AES 128 Encrypted Image Classification

A. Irmanova, Martin Lukac
{"title":"AES 128 Encrypted Image Classification","authors":"A. Irmanova, Martin Lukac","doi":"10.1109/CSP58884.2023.00038","DOIUrl":null,"url":null,"abstract":"The homomorphic cryptographic operations is an umbrella term for computation performed on encrypted data without explicit decryption. The purpose of these operations is to manipulate encrypted data without having to apply decryption first and therefore minimize the computational overhead, breach of anonymity, privacy and without having to disclose private content. One of the promising prospects of homomorphic cryptography is the data classification using neural networks mounted to the back-planes of computational clouds or IoT sensors. While several approaches already explored the classification of encrypted data on specific ciphers, it is yet not well known how well such tasks can be performed on the state of the art AES encryption which was never designed to be homomorphic. In order to provide some insight on this topic, we investigate three different aspects of the classification of AES encrypted data: end-to-end learning, transfer learning and the ability of learning the cipher in the context of classification. We compare the performance of network models trained using transfer learning with end-to-end trained models on encrypted data. We also evaluate the classification of encrypted images using Invertible Neural Network (INN) as a mean to learn and predict the encryption of the data, as well as to determine if the learned AES can be efficiently learned. Finally using INN, we evaluate the learning and memorization extent of the encryption: we perform cross-data validation on different combinations of MNIST datasets such as handwritten digits, fashion images and handwritten letters.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00038","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The homomorphic cryptographic operations is an umbrella term for computation performed on encrypted data without explicit decryption. The purpose of these operations is to manipulate encrypted data without having to apply decryption first and therefore minimize the computational overhead, breach of anonymity, privacy and without having to disclose private content. One of the promising prospects of homomorphic cryptography is the data classification using neural networks mounted to the back-planes of computational clouds or IoT sensors. While several approaches already explored the classification of encrypted data on specific ciphers, it is yet not well known how well such tasks can be performed on the state of the art AES encryption which was never designed to be homomorphic. In order to provide some insight on this topic, we investigate three different aspects of the classification of AES encrypted data: end-to-end learning, transfer learning and the ability of learning the cipher in the context of classification. We compare the performance of network models trained using transfer learning with end-to-end trained models on encrypted data. We also evaluate the classification of encrypted images using Invertible Neural Network (INN) as a mean to learn and predict the encryption of the data, as well as to determine if the learned AES can be efficiently learned. Finally using INN, we evaluate the learning and memorization extent of the encryption: we perform cross-data validation on different combinations of MNIST datasets such as handwritten digits, fashion images and handwritten letters.
AES 128加密图像分类
同态加密操作是对加密数据执行计算而不显式解密的总称。这些操作的目的是操纵加密的数据,而不必首先应用解密,从而最大限度地减少计算开销,破坏匿名性和隐私,并且不必泄露私有内容。同态密码学的一个有前途的前景是使用安装在计算云或物联网传感器背板上的神经网络进行数据分类。虽然已经有几种方法探索了特定密码上加密数据的分类,但尚不清楚这些任务如何在最先进的AES加密上执行,AES加密从未被设计为同态的。为了对这个主题提供一些见解,我们研究了AES加密数据分类的三个不同方面:端到端学习、迁移学习和在分类背景下学习密码的能力。我们比较了使用迁移学习训练的网络模型与加密数据上的端到端训练模型的性能。我们还使用可逆神经网络(INN)作为学习和预测数据加密的手段来评估加密图像的分类,以及确定学习的AES是否可以有效地学习。最后,我们使用INN来评估加密的学习和记忆程度:我们对MNIST数据集的不同组合(如手写数字、时尚图像和手写字母)进行交叉数据验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信