Image and Model Transformation with Secret Key for Vision Transformer
نویسندگان
چکیده
In this paper, we propose a combined use of transformed images and vision transformer (ViT) models with secret key. We show for the first time that trained plain can be directly to encrypted on basis ViT architecture, performance is same as when using test addition, proposed scheme does not require any specially prepared data training or network modification, so it also allows us easily update an experiment, effectiveness evaluated in terms degradation model protection image classification task CIFAR-10 dataset.
منابع مشابه
A Key Based Secure Threshold Cryptography for Secret Image
This paper presents a key based secured (k, n) threshold cryptography where key is used to encrypt the secret and then the secret as well as key is shared among set of n participants. In sharing phase, each secret byte is selected randomly from secret fields depending upon the key. That provides additional protection of the secret data. Also, each share has some bytes missing and these missing ...
متن کاملModel Transformation in Practice Using the BOC Model Transformer
Not least due to the widespread use of meta modelling concepts, model transformation techniques have reached a certain level of maturity [5]. Nevertheless, there is a lack of common community knowledge concerning different transformation approaches fitting different requirements and application areas. The aim of this paper is to present the BOC model transformer, an industry-proven transformati...
متن کاملLossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation
This paper is proposed to provide confidentiality of the secret image which can be used by multiple users or to store on multiple servers. A secret sharing is a technique to protect the secret information which will be used by multiple users. The threshold secret sharing is more efficient as it is possible to reconstruct the secret with the threshold number of shares. Along with Shamir’s secret...
متن کاملShadowing Model For Secret Key Extraction From WSN
We propose a new solution for key generation process on the basis of Received Signal Strength (RSS) for wireless sensor nodes. We use simulation environments to show that RSS at both the communicating parties is same due to high data transmission rates is a random characteristic and can be used to generate a secret key. We also try to show that how it can become vulnerable if proper care is not...
متن کاملPlaintext Related Two-level Secret Key Image Encryption Scheme
Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2023
ISSN: ['0916-8532', '1745-1361']
DOI: https://doi.org/10.1587/transinf.2022mui0001