Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach

by   Proteek Chandan Roy, et al.

Image recognition systems have demonstrated tremendous progress over the past few decades thanks, in part, to our ability of learning compact and robust representations of images. As we witness the wide spread adoption of these systems, it is imperative to consider the problem of unintended leakage of information from an image representation, which might compromise the privacy of the data owner. This paper investigates the problem of learning an image representation that minimizes such leakage of user information. We formulate the problem as an adversarial non-zero sum game of finding a good embedding function with two competing goals: to retain as much task dependent discriminative image information as possible, while simultaneously minimizing the amount of information, as measured by entropy, about other sensitive attributes of the user. We analyze the stability and convergence dynamics of the proposed formulation using tools from non-linear systems theory and compare to that of the corresponding adversarial zero-sum game formulation that optimizes likelihood as a measure of information content. Numerical experiments on UCI, Extended Yale B, CIFAR-10 and CIFAR-100 datasets indicate that our proposed approach is able to learn image representations that exhibit high task performance while mitigating leakage of predefined sensitive information.


page 1

page 2

page 3

page 4


Adversarial Representation Learning With Closed-Form Solvers

Adversarial representation learning aims to learn data representations f...

Data Disclosure with Non-zero Leakage and Non-invertible Leakage Matrix

We study a statistical signal processing privacy problem, where an agent...

Variational Leakage: The Role of Information Complexity in Privacy Leakage

We study the role of information complexity in privacy leakage about an ...

NoPeek: Information leakage reduction to share activations in distributed deep learning

For distributed machine learning with sensitive data, we demonstrate how...

Information Leakage Games: Exploring Information as a Utility Function

A common goal in the areas of secure information flow and privacy is to ...

SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores

Numerous studies have underscored the significant privacy risks associat...

Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints

We introduce a novel generalization of entropy and conditional entropy f...

Please sign up or login with your details

Forgot password? Click here to reset