Adversarial Data Encryption

02/10/2020
by   Yingdong Hu, et al.
2

In the big data era, many organizations face the dilemma of data sharing. Regular data sharing is often necessary for human-centered discussion and communication, especially in medical scenarios. However, unprotected data sharing may also lead to data leakage. Inspired by adversarial attack, we propose a method for data encryption, so that for human beings the encrypted data look identical to the original version, but for machine learning methods they are misleading. To show the effectiveness of our method, we collaborate with the Beijing Tiantan Hospital, which has a world leading neurological center. We invite 3 doctors to manually inspect our encryption method based on real world medical images. The results show that the encrypted images can be used for diagnosis by the doctors, but not by machine learning methods.

READ FULL TEXT

page 3

page 8

page 13

research
09/19/2022

Encrypted Semantic Communication Using Adversarial Training for Privacy Preserving

Semantic communication is implemented based on shared background knowled...
research
08/17/2018

Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System

Now, security and authenticity of data is a big challenge. To solve this...
research
01/27/2022

Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context

Machine Learning on Big Data gets more and more attention in various fie...
research
04/11/2019

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses

Encrypted deduplication combines encryption and deduplication to simulta...
research
12/04/2020

LSB Steganography Using Pixel Locator Sequence with AES

Image steganography is the art of hiding data into images. Secret data s...
research
06/18/2019

Secure Architectures Implementing Trusted Coalitions for Blockchained Distributed Learning (TCLearn)

Distributed learning across a coalition of organizations allows the memb...
research
09/25/2017

3D Textured Model Encryption via 3D Lu Chaotic Mapping

In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be...

Please sign up or login with your details

Forgot password? Click here to reset