{"id":1124466,"date":"2024-04-29T11:25:44","date_gmt":"2024-04-29T15:25:44","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/researchers-create-innovative-verification-techniques-to-increase-security-in-artificial-intelligence-and-image-processing-european-research-council\/"},"modified":"2024-04-29T11:25:44","modified_gmt":"2024-04-29T15:25:44","slug":"researchers-create-innovative-verification-techniques-to-increase-security-in-artificial-intelligence-and-image-processing-european-research-council","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/researchers-create-innovative-verification-techniques-to-increase-security-in-artificial-intelligence-and-image-processing-european-research-council\/","title":{"rendered":"Researchers create innovative verification techniques to increase security in artificial intelligence and image processing &#8211; European Research Council"},"content":{"rendered":"<p><p>    A team of researchers from the IMDEA Software Institute, Carlos    III University of Madrid and NEC Laboratories Europe has    introduced a novel framework that promises to improve the    efficiency and practicality of verifiable computation. The    research, detailed in the paper 'Modular    Sumcheck Proofs with Applications to Machine Learning and Image    Processing,' addresses the scalability and modularity    challenges faced by both general proof systems and solutions    tailored to specific applications in artificial intelligence    and image processing.      <\/p>\n<p>        Verifiable computation comprises a family of cryptographic    techniques that provide an unforgeable guarantee that some    third party, such as a company or a cloud server, has performed    correct processing of a user's data. Proving that an image or a    video has been edited, that a prediction made by artificial    intelligence comes from an audited model, or that only    customer-provided data has been used in a creditworthiness    decision are some examples of what these techniques enable. In    addition, verifiable computation is compatible with data    privacy, so that, for example, the algorithms used by the    server in the calculation are kept confidential.  <\/p>\n<p>    Verifiable computation provides integrity, fairness and    privacy, essential properties in applications that outsource    data processing tasks. Within the possible solutions, there are    general proof systems, such as those used in some blockchain,    which have scalability problems when dealing with computations    with large amounts of data. On the other hand, solutions    designed specifically for these applications are more    efficient, but often incompatible with each other, making it    difficult to scale them up or integrate them into larger data    processing chains.      <\/p>\n<p>        Researchers have introduced a new framework aimed at bridging    this gap by combining the performance advantages of custom    solutions with the versatility of general-purpose test systems.    At its core is a modular approach to verifiable computation of    sequential operations, which is based on a new cryptographic    primitive known as VE (Verifiable Evaluation Scheme).  <\/p>\n<p>    The researchers demonstrate the practical application of their    framework in artificial intelligence by proposing a novel VE    adapted to convolution operations, capable of handling multiple    interconnected input and output channels. 'Our protocol can be    easily integrated into a data processing chain to enable full    verification of, for example, predictions made by convolutional    neural networks (CNNs), which are the basis of most artificial    intelligence models,' says David Balbs, PhD student at IMDEA    Software and researcher of this study. In addition, the paper    also presents new VEs for image processing, which allow    efficient verification of editing or retouching, including    operations such as cropping, blurring, rescaling and other more    complex operations.  <\/p>\n<p>    The team has produced a prototype application of its testing    systems that is a significant improvement on existing    techniques. 'Our benchmarking shows that our proofs are five    times faster to generate and ten times faster to verify than    the best existing solutions so far, in addition to introducing    theoretical innovations in the algorithms,' explains Damien    Robissout, research programmer at Institute IMDEA Software and    also co-author of the study.  <\/p>\n<p>    These results not only improve the efficiency and scalability    of cryptographic proof systems but also open up new    possibilities for ensuring the integrity, fairness and privacy    of data processing tasks in various applications of artificial    intelligence and image processing. The application generated in    the study is open source and its modular nature paves the way    for its extension and integration into various tools within a    data processing chain. In this way, the researchers clear the    way for versatile and robust deployment of verifiable    computation in applications as diverse as financial ethics,    personal data protection or artificial intelligence regulation,    among others.  <\/p>\n<p>        This press release is a result of collaboration between the    host institution of an ERC grant and the European Research    Council Executive Agency (ERCEA). Online project information    and links published in this press release are correct when on    the day of the publication goes to press. The ERC cannot be    held responsible for information which is out of date or    websites that are no longer live. Neither the ERCEA nor any    person acting on its behalf is responsible for the use that may    be made of the information contained in this press release or    for any errors that may remain in the texts, despite the care    taken in preparing them.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/erc.europa.eu\/news-events\/news\/researchers-create-innovative-verification-techniques-increase-security-artificial\" title=\"Researchers create innovative verification techniques to increase security in artificial intelligence and image processing - European Research Council\">Researchers create innovative verification techniques to increase security in artificial intelligence and image processing - European Research Council<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A team of researchers from the IMDEA Software Institute, Carlos III University of Madrid and NEC Laboratories Europe has introduced a novel framework that promises to improve the efficiency and practicality of verifiable computation. The research, detailed in the paper 'Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing,' addresses the scalability and modularity challenges faced by both general proof systems and solutions tailored to specific applications in artificial intelligence and image processing. Verifiable computation comprises a family of cryptographic techniques that provide an unforgeable guarantee that some third party, such as a company or a cloud server, has performed correct processing of a user's data <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/researchers-create-innovative-verification-techniques-to-increase-security-in-artificial-intelligence-and-image-processing-european-research-council\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187742],"tags":[],"class_list":["post-1124466","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1124466"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1124466"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1124466\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1124466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1124466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1124466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}