{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:14:46Z","timestamp":1772043286509,"version":"3.50.1"},"reference-count":61,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T00:00:00Z","timestamp":1622937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Satellite images have drawn increasing interest from a wide variety of users, including business and government, ever since their increased usage in important fields ranging from weather, forestry and agriculture to surface changes and biodiversity monitoring. Recent updates in the field have also introduced various deep learning (DL) architectures to satellite imagery as a means of extracting useful information. However, this new approach comes with its own issues, including the fact that many users utilize ready-made cloud services (both public and private) in order to take advantage of built-in DL algorithms and thus avoid the complexity of developing their own DL architectures. However, this presents new challenges to protecting data against unauthorized access, mining and usage of sensitive information extracted from that data. Therefore, new privacy concerns regarding sensitive data in satellite images have arisen. This research proposes an efficient approach that takes advantage of privacy-preserving deep learning (PPDL)-based techniques to address privacy concerns regarding data from satellite images when applying public DL models. In this paper, we proposed a partially homomorphic encryption scheme (a Paillier scheme), which enables processing of confidential information without exposure of the underlying data. Our method achieves robust results when applied to a custom convolutional neural network (CNN) as well as to existing transfer learning methods. The proposed encryption scheme also allows for training CNN models on encrypted data directly, which requires lower computational overhead. Our experiments have been performed on a real-world dataset covering several regions across Saudi Arabia. The results demonstrate that our CNN-based models were able to retain data utility while maintaining data privacy. Security parameters such as correlation coefficient (\u22120.004), entropy (7.95), energy (0.01), contrast (10.57), number of pixel change rate (4.86), unified average change intensity (33.66), and more are in favor of our proposed encryption scheme. To the best of our knowledge, this research is also one of the first studies that applies PPDL-based techniques to satellite image data in any capacity.<\/jats:p>","DOI":"10.3390\/rs13112221","type":"journal-article","created":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T01:56:40Z","timestamp":1623031000000},"page":"2221","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification"],"prefix":"10.3390","volume":"13","author":[{"given":"Munirah","family":"Alkhelaiwi","sequence":"first","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"},{"name":"RIADI Laboratory, University of Manouba, Manouba 2010, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3787-7423","authenticated-orcid":false,"given":"Anis","family":"Koubaa","sequence":"additional","affiliation":[{"name":"Robotics and Internet-of-Things Laboratory, Prince Sultan University, Riyadh 12435, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8236-8746","authenticated-orcid":false,"given":"Maha","family":"Driss","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"},{"name":"RIADI Laboratory, University of Manouba, Manouba 2010, Tunisia"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,6]]},"reference":[{"key":"ref_1","unstructured":"Sanderson, R. (2021, June 06). Introduction to Remote Sensing. Available online: http:\/\/faculty.kfupm.edu.sa\/crp\/bramadan\/crp514\/readings\/7%20-%20Introd_Remote_Sensing_Dr_Sanderson_New_Mexico_State_Univ_38Pages.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Carranza-Garc\u00eda, M., Garc\u00eda-Guti\u00e9rrez, J., and Riquelme, J.C. (2019). A framework for evaluating land use and land cover classification using convolutional neural networks. Remote Sens., 11.","DOI":"10.3390\/rs11030274"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Costache, R., Bao Pham, Q., Corodescu-Ro\u0219ca, E., C\u00eempianu, C., Hong, H., Thi Thuy Linh, N., Ming Fai, C., Najah Ahmed, A., Vojtek, M., and Muhammed Pandhiani, S. (2020). Using GIS, remote sensing, and machine learning to highlight the correlation between the land-use\/land-cover changes and flash-flood potential. Remote Sens., 12.","DOI":"10.3390\/rs12091422"},{"key":"ref_4","first-page":"102313","article-title":"Crop type mapping by using transfer learning","volume":"98","author":"Nowakowski","year":"2021","journal-title":"Int. J. Appl. Earth Obs. Geoinf."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pan, X., Yang, F., Gao, L., Chen, Z., Zhang, B., Fan, H., and Ren, J. (2019). Building Extraction from High-Resolution Aerial Imagery Using a Generative Adversarial Network with Spatial and Channel Attention Mechanisms. Remote Sens., 11.","DOI":"10.3390\/rs11080917"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"100318","DOI":"10.1016\/j.cosrev.2020.100318","article-title":"Big data and IoT-based applications in smart environments: A systematic review","volume":"39","author":"Hajjaji","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_7","unstructured":"Hong, D., Gao, L., Yao, J., Zhang, B., Plaza, A., and Chanussot, J. (2020). Graph Convolutional Networks for Hyperspectral Image Classification. IEEE Trans. Geosci. Remote Sens., 1\u201313."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"102769","DOI":"10.1016\/j.jnca.2020.102769","article-title":"Privacy preserving based logistic regression on big data","volume":"171","author":"Fan","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","article-title":"Privacy-preserving machine learning: Threats and solutions","volume":"17","author":"Chang","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"ref_10","unstructured":"Raynal, M., Achanta, R., and Humbert, M. (2020). Image Obfuscation for Privacy-Preserving Machine Learning. arXiv."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.neucom.2019.11.041","article-title":"A review of privacy-preserving techniques for deep learning","volume":"384","author":"Boulemtafes","year":"2020","journal-title":"Neurocomputing"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2220","DOI":"10.1109\/TVLSI.2017.2688340","article-title":"Deep convolutional neural network architecture with reconfigurable computation patterns","volume":"25","author":"Tu","year":"2017","journal-title":"IEEE Trans. Very Large Scale Integr. (Vlsi) Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Albawi, S., Mohammed, T.A., and Al-Zawi, S. (2017, January 21\u201323). Understanding of a convolutional neural network. Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey.","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Li, Q., Cai, W., Wang, X., Zhou, Y., Feng, D.D., and Chen, M. (2014, January 10\u201312). Medical image classification with convolutional neural network. Proceedings of the 2014 13th International Conference on Control Automation Robotics & Vision (ICARCV), Singapore.","DOI":"10.1109\/ICARCV.2014.7064414"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"167425","DOI":"10.1109\/ACCESS.2020.3023084","article-title":"Privacy-Preserving Deep Learning on Machine Learning as a Service\u2014A Comprehensive Survey","volume":"8","author":"Tanuwidjaja","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3214303","article-title":"A survey on homomorphic encryption schemes: Theory and implementation","volume":"51","author":"Acar","year":"2018","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"101940","DOI":"10.1016\/j.sysarc.2020.101940","article-title":"Privacy attacks against deep learning models and their countermeasures","volume":"114","author":"Shafee","year":"2020","journal-title":"J. Syst. Archit."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Huang, Z., Pan, Z., and Lei, B. (2017). Transfer learning with deep convolutional neural network for SAR target classification with limited labeled data. Remote Sens., 9.","DOI":"10.3390\/rs9090907"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ng, H.W., Nguyen, V.D., Vonikakis, V., and Winkler, S. (2015, January 9\u201313). Deep learning for emotion recognition on small datasets using transfer learning. Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, Seattle, WA, USA.","DOI":"10.1145\/2818346.2830593"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Serra, E., Sharma, A., Joaristi, M., and Korzh, O. (2018, January 28\u201331). Unknown landscape identification with CNN transfer learning. Proceedings of the 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Barcelona, Spain.","DOI":"10.1109\/ASONAM.2018.8508357"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Rezende, E., Ruppert, G., Carvalho, T., Theophilo, A., Ramos, F., and de Geus, P. (2018). Malicious software classification using VGG16 deep neural network\u2019s bottleneck features. Information Technology-New Generations, Springer.","DOI":"10.1007\/978-3-319-77028-4_9"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Liu, B., Zhang, X., Gao, Z., and Chen, L. (2017, January 8\u20139). Weld defect images classification with vgg16-based neural network. Proceedings of the International Forum on Digital TV and Wireless Multimedia Communications, Shanghai, China.","DOI":"10.1007\/978-981-10-8108-8_20"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Rezende, E., Ruppert, G., Carvalho, T., Ramos, F., and De Geus, P. (2017, January 18\u201321). Malicious software classification using transfer learning of resnet-50 deep neural network. Proceedings of the 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico.","DOI":"10.1109\/ICMLA.2017.00-19"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chollet, F. (2017, January 21\u201326). Xception: Deep learning with depthwise separable convolutions. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., Van Der Maaten, L., and Weinberger, K.Q. (2017, January 21\u201326). Densely connected convolutional networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Briggs, C., Fan, Z., and Andras, P. (2020). A Review of Privacy-preserving Federated Learning for the Internet-of-Things. arXiv.","DOI":"10.1007\/978-3-030-70604-3_2"},{"key":"ref_28","first-page":"6535834","article-title":"A Review of Deep Learning Security and Privacy Defensive Techniques","volume":"2020","author":"Tariq","year":"2020","journal-title":"Mob. Inf. Syst."},{"key":"ref_29","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secur. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/bs.adcom.2019.06.002","article-title":"Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities","volume":"Volume 115","author":"Shrestha","year":"2019","journal-title":"Advances in Computers"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Parmar, P.V., Padhar, S.B., Patel, S.N., Bhatt, N.I., and Jhaveri, R.H. (2014). Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl., 91.","DOI":"10.5120\/15902-5081"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Tebaa, M., El Hajji, S., and El Ghazi, A. (2012, January 4\u20136). Homomorphic encryption applied to the cloud computing security. Proceedings of the World Congress on Engineering, London, UK.","DOI":"10.1109\/JNS2.2012.6249248"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Huang, K., Liu, X., Fu, S., Guo, D., and Xu, M. (2019). A lightweight privacy-preserving CNN feature extraction framework for mobile sensing. IEEE Trans. Dependable Secur. Comput.","DOI":"10.1109\/TDSC.2019.2913362"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Tso, R., Liu, Z.Y., and Hsiao, J.H. (2019). Distributed E-voting and E-bidding systems based on smart contract. Electronics, 8.","DOI":"10.3390\/electronics8040422"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","article-title":"Secure multi-party computation: Theory, practice and applications","volume":"476","author":"Zhao","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","article-title":"Secure, privacy-preserving and federated machine learning in medical imaging","volume":"2","author":"Kaissis","year":"2020","journal-title":"Nat. Mach. Intell."},{"key":"ref_37","first-page":"209","article-title":"Differential privacy: A primer for a non-technical audience","volume":"21","author":"Wood","year":"2018","journal-title":"Vand. J. Ent. Tech. L."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., and Zhou, Y. (2019, January 15). A hybrid approach to privacy-preserving federated learning. Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK.","DOI":"10.1145\/3338501.3357370"},{"key":"ref_39","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"2630","DOI":"10.1007\/s00259-019-04373-w","article-title":"Artificial intelligence, machine (deep) learning and radio (geno) mics: Definitions and nuclear medicine imaging applications","volume":"46","author":"Visvikis","year":"2019","journal-title":"Eur. J. Nucl. Med. Mol. Imaging"},{"key":"ref_41","unstructured":"Wang, S., and Chang, J.M. (2020). Privacy-Preserving Image Classification in the Local Setting. arXiv."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., and Zhang, L. (2016, January 24\u201328). Deep learning with differential privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria.","DOI":"10.1145\/2976749.2978318"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5778","DOI":"10.1109\/JIOT.2019.2905555","article-title":"Lightweight privacy-preserving ensemble classification for face recognition","volume":"6","author":"Ma","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_44","unstructured":"Xia, Z., Gu, Q., Xiong, L., Zhou, W., and Weng, J. (2020). Privacy-Preserving Image Retrieval Based on Additive Secret Sharing. arXiv."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., and Toft, T. (2009, January 5\u20137). Privacy-preserving face recognition. Proceedings of the International symposium on privacy enhancing technologies symposium, Seattle, WA, USA.","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"ref_46","unstructured":"Morris, L. (2013). Analysis of partially and fully homomorphic encryption. Rochester Inst. Technol., 1\u20135. Available online: http:\/\/gauss.ececs.uc.edu\/Courses\/c6056\/pdf\/homo-outline.pdf."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Yi, X., Paulet, R., and Bertino, E. (2014). Homomorphic encryption. Homomorphic Encryption and Applications, Springer.","DOI":"10.1007\/978-3-319-12229-8"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"El Makkaoui, K., Ezzati, A., and Beni-Hssane, A. (2017). Cloud-RSA: An enhanced homomorphic encryption scheme. Europe and MENA Cooperation Advances in Information and Communication Technologies, Springer.","DOI":"10.1109\/WINCOM.2016.7777192"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Phung, V.H., and Rhee, E.J. (2019). A high-accuracy model average ensemble of convolutional neural networks for classification of cloud image patches on small datasets. Appl. Sci., 9.","DOI":"10.3390\/app9214500"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.tice.2019.04.009","article-title":"A comparative study of deep learning architectures on melanoma detection","volume":"58","author":"Kassani","year":"2019","journal-title":"Tissue Cell"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s12145-018-00376-7","article-title":"A top-down approach for semantic segmentation of big remote sensing images","volume":"12","author":"Boulila","year":"2019","journal-title":"Earth Sci. Inform."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"106014","DOI":"10.1016\/j.compag.2021.106014","article-title":"RS-DCNN: A novel distributed convolutional-neural-networks based-approach for big remote-sensing image classification","volume":"182","author":"Boulila","year":"2021","journal-title":"Comput. Electron. Agric."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"101325","DOI":"10.1016\/j.ecoinf.2021.101325","article-title":"A novel CNN-LSTM-based approach to predict urban expansion","volume":"64","author":"Boulila","year":"2021","journal-title":"Ecol. Inform."},{"key":"ref_54","first-page":"25","article-title":"Efficiency analysis and security evaluation of image encryption schemes","volume":"23","author":"Ahmad","year":"2010","journal-title":"Computing"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","article-title":"Chaos-based confusion and diffusion of image pixels using dynamic substitution","volume":"8","author":"Qayyum","year":"2020","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Masood, F., Boulila, W., Ahmad, J., Sankar, S., Rubaiee, S., and Buchanan, W.J. (2020). A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos. Remote Sens., 12.","DOI":"10.3390\/rs12111893"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"159732","DOI":"10.1109\/ACCESS.2020.3020917","article-title":"DNA and plaintext dependent chaotic visual selective image encryption","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"13951","DOI":"10.1007\/s11042-015-2973-y","article-title":"A secure image encryption scheme based on chaotic maps and affine transformation","volume":"75","author":"Ahmad","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_59","first-page":"2968","article-title":"Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes","volume":"57","author":"Ali","year":"2016","journal-title":"Iraqi J. Sci."},{"key":"ref_60","first-page":"275","article-title":"A new fast and simple image encryption algorithm using scan patterns and XOR","volume":"6","author":"Rad","year":"2013","journal-title":"Int. J. Signal Process. Image Process. Pattern Recognit."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s11760-009-0144-1","article-title":"A comprehensive assessment of the structural similarity index","volume":"5","author":"Dosselmann","year":"2011","journal-title":"Signal Image Video Process."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/13\/11\/2221\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:11:20Z","timestamp":1760163080000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/13\/11\/2221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,6]]},"references-count":61,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["rs13112221"],"URL":"https:\/\/doi.org\/10.3390\/rs13112221","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,6]]}}}