{"id":"https://openalex.org/W4402261210","doi":"https://doi.org/10.1109/access.2024.3454199","title":"On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning","display_name":"On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4402261210","doi":"https://doi.org/10.1109/access.2024.3454199"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3454199","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3454199","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2024.3454199","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113368556","display_name":"April Pyone Maung Maung","orcid":null},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"April Pyone Maung Maung","raw_affiliation_strings":["National Institute of Informatics, Chiyoda-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Chiyoda-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044556342","display_name":"Isao Echizen","orcid":"https://orcid.org/0000-0003-4908-1860"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Isao Echizen","raw_affiliation_strings":["National Institute of Informatics, Chiyoda-ku, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Informatics, Chiyoda-ku, Tokyo, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hitoshi Kiya","raw_affiliation_strings":["Department of Computer Science, Tokyo Metropolitan University, Hino-shi, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tokyo Metropolitan University, Hino-shi, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113368556"],"corresponding_institution_ids":["https://openalex.org/I184597095"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.2624,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5295722,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":null,"first_page":"126415","last_page":"126425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7550813555717468},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6702799797058105},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5141556262969971},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4157123863697052},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3877131938934326},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3625292181968689}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7550813555717468},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6702799797058105},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5141556262969971},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4157123863697052},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3877131938934326},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3625292181968689}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3454199","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3454199","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b0818554290b4687a1aabe63943c2abd","is_oa":true,"landing_page_url":"https://doaj.org/article/b0818554290b4687a1aabe63943c2abd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 126415-126425 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3454199","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3454199","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Quality Education","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W107524893","https://openalex.org/W1501211345","https://openalex.org/W1510526020","https://openalex.org/W1834627138","https://openalex.org/W2009460929","https://openalex.org/W2031533839","https://openalex.org/W2080911030","https://openalex.org/W2084994317","https://openalex.org/W2096328905","https://openalex.org/W2177209050","https://openalex.org/W2245606036","https://openalex.org/W2324595764","https://openalex.org/W2325939864","https://openalex.org/W2337093093","https://openalex.org/W2473418344","https://openalex.org/W2535838896","https://openalex.org/W2561196672","https://openalex.org/W2689968489","https://openalex.org/W2744999500","https://openalex.org/W2753607224","https://openalex.org/W2779060144","https://openalex.org/W2800679800","https://openalex.org/W2898784076","https://openalex.org/W2942255051","https://openalex.org/W2962770929","https://openalex.org/W2962785568","https://openalex.org/W2962805715","https://openalex.org/W2963163009","https://openalex.org/W2963540401","https://openalex.org/W2964335264","https://openalex.org/W2995164854","https://openalex.org/W3022226764","https://openalex.org/W3035574324","https://openalex.org/W3094953250","https://openalex.org/W3097371090","https://openalex.org/W3134815184","https://openalex.org/W3159734327","https://openalex.org/W3166396011","https://openalex.org/W3176913662","https://openalex.org/W3178386862","https://openalex.org/W3178705018","https://openalex.org/W3201322425","https://openalex.org/W4225775889","https://openalex.org/W4282931525","https://openalex.org/W4285275243","https://openalex.org/W4288099666","https://openalex.org/W4293773179","https://openalex.org/W4306820534","https://openalex.org/W4312096630","https://openalex.org/W4312358089","https://openalex.org/W4312933868","https://openalex.org/W4313395217","https://openalex.org/W4322614810","https://openalex.org/W4390873054","https://openalex.org/W6679045638","https://openalex.org/W6745560452","https://openalex.org/W6757817989","https://openalex.org/W6772836532","https://openalex.org/W6776691762","https://openalex.org/W6779823529","https://openalex.org/W6784925312","https://openalex.org/W6790273632","https://openalex.org/W6791353385","https://openalex.org/W6795288823","https://openalex.org/W6796427001","https://openalex.org/W6840815571","https://openalex.org/W6846007759","https://openalex.org/W7055034485"],"related_works":["https://openalex.org/W2058170566","https://openalex.org/W2772917594","https://openalex.org/W2755342338","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398","https://openalex.org/W2775347418"],"abstract_inverted_index":{"In":[0,17],"this":[1,141,145],"paper,":[2,146],"we":[3,19,147],"evaluate":[4,157],"the":[5,41,127,158],"security":[6,159],"of":[7,45,50,100,160],"learnable":[8,33,161],"image":[9,67,162],"encryption":[10,34,68,90],"methods":[11,35],"proposed":[12],"for":[13],"privacy-preserving":[14],"deep":[15],"learning.":[16],"addition,":[18],"also":[20],"propose":[21],"a":[22,88,152],"new":[23],"generative":[24,110,153],"model-based":[25,154],"attack":[26,155,178],"based":[27],"on":[28,66,71,168],"latent":[29,133],"diffusion":[30,134],"models.":[31],"Various":[32],"have":[36,52,179],"been":[37,53],"studied":[38],"to":[39,55,118,184],"protect":[40],"sensitive":[42],"visual":[43,85,181],"information":[44,86,125],"plain":[46,105,185],"images,":[47,109],"and":[48,156],"some":[49,180],"them":[51],"investigated":[54],"be":[56],"robust":[57],"enough":[58],"against":[59],"all":[60],"existing":[61],"attacks.":[62],"However,":[63,130],"previous":[64],"attacks":[65,74,81],"focus":[69],"only":[70],"traditional":[72],"cryptanalytic":[73],"or":[75],"reverse":[76],"translation":[77],"models,":[78],"so":[79],"these":[80],"cannot":[82],"recover":[83,119],"any":[84],"if":[87],"block-scrambling":[89],"step,":[91],"which":[92],"effectively":[93],"destroys":[94],"global":[95],"information,":[96],"is":[97],"applied.":[98],"Instead":[99],"reconstructing":[101],"identical":[102],"images":[103,173],"as":[104,113,151],"ones":[106],"from":[107,126],"encrypted":[108,128],"models":[111,135],"such":[112],"StyleGAN":[114],"were":[115,165],"previously":[116],"explored":[117],"styles":[120],"that":[121,172],"can":[122],"reveal":[123],"identifiable":[124],"images.":[129,186],"large-scale":[131],"off-the-shelf":[132],"are":[136],"not":[137],"yet":[138],"considered":[139],"in":[140,144],"regard.":[142],"Therefore,":[143],"utilize":[148],"Stable":[149,176],"Diffusion":[150],"encryption.":[163],"Experiments":[164],"carried":[166],"out":[167],"various":[169],"datasets,":[170],"showing":[171],"reconstructed":[174],"by":[175],"Diffusion-based":[177],"cues":[182],"similar":[183]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
