2023 International Conference on Information Networking (ICOIN) 2023
DOI: 10.1109/icoin56518.2023.10048970
|View full text |Cite
|
Sign up to set email alerts
|

Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…In similar work presented in [63], the authors used an Extended CPE method for face recognition in a color image dataset. Besides face recognition tasks, CPE-based privacy-preserving image classification has been performed in [49,[64][65][66]. Specifically, in [64], the authors implemented an isotropic network such as vision transformers with the Color CPE scheme for natural image classification.…”
Section: Cpe Scheme Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…In similar work presented in [63], the authors used an Extended CPE method for face recognition in a color image dataset. Besides face recognition tasks, CPE-based privacy-preserving image classification has been performed in [49,[64][65][66]. Specifically, in [64], the authors implemented an isotropic network such as vision transformers with the Color CPE scheme for natural image classification.…”
Section: Cpe Scheme Applicationsmentioning
confidence: 99%
“…In [65], the authors implemented four different extensions of IIB-CPE and analyzed their effect on a CNN model's accuracy. The same authors implemented a CNN-based model with a IIB-CPE scheme for natural image classification in [49] and for COVID-19 diagnosis in chest X-ray images in [66].…”
Section: Cpe Scheme Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Notably, the NPT is employed in the encryption scheme of JPEG images, featuring prominently in various proposals [3][4][5][6][7]. In all of these instances, the NPT operates at the pixel block level [8] and applies to both color and grayscale images [9,10]. Moreover, the NPT finds applications beyond JPEG image encryption, extending its utility to hybrid methods like compressed sensing.…”
Section: Introductionmentioning
confidence: 99%