Skip to main content

Blind Face Retrieval for Mobile Users

  • Conference paper
  • First Online:

Part of the book series: EAI/Springer Innovations in Communication and Computing ((EAISICC))

Abstract

Recently, cloud storage and processing have been widely adopted. Mobile users in one family or one team may automatically backup their photos to the same shared cloud storage space. The powerful face detector trained and provided by a 3rd party may be used to retrieve the photo collection which contains a specific group of persons from the cloud storage server. However, the privacy of the mobile users may be leaked to the cloud server providers. In the meanwhile, the copyright of the face detector should be protected. Thus, in this paper, we propose a protocol of privacy preserving face retrieval in the cloud for mobile users, which protects the user photos and the face detector simultaneously. The cloud server only provides the resources of storage and computing and cannot learn anything from the user photos and the face detector. We test our protocol inside several families and classes. The experimental results reveal that our protocol can successfully retrieve the proper photos from the cloud server and protect the user photos and the face detector.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://opencv.org/.

References

  1. Avidan, S., & Butman, M. (2006). Blind vision. In Proceedings of the 9th European Conference on Computer Vision – Volume Part III (pp. 1–13). Berlin: Springer.

    Google Scholar 

  2. Bost, R., Popa, R. A., Tu, S., & Goldwasser, S. (2015). Machine learning classification over encrypted data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014.

    Google Scholar 

  3. Chu, C., Jung, J., Liu, Z., & Mahajan, R. (2014). sTRACK: Secure tracking in community surveillance. In Proceedings of the ACM International Conference on Multimedia, MM’14 (pp. 837–840). New York, NY: ACM.

    Google Scholar 

  4. Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES – the Advanced Encryption Standard. Berlin: Springer.

    Book  Google Scholar 

  5. Fanti, G. C., Finiasz, M., & Ramchandran, K. (2013). One-way private media search on public databases: The role of signal processing. IEEE Signal Processing Magazine, 30(2), 53–61.

    Article  Google Scholar 

  6. Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., et al. (2015). Applications and techniques in information security. In Proceedings of the 6th International Conference, ATIS 2015 – Color Image Encryption in CIE L*a*b* Space (pp. 74–85). Berlin: Springer.

    Google Scholar 

  7. Jin, X., Guo, K., Song, C., Li, X., Zhao, G., Luo, J., et al. (2016). Private video foreground extraction through chaotic mapping based encryption in the cloud. In Proceedings, Part I, of the 22nd International Conference on Multimedia Modeling (pp. 562–573). Berlin: Springer.

    Google Scholar 

  8. Jin, X., Wu, Y., Li, X., Li, Y., Zhao, G., & Guo, K. (2016). PPViBe: Privacy preserving background extractor via secret sharing in multiple cloud servers. In 8th International Conference on Wireless Communications & Signal Processing, WCSP 2016 (pp. 1–5). Piscataway: IEEE.

    Google Scholar 

  9. Jin, X., Yuan, P., Li, X., Song, C., Ge, S., Zhao, G., et al. (2017). Efficient privacy preserving Viola-Jones type object detection via random base image representation. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME) 2017. Piscataway: IEEE.

    Google Scholar 

  10. Osadchy, M., Pinkas, B., Jarrous, A., & Moskovich, B. (2010). SCiFI – a system for secure face identification. In 31st IEEE Symposium on Security and Privacy, S&P 2010 (pp. 239–254). Piscataway: IEEE.

    Chapter  Google Scholar 

  11. Shashank, J., Kowshik, P., Srinathan, K., & Jawahar, C.V. (2008). Private content based image retrieval. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008). Piscataway: IEEE.

    Google Scholar 

  12. Sohn, H., Plataniotis, K. N., & Ro, Y. M. (2010). Privacy-preserving watch list screening in video surveillance system. In Proceedings of the Advances in Multimedia Information Processing - PCM 2010 – 11th Pacific Rim Conference on Multimedia (pp. 622–632). Berlin: Springer.

    Chapter  Google Scholar 

  13. Upmanyu, M., Namboodiri, A. M., Srinathan, K., & Jawahar, C. V. (2009). Efficient privacy preserving video surveillance. In IEEE 12th International Conference on Computer Vision, ICCV 2009 (pp. 1639–1646). Piscataway: IEEE.

    Chapter  Google Scholar 

  14. Viola, P. A., & Jones, M. J. (2001). Robust real-time face detection. In IEEE 8th International Conference on Computer Vision, ICCV 2011 (p. 747). Piscataway: IEEE.

    Google Scholar 

  15. Viola, P. A., & Jones, M. J. (2004). Robust real-time face detection. International Journal of Computer Vision, 57(2), 137–154.

    Article  Google Scholar 

  16. Wong, W. K., Cheung, D. W. l., Kao, B., & Mamoulis, N. (2009). Secure kNN computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (p. 139–152). New York, NY: ACM.

    Google Scholar 

  17. Wright, J., Yang, A. Y., Ganesh, A., Sastry, S. S., & Ma, Y. (2009). Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(2), 210–227.

    Article  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China (Grant Nos. 61772047, 61772513), the Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), and the Fundamental Research Funds for the Central Universities (Grant No. 328201803, 328201801).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiming Ge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jin, X., Ge, S., Song, C., Wu, L., Sun, H. (2020). Blind Face Retrieval for Mobile Users. In: Lu, H., Yujie, L. (eds) 2nd EAI International Conference on Robotic Sensor Networks. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-17763-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17763-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17762-1

  • Online ISBN: 978-3-030-17763-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics