Blind Face Retrieval for Mobile Users
Recently, cloud storage and processing have been widely adopted. Mobile users in one family or one team may automatically backup their photos to the same shared cloud storage space. The powerful face detector trained and provided by a 3rd party may be used to retrieve the photo collection which contains a specific group of persons from the cloud storage server. However, the privacy of the mobile users may be leaked to the cloud server providers. In the meanwhile, the copyright of the face detector should be protected. Thus, in this paper, we propose a protocol of privacy preserving face retrieval in the cloud for mobile users, which protects the user photos and the face detector simultaneously. The cloud server only provides the resources of storage and computing and cannot learn anything from the user photos and the face detector. We test our protocol inside several families and classes. The experimental results reveal that our protocol can successfully retrieve the proper photos from the cloud server and protect the user photos and the face detector.
KeywordsPrivacy preserving Face retrieval Cloud
This work is partially supported by the National Natural Science Foundation of China (Grant Nos. 61772047, 61772513), the Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), and the Fundamental Research Funds for the Central Universities (Grant No. 328201803, 328201801).
- 1.Avidan, S., & Butman, M. (2006). Blind vision. In Proceedings of the 9th European Conference on Computer Vision – Volume Part III (pp. 1–13). Berlin: Springer.Google Scholar
- 2.Bost, R., Popa, R. A., Tu, S., & Goldwasser, S. (2015). Machine learning classification over encrypted data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014.Google Scholar
- 3.Chu, C., Jung, J., Liu, Z., & Mahajan, R. (2014). sTRACK: Secure tracking in community surveillance. In Proceedings of the ACM International Conference on Multimedia, MM’14 (pp. 837–840). New York, NY: ACM.Google Scholar
- 6.Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., et al. (2015). Applications and techniques in information security. In Proceedings of the 6th International Conference, ATIS 2015 – Color Image Encryption in CIE L*a*b* Space (pp. 74–85). Berlin: Springer.Google Scholar
- 7.Jin, X., Guo, K., Song, C., Li, X., Zhao, G., Luo, J., et al. (2016). Private video foreground extraction through chaotic mapping based encryption in the cloud. In Proceedings, Part I, of the 22nd International Conference on Multimedia Modeling (pp. 562–573). Berlin: Springer.Google Scholar
- 8.Jin, X., Wu, Y., Li, X., Li, Y., Zhao, G., & Guo, K. (2016). PPViBe: Privacy preserving background extractor via secret sharing in multiple cloud servers. In 8th International Conference on Wireless Communications & Signal Processing, WCSP 2016 (pp. 1–5). Piscataway: IEEE.Google Scholar
- 9.Jin, X., Yuan, P., Li, X., Song, C., Ge, S., Zhao, G., et al. (2017). Efficient privacy preserving Viola-Jones type object detection via random base image representation. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME) 2017. Piscataway: IEEE.Google Scholar
- 11.Shashank, J., Kowshik, P., Srinathan, K., & Jawahar, C.V. (2008). Private content based image retrieval. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008). Piscataway: IEEE.Google Scholar
- 14.Viola, P. A., & Jones, M. J. (2001). Robust real-time face detection. In IEEE 8th International Conference on Computer Vision, ICCV 2011 (p. 747). Piscataway: IEEE.Google Scholar
- 16.Wong, W. K., Cheung, D. W. l., Kao, B., & Mamoulis, N. (2009). Secure kNN computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (p. 139–152). New York, NY: ACM.Google Scholar