2021
DOI: 10.1109/access.2021.3112684
|View full text |Cite
|
Sign up to set email alerts
|

SIA-GAN: Scrambling Inversion Attack Using Generative Adversarial Network

Abstract: This paper presents a scrambling inversion attack using a generative adversarial network (SIA-GAN). This method aims to evaluate the privacy protection level achieved by image scrambling method. For privacy-preserving machine learning, scrambled images are often used to protect visual information, assuming that searching the scramble parameters is highly difficult for an attacker due to the application of complex image scrambling operations. However, the security of such methods has not been thoroughly investi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(38 citation statements)
references
References 18 publications
0
32
0
Order By: Relevance
“…In contrast, recently, novel attack methods for restoring visual information have been proposed that use deep neural networks such as in [9], [19]. Accordingly, we consider the feature reconstruction attack (FR-Attack) [18] that exploits the local properties of an encrypted image to reconstruct visual information from encrypted images.…”
Section: G Robustness Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…In contrast, recently, novel attack methods for restoring visual information have been proposed that use deep neural networks such as in [9], [19]. Accordingly, we consider the feature reconstruction attack (FR-Attack) [18] that exploits the local properties of an encrypted image to reconstruct visual information from encrypted images.…”
Section: G Robustness Evaluationmentioning
confidence: 99%
“…Accordingly, we consider the feature reconstruction attack (FR-Attack) [18] that exploits the local properties of an encrypted image to reconstruct visual information from encrypted images. Furthermore, with a synthetic dataset and encrypted images, the adversary may carry out a GAN-based attack (GAN-Attack) [19]. As the distribution of the dataset is known, we also consider that the adversary may prepare exact pairs of plain images and encrypted ones with different multiple keys to learn a transformation model, i.e., the inverse transformation network attack (ITN-Attack) [9].…”
Section: G Robustness Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, another recent neural network-based attack utilizes a generative adversarial network (GAN) [10]. This GAN-based method aims to reconstruct visual information by using the hinge loss.…”
Section: E Gan Attackmentioning
confidence: 99%
“…The previous attacks exploit the correlation between pixels [8], [9], or deep neural networks [10], [11] to recover visual information from encrypted images. EtC images are robust against such attacks.…”
Section: Introductionmentioning
confidence: 99%