. Quant. Imaging Med. Surg. 2014, 4, 475–477. [Google Scholar] [CrossRef] [PubMed]
- Krizhevsky, A. Learning Multiple Layers of Features from Tiny Images; University of Toronto: Toronto, ON, Canada, 2012. [Google Scholar]
- Independent JPEG Group. Available online: http://www.ijg.org/ (accessed on 28 July 2021).
- Ahmed, N.; Natarajan, T.; Rao, K.R. Discrete Cosine Transform. IEEE Trans. Comput. 1974, C–23, 90–93. [Google Scholar] [CrossRef]
- Wallace, G.K. The JPEG Still Picture Compression Standard. IEEE Trans. Consum. Electron. 1992, 38, xviii–xxxiv. [Google Scholar] [CrossRef]
- Bjøntegaard, G. Calculation of Average PSNR Differences between RD–Curves. Doc. VCEG-M33 ITU-T Q6/16. In Proceedings of the 13th VCEG Meeting, Austin, TX, USA, 2–4 April 2001. [Google Scholar]
- Wang, Z.; Simoncelli, E.P.; Bovik, A.C. Multiscale Structural Similarity for Image Quality Assessment. In Proceedings of the Thirty-Seventh Asilomar Conference on Signals, Systems & Computers, Pacific Grove, CA, USA, 9–12 November 2003; pp. 1398–1402. [Google Scholar]
- Lukac, R. (Ed.) Perceptual Digital Imaging: Methods and Applications; Digital Imaging and Computer Vision Series; CRC Press, Taylor & Francis Group: Boca Raton, FL, USA, 2013; ISBN 978-1-4398-6856-0. [Google Scholar]
- Cho, T.S.; Avidan, S.; Freeman, W.T. A Probabilistic Image Jigsaw Puzzle Solver. In Proceedings of the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, CA, USA, 13–18 June 2010; pp. 183–190. [Google Scholar]
- Konečný, J.; McMahan, B.; Ramage, D. Federated Optimization:Distributed Optimization Beyond the Datacenter. arXiv 2015, arXiv:1511.03575. [Google Scholar]
- Kim, M.; Lee, J. Information–Theoretic Privacy in Federated Submodel Learning. ICT Express 2022, S2405959522000297. [Google Scholar] [CrossRef]
- Kaissis, G.A.; Makowski, M.R.; Rückert, D.; Braren, R.F. Secure, Privacy–Preserving and Federated Machine Learning in Medical Imaging. Nat. Mach. Intell. 2020, 2, 305–311. [Google Scholar] [CrossRef]
- Dwork, C.; Roth, A. The Algorithmic Foundations of Differential Privacy. FNT Theor. Comput. Sci. 2013, 9, 211–407. [Google Scholar] [CrossRef]
- Acar, A.; Aksu, H.; Uluagac, A.S.; Conti, M. A Survey on Homomorphic Encryption Schemes: Theory and Implementation. arXiv 2017, arXiv:1704.03578. [Google Scholar] [CrossRef]
- Zhao, C.; Zhao, S.; Zhao, M.; Chen, Z.; Gao, C.-Z.; Li, H.; Tan, Y. Secure Multi–Party Computation: Theory, Practice and Applications. Inf. Sci. 2019, 476, 357–372. [Google Scholar] [CrossRef]
- Han, D.; Kim, J.; Kim, J. Deep Pyramidal Residual Networks. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA, 21–26 July 2017; pp. 6307–6315. [Google Scholar]
- Yamada, Y.; Iwamura, M.; Akiba, T.; Kise, K. Shakedrop Regularization for Deep Residual Learning. IEEE Access 2019, 7, 186126–186136. [Google Scholar] [CrossRef]
- Dosovitskiy, A.; Beyer, L.; Kolesnikov, A.; Weissenborn, D.; Zhai, X.; Unterthiner, T.; Dehghani, M.; Minderer, M.; Heigold, G.; Gelly, S.; et al. An Image Is Worth 16 × 16 Words: Transformers for Image Recognition at Scale. arXiv 2020, arXiv:2010.11929. [Google Scholar] [CrossRef]
- Trockman, A.; Kolter, J.Z. Patches Are All You Need? arXiv 2022, arXiv:2201.09792. [Google Scholar] [CrossRef]
Input Image | Sub-Sampling Ratio | Methods | Block-Size | BD-Rate | BD-MS-SSIM |
---|---|---|---|---|---|
Color | 4:4:4 | Color–EtC | 16 × 16 | 3.18 | −0.32 |
8 × 8 | 6.18 | −0.61 | |||
4 × 4 | 267.72 | −19.88 | |||
2 × 2 | 424.69 | −27.8 | |||
GS–EtC | 8 × 8 | 17.76 | −2.16 | ||
4 × 4 | 405.32 | −20.04 | |||
2 × 2 | 646.57 | −27.39 | |||
IIB–CPE | 8 × 8 | 3.11 | −0.31 | ||
4 × 4 | 64.04 | −5.4 | |||
2 × 2 | 78.61 | −6.01 | |||
4:2:0 | Color–EtC | 16 × 16 | 5.98 | −0.39 | |
8 × 8 | nan | −12.55 | |||
4 × 4 | nan | −19.94 | |||
2 × 2 | nan | −23.39 | |||
GS–EtC | 8 × 8 | −1.41 | −0.21 | ||
4 × 4 | 352.1 | −16.33 | |||
2 × 2 | 549.1 | −22.26 | |||
IIB–CPE | 8 × 8 | 112.44 | −4.1 | ||
4 × 4 | 105.81 | −4.19 | |||
2 × 2 | 60.52 | −2.76 | |||
Grayscale | – | EtC | 8 × 8 | 5.36 | −0.51 |
4 × 4 | 126.67 | −12.77 | |||
2 × 2 | 220.15 | −21.45 | |||
IIB–CPE | 4 × 4 | 11.92 | −1.12 | ||
2×2 | 11.82 | −1.13 |
Methods | Nc | Lc | Dc |
---|---|---|---|
Color–EtC 16 × 16 | 0.11 | 0.12 | 0.01 |
GS–EtC 8 × 8 | 0.001 | 0.002 | 0.001 |
IIB–CPE 8 × 8 | 0.08 | 0.02 | 0.01 |
IIB–CPE 4 × 4 | 0.05 | 0.02 | 0.01 |
IIB–CPE 2 × 2 | 0.06 | 0.02 | 0.01 |
Methods | Compression | Encryption | PPDL |
---|---|---|---|
LE | × | ◯ | ✓ |
PBE | × | ◯ | ✓ |
ELE | × | ✓ | ◯ |
SPBE | × | ✓ | ✓ |
GS–EtC | ◯ | ✓ | ◯ |
Color–EtC | ✓ | ◯ | ✓ |
IIB–CPE | ✓ | ✓ | ✓ |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ahmad, I.; Shin, S. IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning. Sensors 2022, 22, 8074. https://doi.org/10.3390/s22208074
Ahmad I, Shin S. IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning. Sensors. 2022; 22(20):8074. https://doi.org/10.3390/s22208074
Chicago/Turabian StyleAhmad, Ijaz, and Seokjoo Shin. 2022. "IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning" Sensors 22, no. 20: 8074. https://doi.org/10.3390/s22208074
APA StyleAhmad, I., & Shin, S. (2022). IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning. Sensors, 22(20), 8074. https://doi.org/10.3390/s22208074