Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image

  • Conference paper
  • First Online:
Cyber Security, Cryptology, and Machine Learning (CSCML 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13914))

Abstract

Deep learning has been widely applied in many computer vision applications with remarkable success. Most of these techniques improve extraction of features from the fetched data for instance, image attributes are extracted for classifying an image. These attributes are quite useful for many tasks such as forensic investigation but it creates a threat for the privacy of the image if these attributes are leaked. Forensic authentication of digital images and videos is a crucial process in forensic investigation as they provide direct evidence. Authentication is a forensic process that involves verifying the authenticity of a digital image. In this paper, we propose a privacy-preserving framework to authenticate an image. It defends against the adversary from reconstructing the image from the extracted features and minimizes the private attribute leakage inference from the extracted features of the image. The main classifier performs the binary classification and tells whether an image is forged or authentic with an accuracy of 99%. Also, the framework maintains a very low accuracy for the adversarial classifier which aims at inferring some private attributes or even reconstruction of the image from these leaked attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Diallo, B., Urruty, T., Bourdon, P., Fernandez-Maloigne, C.: Robust forgery detection for compressed images using CNN supervision. Forensic Sci. Int. Rep. 2, 100112 (2020)

    Article  Google Scholar 

  2. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  3. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: ICLR (Poster) (2015)

    Google Scholar 

  4. Liu, S., Du, J., Shrivastava, A., Zhong, L.: Privacy adversarial network: representation learning for mobile data privacy. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 3(4), 1–18 (2019)

    Google Scholar 

  5. Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 3730–3738 (2015)

    Google Scholar 

  6. Ma, K., et al.: Group mad competition-a new methodology to compare objective image quality models. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1664–1673 (2016)

    Google Scholar 

  7. Osia, S.A., et al.: A hybrid deep learning architecture for privacy-preserving mobile analytics. IEEE Internet Things J. 7(5), 4505–4518 (2020)

    Article  Google Scholar 

  8. Pentyala, S., Dowsley, R., De Cock, M.: Privacy-preserving video classification with convolutional neural networks. In: International Conference on Machine Learning, pp. 8487–8499. PMLR (2021)

    Google Scholar 

  9. Pittaluga, F., Koppal, S., Chakrabarti, A.: Learning privacy preserving encodings through adversarial training. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 791–799. IEEE (2019)

    Google Scholar 

  10. Puteaux, P., Itier, V., Bas, P.: Combining forensics and privacy requirements for digital images. In: 2021 29th European Signal Processing Conference (EUSIPCO), pp. 806–810. IEEE (2021)

    Google Scholar 

  11. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)

  12. Singh, A., et al.: Disco: dynamic and invariant sensitive channel obfuscation for deep neural networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 12125–12135 (2021)

    Google Scholar 

  13. Sudusinghe, C., Charles, S., Ahangama, S., Mishra, P.: Eavesdropping attack detection using machine learning in network-on-chip architectures. IEEE Design Test 39(6), 28–38 (2022)

    Article  Google Scholar 

  14. Wang, Z., Simoncelli, E.P., Bovik, A.C.: Multiscale structural similarity for image quality assessment. In: The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003, vol. 2, pp. 1398–1402. IEEE (2003)

    Google Scholar 

  15. Wu, Z., Wang, Z., Wang, Z., Jin, H.: Towards privacy-preserving visual recognition via adversarial training: A pilot study. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 606–624 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Riyanka Jena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jena, R., Singh, P., Mohanty, M. (2023). PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image. In: Dolev, S., Gudes, E., Paillier, P. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2023. Lecture Notes in Computer Science, vol 13914. Springer, Cham. https://doi.org/10.1007/978-3-031-34671-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34671-2_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34670-5

  • Online ISBN: 978-3-031-34671-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics