Skip to main content

Showing 1–3 of 3 results for author: Nakachi, T

Searching in archive cs. Search in all archives.
.
  1. A Privacy-Preserving Machine Learning Scheme Using EtC Images

    Authors: Ayana Kawamura, Yuma Kinoshita, Takayuki Nakachi, Sayaka Shiota, Hitoshi Kiya

    Abstract: We propose a privacy-preserving machine learning scheme with encryption-then-compression (EtC) images, where EtC images are images encrypted by using a block-based encryption method proposed for EtC systems with JPEG compression. In this paper, a novel property of EtC images is first discussed, although EtC ones was already shown to be compressible as a property. The novel property allows us to di… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: To appear in IEICE Trans. Fundamentals

  2. Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation

    Authors: Takahiro Maekawa, Ayana Kawamura, Takayuki Nakachi, Hitoshi Kiya

    Abstract: A privacy-preserving support vector machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as the unauthorized use of cloud services, data leaks, and privacy being compromised. Accordingly, we consider privacy-preserving SVM computing. We focus on protecting visual \red{in… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

    Comments: to be published in IEICE Trans. Fundamentals. arXiv admin note: substantial text overlap with arXiv:1809.07055

  3. arXiv:1809.07055  [pdf, other

    cs.CR

    Privacy-Preserving SVM Computing by Using Random Unitary Transformation

    Authors: Takahiro Maekawa, Takayuki Nakachi, Sayaka Shiota, Hitoshi Kiya

    Abstract: A privacy-preserving Support Vector Machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as unauthorized use and leak of data, and privacy compromise. We focus on templates protected by using a random unitary transformation, and consider some properties of the protected… ▽ More

    Submitted 19 September, 2018; originally announced September 2018.

    Comments: To appear in ISPACS 2018