Abstract
Recently, cloud storage and processing have been widely adopted. Mobile users in one family or one team may automatically backup their photos to the same shared cloud storage space. The powerful face detector trained and provided by a 3rd party may be used to retrieve the photo collection which contains a specific group of persons from the cloud storage server. However, the privacy of the mobile users may be leaked to the cloud server providers. In the meanwhile, the copyright of the face detector should be protected. Thus, in this paper, we propose a protocol of privacy preserving face retrieval in the cloud for mobile users, which protects the user photos and the face detector simultaneously. The cloud server only provides the resources of storage and computing and cannot learn anything from the user photos and the face detector. We test our protocol inside several families and classes. The experimental results reveal that our protocol can successfully retrieve the proper photos from the cloud server and protect the user photos and the face detector.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
References
Avidan, S., & Butman, M. (2006). Blind vision. In Proceedings of the 9th European Conference on Computer Vision – Volume Part III (pp. 1–13). Berlin: Springer.
Bost, R., Popa, R. A., Tu, S., & Goldwasser, S. (2015). Machine learning classification over encrypted data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014.
Chu, C., Jung, J., Liu, Z., & Mahajan, R. (2014). sTRACK: Secure tracking in community surveillance. In Proceedings of the ACM International Conference on Multimedia, MM’14 (pp. 837–840). New York, NY: ACM.
Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES – the Advanced Encryption Standard. Berlin: Springer.
Fanti, G. C., Finiasz, M., & Ramchandran, K. (2013). One-way private media search on public databases: The role of signal processing. IEEE Signal Processing Magazine, 30(2), 53–61.
Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., et al. (2015). Applications and techniques in information security. In Proceedings of the 6th International Conference, ATIS 2015 – Color Image Encryption in CIE L*a*b* Space (pp. 74–85). Berlin: Springer.
Jin, X., Guo, K., Song, C., Li, X., Zhao, G., Luo, J., et al. (2016). Private video foreground extraction through chaotic mapping based encryption in the cloud. In Proceedings, Part I, of the 22nd International Conference on Multimedia Modeling (pp. 562–573). Berlin: Springer.
Jin, X., Wu, Y., Li, X., Li, Y., Zhao, G., & Guo, K. (2016). PPViBe: Privacy preserving background extractor via secret sharing in multiple cloud servers. In 8th International Conference on Wireless Communications & Signal Processing, WCSP 2016 (pp. 1–5). Piscataway: IEEE.
Jin, X., Yuan, P., Li, X., Song, C., Ge, S., Zhao, G., et al. (2017). Efficient privacy preserving Viola-Jones type object detection via random base image representation. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME) 2017. Piscataway: IEEE.
Osadchy, M., Pinkas, B., Jarrous, A., & Moskovich, B. (2010). SCiFI – a system for secure face identification. In 31st IEEE Symposium on Security and Privacy, S&P 2010 (pp. 239–254). Piscataway: IEEE.
Shashank, J., Kowshik, P., Srinathan, K., & Jawahar, C.V. (2008). Private content based image retrieval. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008). Piscataway: IEEE.
Sohn, H., Plataniotis, K. N., & Ro, Y. M. (2010). Privacy-preserving watch list screening in video surveillance system. In Proceedings of the Advances in Multimedia Information Processing - PCM 2010 – 11th Pacific Rim Conference on Multimedia (pp. 622–632). Berlin: Springer.
Upmanyu, M., Namboodiri, A. M., Srinathan, K., & Jawahar, C. V. (2009). Efficient privacy preserving video surveillance. In IEEE 12th International Conference on Computer Vision, ICCV 2009 (pp. 1639–1646). Piscataway: IEEE.
Viola, P. A., & Jones, M. J. (2001). Robust real-time face detection. In IEEE 8th International Conference on Computer Vision, ICCV 2011 (p. 747). Piscataway: IEEE.
Viola, P. A., & Jones, M. J. (2004). Robust real-time face detection. International Journal of Computer Vision, 57(2), 137–154.
Wong, W. K., Cheung, D. W. l., Kao, B., & Mamoulis, N. (2009). Secure kNN computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (p. 139–152). New York, NY: ACM.
Wright, J., Yang, A. Y., Ganesh, A., Sastry, S. S., & Ma, Y. (2009). Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(2), 210–227.
Acknowledgements
This work is partially supported by the National Natural Science Foundation of China (Grant Nos. 61772047, 61772513), the Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), and the Fundamental Research Funds for the Central Universities (Grant No. 328201803, 328201801).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Jin, X., Ge, S., Song, C., Wu, L., Sun, H. (2020). Blind Face Retrieval for Mobile Users. In: Lu, H., Yujie, L. (eds) 2nd EAI International Conference on Robotic Sensor Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-17763-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-17763-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17762-1
Online ISBN: 978-3-030-17763-8
eBook Packages: EngineeringEngineering (R0)