Research Area

My research interests are in privacy preservation during data transmission – in transit, data storage – at rest, and computation – in use. The scope of my research spans across multiple fields, from image encryption to computer vision, including Machine Learning (ML) in the image analysis domain.

There are two main challenges in the development and implementation of Deep Learning (DL) solutions: First, DL algorithms are characterized as compute-intensive tasks, and their training requires innovative technology and high computational resources. Second, training DL models for a particular task needs a large volume of sample data, which in some domains such as in the field of medical image analysis, is expensive and difficult to acquire. These challenges can be efficiently addressed by taking advantage of powerful infrastructures such as cloud services. For example, in the first case, organizations can avail cloud-computing services to access the latest technology to speed-up the training process and allow DL models to scale efficiently with a lower capital cost. Similarly, to mitigate the data deficiency challenge, an organization can benefit from a community cloud, where services are shared by organizations with common interests to achieve their goals. In this case, cloud storage services can be utilized as a shared data repository for joint collaborative learning.

This avail of third-party resources provides an efficient solution for a well-trained DL model; however, this can lead to privacy concerns as data outsourcing comes with a risk of information leakage. Though the traditional image encryption techniques guarantee data security in transit and at rest, data decryption is necessary prior to performing any computations on them, which makes them inadequate to cater to the requirements of data security in use. On the other hand, techniques specifically proposed to enable computation in the encryption domain have either their associated computational cost, communication overhead or specialized design requirement that may reduce data utility and degrade the DL model performance. In addition, when transmitting large volumes of data (especially images), compression is necessary to efficiently utilize the available bandwidth. Therefore, I argue for a holistic privacy-preserving solution that can satisfy the dual requirements of data transmission, data storage and computation in the encryption domain to fully reap the benefits of DL for data-driven applications.


Ph.D. Thesis

Compression and encryption deal with the redundancy of a source but each with their own purpose. The unwanted redundancy of a source is reduced in compression to achieve a data representation that requires lesser number of bits while in encryption it is reduced to make the source unintelligible by the addition of randomness. The order in which the compression and encryption operations are carried out affects the overall efficiency of the system. The common approach is to complete compression prior to encryption. Otherwise there is less or no compressibility as the encryption process would have significantly reduced the correlation and altered the statistical distribution of the image data.

In my Ph.D. thesis, I investigated the order of performing compression and encryption to find proper trade-offs between maintaining a desired level of compression savings, preserving necessary privacy while achieving acceptable downstream application performance by means of implementing suitable encryption and compression techniques, and avoiding (or at best, reducing) the potential negative impact of the visual degradation (because of applying either privacy preservation or compression technique) on the DL model performance. The main contributions of my thesis are summarized as below:

Conclusion

For an efficient DL model, a large volume of sample data and high computation resources are needed. These requirements can be fulfilled by taking advantage of powerful infrastructures such as cloud-computing services, to avail high-powered computational resources, and cloud storage services, for adopting collaborative learning. However, this comes with security and privacy concerns as there are potential risks of leakage of privacy-sensitive information associated with outsourcing the data. The existing privacy-preserving schemes have their associated computational cost, communication overhead and specialized design requirement that may reduce data utility and degrade the DL model performance. In addition, given the large volume of data, bandwidth and storage efficiencies should also be considered. Traditional privacy preservation approaches treat the requirements of data transmission and computation separately even though both are necessary to be fulfilled to fully reap the benefits of DL for data-driven applications. Therefore, in this thesis we proposed an end-to-end framework to satisfy the dual requirements (compression and encryption) of a communication system while preserving user’s privacy in downstream applications. Our proposed privacy scheme was based on PE and was compatible with the widely used image compression standard such as the JPEG format. Importantly, the proposed system supported lossless DL model construction which did not modify any of the computation of the original model training algorithm. Therefore, it can be used with the existing state-of-the-art DL models without any modification. We presented applications for the proposed privacy scheme in three different domains. For natural images classification task, our proposed PE-based privacy preserving scheme at best introduced a decrease of ≈5% in the prediction accuracy of the trained models. For face recognition application, the proposed privacy preservation scheme delivered the same recognition accuracy as that of the plain images. For COVID-19 screening in CXR images, the proposed PE-based privacy preserving scheme at best introduced a ≈3% drop in the model's accuracy and sensitivity scores.


Current Work

Currently, I am working on representation learning to quantify perceptual distortions in wirelessly transmitted images. This is motivated by an observation that the existing Image Quality Assessment (IQA) metrics either rely on or are optimized to coincide with human judgment and do not account for the perceptual distortions (for example, because of imperfect communication system) that are responsible for the degradation in DL model performance. Given the popularity of DL solutions in various domains, it is necessary to quantify perceptual loss in distorted images using machine perception. Towards this we proposed an IQA metric that compares the perceptual similarity between distorted and original images in the semantic feature space defined by latent-variable models. It is anticipated that the proposed method will give an important indication of a DL model performance implemented on a remotely located server for a downstream application and can be used to optimize the parameters of a communication system.


References

[1] I. Ahmad and S. Shin, “A novel hybrid image encryption–compression scheme by combining chaos theory and number theory,” Signal Processing: Image Communication, vol. 98, p. 116418, Oct. 2021, doi: 10.1016/j.image.2021.116418.
[2] I. Ahmad, B. Lee, and S. Shin, “Analysis of Chinese Remainder Theorem for Data Compression,” in 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain: IEEE, Jan. 2020, pp. 634–636. doi: 10.1109/ICOIN48656.2020.9016442.
[3] I. Ahmad and S. Shin, “Noise-cuts-Noise Approach for Mitigating the JPEG Distortions in Deep Learning,” in 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia: IEEE, Feb. 2023, pp. 221–226. doi: 10.1109/ICAIIC57133.2023.10067012.
[4] I. Ahmad, W. Choi, and S. Shin, “Comprehensive Analysis of Compressible Perceptual Encryption Methods—Compression and Encryption Perspectives,” Sensors, vol. 23, no. 8, p. 4057, Apr. 2023, doi: 10.3390/s23084057.
[5] I. Ahmad and S. Shin, “IIB–CPE: Inter and Intra Block Processing-Based Compressible Perceptual Encryption Method for Privacy-Preserving Deep Learning,” Sensors, vol. 22, no. 20, p. 8074, Oct. 2022, doi: 10.3390/s22208074.
[6] I. Ahmad and S. Shin, “Perceptual Encryption-based Privacy-Preserving Deep Learning in Internet of Things Applications,” in 2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, Republic of: IEEE, Oct. 2022, pp. 1817–1822. doi: 10.1109/ICTC55196.2022.9952589.
[7] I. Ahmad and S. Shin, “Encryption-then-Compression System for Cloud-based Medical Image Services,” in 2022 International Conference on Information Networking (ICOIN), Jeju-si, Korea, Republic of: IEEE, Jan. 2022, pp. 30–33. doi: 10.1109/ICOIN53446.2022.9687214. [Best Paper Award]
[8] I. Ahmad and S. Shin, “A Perceptual Encryption-Based Image Communication System for Deep Learning-Based Tuberculosis Diagnosis Using Healthcare Cloud Services,” Electronics, vol. 11, no. 16, p. 2514, Aug. 2022, doi: 10.3390/electronics11162514.
[9] I. Ahmad, E. Kim, S.-S. Hwang, and S. Shin, “Privacy-Preserving Surveillance for Smart Cities,” presented at the The 13th International Conference on Ubiquitous and Future Networks, Barcelona, Spain, Jul. 2022.
[10] I. Ahmad and S. Shin, “Perceptual Encryption-based Privacy-Preserving Deep Learning for Medical Image Analysis,” in 2023 International Conference on Information Networking (ICOIN), Bangkok, Kingdom of Thailand: IEEE, Jan. 2023, pp. 224–229. [Best Paper Award]