Access Control with Encrypted Feature Maps for Object Detection Models

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we propose an access control method with a secret key for object detection models for the first time so that unauthorized users without a secret key cannot benefit from the performance of trained models. The method enables us not only to provide a high detection performance to authorized users but to also degrade the performance for unauthorized users. The use of transformed images was proposed for the access control of image classification models, but these images cannot be used for object detection models due to performance degradation. Accordingly, in this paper, selected feature maps are encrypted with a secret key for training and testing models, instead of input images. In an experiment, the protected models allowed authorized users to obtain almost the same performance as that of non-protected models but also with robustness against unauthorized access without a key.

Cite

CITATION STYLE

APA

Nagamori, T., Ito, H., Maungmaung, A., & Kiya, H. (2023). Access Control with Encrypted Feature Maps for Object Detection Models. IEICE Transactions on Information and Systems, E106D(1), 12–21. https://doi.org/10.1587/transinf.2022MUP0002

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free