政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/152576
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51667814      Online Users : 553
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/152576


    Title: 在半導體製造中推進數據隱私保護:對 CycleGAN 處理的晶圓圖進行縮略圖保留加密
    Advancing Data Privacy in Semiconductor Manufacturing: Thumbnail Preserving Encryption for CycleGAN-Processed Wafer Images
    Authors: 黃浚綾
    Huang, Chun-Lin
    Contributors: 曾一凡
    Tseng, Yi-Fan
    黃浚綾
    Huang, Chun-Lin
    Keywords: 縮略圖保留加密
    CycleGAN
    CycleGAN
    Thumbnail preserving encryption
    Date: 2024
    Issue Date: 2024-08-05 12:46:38 (UTC+8)
    Abstract: 鑒於實際生產線上相對較缺乏有缺陷的晶圓圖,其收集面臨時間限制的挑戰。為了解決晶圓圖中缺陷模式的資料不平衡問題,我們使用 CycleGAN 深度學習網路來開發一個缺陷模式生成解決方案。由於存在硬體設備損壞的風險,我們將生成的晶圓圖存儲在雲端,並以一種 類似縮略圖保留加密的方案,使密文呈現明文的低解析度本,在隱私和安全性之間取得平衡。這個方法旨在提供使用者可用性,同時透過增加缺陷模式的訓練樣本數來促進自動化生產效率。獲得的結果表明,生成的有缺陷晶圓圖與真實的有缺陷晶圓圖非常相似,並且我們計算生成的有缺陷晶圓圖在不同的縮略圖保留加密方案下的峰值訊噪比,以評估其安全性。實驗結果顯示,生成的晶圓圖在R-LSB方案中具有較低的峰值訊噪比及較高的安全性。
    Given the limited availability of defective wafer images on actual production lines, there are challenges associated with time constraints in their collection. To address the data imbalance issue concerning defect modes in wafer images, we utilize CycleGAN deep learning networks to devise a defect mode generation solution. Due to the risk of hardware damage, we store the generated wafer images in the cloud and employ an scheme similar to thumbnail preserving encryption to achieve a balance between privacy and security by presenting ciphertext in a low-resolution version of plaintext. This approach aims to provide user accessibility while enhancing automated production efficiency through an increased number of training samples for defect modes. The obtained results indicate a high resemblance between the generated defective wafer images and authentic defective wafer images. Furthermore, we compute the Peak Signal-to-Noise Ratio of the generated defective wafer images under various TPE schemes to assess their security. Experimental results demonstrate that the generated wafer images exhibit lower PSNR values and higher security under the R-LSB scheme.
    Reference: [1] Muzhir Shaban Al-Ani and Fouad Hammadi Awad. The jpeg image compression algorithm. Int. J. Adv. Eng. Technol, 6(3):1055–1062, 2013.

    [2] Aziz Alotaibi.Deep generative adversarial networks for image-to-image translation: A review. Symmetry, 12(10):1705, 2020.

    [3] Hao-Wen Dong and Yi-Hsuan Yang. Towards a deeper understanding of adversarial losses. arXiv preprint arXiv:1901.08753, 2019.

    [4] Alberto Fernández, Salvador García, Mikel Galar, Ronaldo C Prati, Bartosz Krawczyk, Francisco Herrera, Alberto Fernández, Salvador García, Mikel Galar, Ronaldo C Prati, et al. Data level preprocessing methods. Learning from Imbalanced Data Sets, pages 79–121, 2018.

    [5] Ronald Aylmer Fisher and Frank Yates.Statistical tables for biological,agricultural and medical research. Hafner Publishing Company, 1953.

    [6] Oded Hecht and Giora Dishon. Automatic optical inspection (aoi). In 40th Conference proceedings on electronic components and technology, pages 659–661. IEEE, 1990.

    [7] Alain Hore and Djemel Ziou. Image quality metrics: Psnr vs. ssim. In 2010 20th international conference on pattern recognition, pages 2366–2369. IEEE, 2010.

    [8] R Ratheesh Kumar and Jabin Mathew. Image encryption: Traditional methods vs alternative methods. In 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), pages 1–7. IEEE, 2020.

    [9] Xuanqing Liu and Cho-Jui Hsieh. Rob-gan: Generator, discriminator, and adversarial attacker. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 11234–11243, 2019.

    [10] Hans Marmolin. Subjective mse measures. IEEE transactions on systems, man, and cybernetics, 16(3):486–489, 1986.

    [11] Byron Marohn, Charles V Wright, Wu-chi Feng, Mike Rosulek, and Rakesh B Bobba. Approximate thumbnail preserving encryption. In Proceedings of the 2017 on Multimedia Privacy and Security, pages 33–43. 2017.

    [12] Chandran Saravanan. Color image to grayscale image conversion. In 2010 Second International Conference on Computer Engineering and Applications, volume 2, pages 196–199. IEEE, 2010.

    [13] Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B Bobba, Mike Rosulek, Charles V Wright, and Wu-chi Feng. Balancing image privacy and usability with thumbnail-preserving encryption. IACR Cryptol. ePrint Arch., 2019:295, 2019.

    [14] Du-Ming Tsai, Morris SK Fan, Yi-Quan Huang, and Wei-Yao Chiu. Saw-mark defect detection in heterogeneous solar wafer images using gan-based training samples generation and cnn classification. In VISIGRAPP (5: VISAPP), pages 234–240, 2019.

    [15] Du-Ming Tsai, Yi-Quan Huang, and Wei-Yao Chiu. Deep learning from imbalanced data for automatic defect detection in multicrystalline solar wafer images. Measurement Science and Technology, 32(12):124003, 2021.

    [16] Justin Veiner, Fady Alajaji, and Bahman Gharesifard. A unifying generator loss function for generative adversarial networks. Entropy, 26(4):290, 2024.

    [17] Junliang Wang, Zhengliang Yang, Jie Zhang, Qihua Zhang, and Wei-Ting Kary Chien. Adabalgan: An improved generative adversarial network with imbalanced learning for wafer defective pattern recognition. IEEE Transactions on Semiconductor Manufacturing, 32(3):310–319, 2019.

    [18] Charles V Wright, Wu-chi Feng, and Feng Liu. Thumbnail-preserving encryption for jpeg. In Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pages 141–146, 2015.

    [19] Ming-Ju Wu, Jyh-Shing R Jang, and Jui-Long Chen. Wafer map failure pattern recognition and similarity ranking for large-scale data sets. IEEE Transactions on Semiconductor Manufacturing, 28(1):1–12, 2014.

    [20] Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision, pages 2223–2232, 2017.
    Description: 碩士
    國立政治大學
    資訊科學系
    111753210
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0111753210
    Data Type: thesis
    Appears in Collections:[Department of Computer Science ] Theses

    Files in This Item:

    File Description SizeFormat
    321001.pdf1856KbAdobe PDF0View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback