scholarly journals A sensitivity analysis of probability maps in deep‐learning‐based anatomical segmentation

Author(s):  
Noah Bice ◽  
Neil Kirby ◽  
Ruiqi Li ◽  
Dan Nguyen ◽  
Tyler Bahr ◽  
...  
2021 ◽  
Vol 161 ◽  
pp. S210-S211
Author(s):  
W. Verbakel ◽  
W. van Rooij ◽  
B. Slotman ◽  
M. Dahele

2020 ◽  
Vol 35 (5) ◽  
pp. 285-293 ◽  
Author(s):  
Brian Hurt ◽  
Andrew Yen ◽  
Seth Kligerman ◽  
Albert Hsiao

Author(s):  
Benjamin Timon

Deep Learning has recently been introduced as a new alternative to perform Side-Channel analysis [MPP16]. Until now, studies have been focused on applying Deep Learning techniques to perform Profiled Side-Channel attacks where an attacker has a full control of a profiling device and is able to collect a large amount of traces for different key values in order to characterize the device leakage prior to the attack. In this paper we introduce a new method to apply Deep Learning techniques in a Non-Profiled context, where an attacker can only collect a limited number of side-channel traces for a fixed unknown key value from a closed device. We show that by combining key guesses with observations of Deep Learning metrics, it is possible to recover information about the secret key. The main interest of this method is that it is possible to use the power of Deep Learning and Neural Networks in a Non-Profiled scenario. We show that it is possible to exploit the translation-invariance property of Convolutional Neural Networks [CDP17] against de-synchronized traces also during Non-Profiled side-channel attacks. In this case, we show that this method can outperform classic Non-Profiled attacks such as Correlation Power Analysis. We also highlight that it is possible to break masked implementations in black-box, without leakages combination pre-preprocessing and with no assumptions nor knowledge about the masking implementation. To carry the attack, we introduce metrics based on Sensitivity Analysis that can reveal both the secret key value as well as points of interest, such as leakages and masks locations in the traces. The results of our experiments demonstrate the interests of this new method and show that this attack can be performed in practice.


AAPG Bulletin ◽  
2018 ◽  
Vol 102 (04) ◽  
pp. 613-628 ◽  
Author(s):  
Véronique Gervais ◽  
Mathieu Ducros ◽  
Didier Granjeon

2021 ◽  
Author(s):  
Rhian Taylor ◽  
Varun Ojha ◽  
Ivan Martino ◽  
Giuseppe Nicosia

2020 ◽  
Vol 16 (3) ◽  
pp. 155014772091100
Author(s):  
Zhujun Jin ◽  
Yu Yang ◽  
Yuling Chen ◽  
Yuwei Chen

Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography. Nowadays, steganalysis based on deep learning generally has a large number of parameters, and its pertinence to adaptive steganography algorithms is weak. In this article, we propose a lightweight convolutional neural network named IAS-CNN which targets to image adaptive steganalysis. To solve the limitation of manually designing residual extraction filters, we adopt the method of self-learning filter in the network. That is, a high-pass filter in spatial rich model is applied to initialize the weights of the first layer and then these weights are updated through the backpropagation of the network. In addition, the knowledge of selection channel is incorporated into IAS-CNN to enhance residuals in regions that have a high probability for steganography by inputting embedding probability maps into IAS-CNN. Also, IAS-CNN is designed as a lightweight network to reduce the consumption of resources and improve the speed of processing. Experimental results show that IAS-CNN performs well in steganalysis. IAS-CNN not only has similar performance with YedroudjNet in S-UNIWARD steganalysis but also has fewer parameters and convolutional computations.


Author(s):  
Stellan Ohlsson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document