Block-Wise Image Transformation With Secret Key for Adversarially Robust Defense

نویسندگان

چکیده

In this paper, we propose a novel defensive transformation that enables us to maintain high classification accuracy under the use of both clean images and adversarial examples for adversarially robust defense. The proposed is block-wise preprocessing technique with secret key input images. defense obfuscates gradients in absence unlike previously defeated obfuscating defenses. We developed three algorithms realize transformation: Pixel Shuffling, Bit Flipping, FFX Encryption. Experiments were carried out on CIFAR-10 ImageNet datasets by using black-box white-box attacks various metrics including adaptive ones. results show achieves close even first time. best-case scenario, model trained transformed Encryption (block size 4) yielded an 92.30% 91.48% PGD attack noise distance 8/255, which non-robust (95.45%) dataset, it 72.18% 71.43% same attack, also standard (73.70%) dataset. Overall, all are demonstrated outperform state-of-the-art defenses training whether or not attack.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Related-Key Slide Attacks on Block Ciphers with Secret Components

Lightweight cryptography aims to provide sufficient security with low area/power/energy requirements for constrained devices. In this paper, we focus on the lightweight encryption algorithm specified and approved in NRS 009-6-7:2002 by Electricity Suppliers Liaison Committee to be used with tokens in prepayment electricity dispensing systems in South Africa. The algorithm is a 16-round SP netwo...

متن کامل

A Key-Scheduled Block Cipher Using element-wise Linear Transformation and Logical XOR Operation

Cryptography is a key technology in electronic security systems. Modern cryptographic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. The increased use of computer and communication systems by industry has increased the risk of theft of proprietary information. In general, cryptographic primitives a...

متن کامل

Digital Watermarking for Image Tamper Detection using Block-Wise Technique

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the propose...

متن کامل

A Key Based Secure Threshold Cryptography for Secret Image

This paper presents a key based secured (k, n) threshold cryptography where key is used to encrypt the secret and then the secret as well as key is shared among set of n participants. In sharing phase, each secret byte is selected randomly from secret fields depending upon the key. That provides additional protection of the secret data. Also, each share has some bytes missing and these missing ...

متن کامل

Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying

In wireless sensor networks, the key deployment problem has received little attention, whereas it is in fact fundamental, heavily involving crucial (scarce) resources of ad-hoc networks, such as memory and energy availability. In this paper, we first briefly survey the state-of-the art of key deployment strategies that are amenable to ad-hoc network. Then we proposed two possible methods and we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3062977