The results of automatic learning algorithms based on deep neural networks are impressive, and they are extensively used in a variety of fields. However, access to private information, frequently sensitive to confidentiality (financial, medical, etc.), is required in order to use them. This calls for good precision as well as special attention to the privacy and security of the data. In this paper, we propose a novel approach to solve this issue by using Convolutional Neural Network (CNN) model over encrypted data. In order to achieve our contribution, we focus on approximating the often used activation functions that seem to be the key functions in CNN networks which are: ReLu, Sigmoid and Tanh. We start by creating a low-degree polynomial, which is essential for a successful homomorphic encryption (HE). This polynomial which is based on Beta function and its primitive will be used as an activation function. The next step is to build a CNN model using batch normalization to ensure that the data are contained inside a limited interval. Finally, MNIST is used in order to evaluate our methodology and assess the effectiveness of the proposed approach. The experimental results support the efficacy of the proposed approach.
Copy-move image forgery is the act of cloning a restricted region in the image and pasting it once or multiple times within that same image. This procedure intends to cover a certain feature, probably a person or an object, in the processed image or emphasize it through duplication. Consequences of this malicious operation can be unexpectedly harmful. Hence, the present paper proposes a new approach that automatically detects Copy-move Forgery (CMF). In particular, this work broaches a widely common open issue in CMF research literature that is detecting CMF within smooth areas. Indeed, the proposed approach represents the image blocks as a sparse linear combination of pre-learned bases (a mixture of texture and color-wise small patches) which allows a robust description of smooth patches. The reported experimental results demonstrate the effectiveness of the proposed approach in identifying the forged regions in CM attacks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.