Privacy-preserving face recognition with outsourced computation
نویسندگان
چکیده
Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition cannot be efficiently executed. Consequently, it would be desirable to reduce computation over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition is readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 C. Xiang College of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China E-mail: [email protected] C. Tang College of Mathematics and Information Science, Guangzhou University, Guangzhou 510006, China Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou 510006, China State Key Laboratory of Information Security, Beijing 100093, China E-mail: [email protected] of the corresponding protocol in the state of the art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M , where M is the size of the face database. Furthermore, the client can verify the correction of the recognition result.
منابع مشابه
Efficient Privacy-Preserving Face Recognition
Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, the rapid improvement and widespread deployment of this technology raises strong concerns regarding the violation of individuals’ privacy. A typical application scenario for privacy-preserving face recognition concerns a client ...
متن کاملOutsource Photo Sharing and Searching for Mobile Devices With Privacy Protection
With the proliferation of mobile devices, cloud-based photo sharing and searching services are becoming common due to the mobile devices’ resource constrains. Meanwhile, there is also increasing concern about privacy in photos. In this work, we present a framework SouTu, which enables cloud servers to provide privacy-preserving photo sharing and search as a service to mobile device users. Priva...
متن کاملPrivacy-Preserving Face Recognition
Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, in particular if the biometric matching process is performed at a central or untrusted server, and calls for the implementation of Privacy-Enhancing Technologies. In this paper we propose for the first time a strongly privacy-en...
متن کاملA Secure Outsourced Garbled Circuit Evaluation for Mobile Devices
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet only have access to the comparatively sparse c...
متن کاملSecure Outsourced Garbled Circuit Evaluation for Mobile Devices
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet only have access to the comparatively sparse c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014