Näytä suppeat kuvailutiedot

dc.contributor.authorTerziyan, Vagan
dc.contributor.authorMalyk, Diana
dc.contributor.authorGolovianko, Mariia
dc.contributor.authorBranytskyi, Vladyslav
dc.contributor.editorLongo, Francesco
dc.contributor.editorAffenzeller, Michael
dc.contributor.editorPadovano, Antonio
dc.contributor.editorWeiming, Shen
dc.date.accessioned2023-01-19T10:22:55Z
dc.date.available2023-01-19T10:22:55Z
dc.date.issued2023
dc.identifier.citationTerziyan, V., Malyk, D., Golovianko, M., & Branytskyi, V. (2023). Encryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing. In F. Longo, M. Affenzeller, A. Padovano, & S. Weiming (Eds.), <i>4th International Conference on Industry 4.0 and Smart Manufacturing</i> (217, pp. 91-101). Elsevier. Procedia Computer Science. <a href="https://doi.org/10.1016/j.procs.2022.12.205" target="_blank">https://doi.org/10.1016/j.procs.2022.12.205</a>
dc.identifier.otherCONVID_172579401
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/85094
dc.description.abstractCurrent advances in machine (deep) learning and the exponential growth of data collected by and shared between smart manufacturing processes give a unique opportunity to get extra value from that data. The use of public machine learning services actualizes the issue of data privacy. Ordinary encryption protects the data but could make it useless for the machine learning objectives. Therefore, “privacy of data vs. value from data” is the major dilemma within the privacy preserving machine learning activity. Special encryption techniques or synthetic data generation are being in focus to address the issue. In this paper, we discuss a complex hybrid protection algorithm, which assumes sequential use of two components: homeomorphic data space transformation and synthetic data generation. Special attention is given to the privacy of image data. Specifics of image representation require special approaches towards encryption and synthetic image generation. We suggest use of (convolutional, variational) autoencoders and pre-trained feature extractors to enable applying privacy protection algorithms on top of the latent feature vectors captured from the images, and we updated the hybrid algorithms composed of homeomorphic transformation-as-encryption plus synthetic image generation accordingly. We show that an encrypted image can be reconstructed (by the pre-trained Decoder component of the convolutional variational autoencoder) into a secured representation from the extracted (by either the Encoder or a feature extractor) and encrypted (homeomorphic transformation of the latent space) feature vector. See presentation slides: https://ai.it.jyu.fi/ISM-2022-Image_Encryption.pptxen
dc.format.extent1954
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherElsevier
dc.relation.ispartof4th International Conference on Industry 4.0 and Smart Manufacturing
dc.relation.ispartofseriesProcedia Computer Science
dc.rightsCC BY-NC-ND 4.0
dc.subject.otherIndustry 4.0
dc.subject.otherdata privacy
dc.subject.otheranonymization
dc.subject.othersyntetic data generation
dc.subject.otherimage processing
dc.subject.otherautoencoders
dc.titleEncryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202301191395
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange91-101
dc.relation.issn1877-0509
dc.relation.volume217
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 The Authors. Published by Elsevier B.V.
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Industry 4.0 and Smart Manufacturing
dc.subject.ysosalaus
dc.subject.ysoanonymiteetti
dc.subject.ysoteollisuus
dc.subject.ysokoneoppiminen
dc.subject.ysotietosuoja
dc.subject.ysovalmistustekniikka
dc.subject.ysokonenäkö
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5475
jyx.subject.urihttp://www.yso.fi/onto/yso/p22512
jyx.subject.urihttp://www.yso.fi/onto/yso/p998
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p3636
jyx.subject.urihttp://www.yso.fi/onto/yso/p22012
jyx.subject.urihttp://www.yso.fi/onto/yso/p2618
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.1016/j.procs.2022.12.205
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY-NC-ND 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY-NC-ND 4.0