Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy

Published: 21 June 2021 Publication History

Abstract

Recently, biometric identification has been extensively used for border control. Some face recognition systems have been designed based on Internet of Things. But the rich personal information contained in face images can cause severe privacy breach and abuse issues during the process of identification if a biometric system has compromised by insiders or external security attacks. Encrypting the query face image is the state-of-the-art solution to protect an individual’s privacy but incurs huge computational cost and poses a big challenge on time-critical identification applications. However, due to their high computational complexity, existing methods fail to handle large-scale biometric repositories where a target face is searched. In this article, we propose an efficient privacy-preserving face recognition scheme based on clustering. Concretely, our approach innovatively matches an encrypted face query against clustered faces in the repository to save computational cost while guaranteeing identification accuracy via a novel multi-matching scheme. To the best of our knowledge, our scheme is the first to reduce the computational complexity from O(M) in existing methods to approximate O(√M), where M is the size of a face repository. Extensive experiments on real-world datasets have shown the effectiveness and efficiency of our scheme.

References

[1]
Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, and Aviel D. Rubin. 2013. Charm: A framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3, 2 (2013), 111–128.
[2]
Djamila Aouada and Dalia Khader. 2014. SPN 2: Single-sided privacy preserving nearest neighbor and its application to face recognition. In Proceedings of the 2014 11th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS’14). IEEE, 31–36.
[3]
David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027–1035.
[4]
AT&T Laboratories Cambridge. 2018. The Database of Faces (formerly “The ORL Database of Faces”). Retrieved from http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html.
[5]
Prashanth Balraj Balla and K. T. Jadhao. 2018. IoT based facial recognition security system. In Proceedings of the 2018 International Conference on Smart City and Emerging Technology (ICSCET’18). IEEE, 1–4.
[6]
Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. 2005. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the 2nd Theory of Cryptography Conference (TCC 2005), Lecture Notes in Computer Science, Vol. 3378. Springer, 325–341.
[7]
Peter Carey. 2018. Data Protection: A Practical Guide to UK and EU Law. Oxford University Press, Inc.
[8]
Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, and Wei Jiang. 2014. Outsourceable two-party privacy-preserving biometric authentication. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. ACM, 401–412.
[9]
Ivan Damgard, Martin Geisler, and Mikkel Kroigard. 2008. Homomorphic encryption and secure comparison. Int. J. Appl. Cryptogr. 1, 1 (Feb. 2008), 22–31.
[10]
Ivan Damgard, Martin Geisler, and Mikkel Kroigard. 2009. A correction to ‘efficient and secure comparison for on-line auctions’. Int. J. Appl. Cryptogr. 1, 4 (Aug. 2009), 323–324.
[11]
Yousef Elmehdwi, Bharath K. Samanthula, and Wei Jiang. 2014. Secure k-nearest neighbor query over encrypted data in outsourced environments. In Proceedings of the 2014 IEEE 30th International Conference on Data Engineering (ICDE’14). IEEE, 664–675.
[12]
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, and Tomas Toft. 2009. Privacy-preserving face recognition. In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Springer, 235–253.
[13]
David Mandell Freeman. 2010. Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. 44–61.
[14]
G. N. Girish, Shrinivasa Naika C. L., and Pradip K. Das. 2014. Face recognition using MB-LBP and PCA: A comparative study. In Proceedings of the International Conference on Computer Communication and Informatics (ICCCI’14). IEEE, 1–6.
[15]
GNU. 2018. The GNU Multiple Precision Arithmetic Library. Retrieved from https://gmplib.org/.
[16]
Wilko Henecka, Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg, et al. 2010. TASTY: Tool for automating secure two-party computations. In Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, 451–462.
[17]
Shengshan Hu, Minghui Li, Qian Wang, Sherman S. M. Chow, and Minxin Du. 2018. Outsourced biometric identification with privacy. IEEE Trans. Inf. Forens. Secur. 13, 10 (2018), 2448–2463.
[18]
Yan Huang, David Evans, Jonathan Katz, and Lior Malka. 2011. Faster secure two-party computation using garbled circuits. In Proceedings of the USENIX Security Symposium, Vol. 201.
[19]
Yan Huang, Lior Malka, David Evans, and Jonathan Katz. 2011. Efficient privacy-preserving biometric identification. In Proceedings of the 17th Conference Network and Distributed System Security Symposium (NDSS’11).
[20]
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. 2009. Improved garbled circuit building blocks and applications to auctions and computing minima. In Proceedings of the International Conference on Cryptology and Network Security. Springer, 1–20.
[21]
Santosh Kumar, Sanjay Kumar Singh, Amit Kumar Singh, Shrikant Tiwari, and Ravi Shankar Singh. 2018. Privacy preserving security using biometrics in cloud computing. Multimedia Tools Appl. 77, 9 (2018), 11017–11039.
[22]
Meng Liu, Yun Luo, Priyadarsi Nanda, Shui Yu, and Jianbing Zhang. 2019. Efficient solution to the millionaires’ problem based on asymmetric commutative encryption scheme. Comput. Intell. 35, 3 (2019), 555–576.
[23]
Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, and Jianxin Li. 2018. Asymmetric commutative encryption scheme based efficient solution to the millionaires’ problem. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE’18). IEEE, 990–995.
[24]
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, and Boaz Moskovich. 2010. Scifi-a system for secure face identification. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP’10). IEEE, 239–254.
[25]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the Advances in Cryptology (EUROCRYPT’99). Springer, 223–238.
[26]
Annika Paus, Ahmad-Reza Sadeghi, and Thomas Schneider. 2009. Practical secure evaluation of semi-private functions. In Proceedings of the International Conference on Applied Cryptography and Network Security. Springer, 89–106.
[27]
Suraj Pawar, Vipul Kithani, Sagar Ahuja, and Sunita Sahu. 2018. Smart home security using IoT and face recognition. In Proceedings of the 2018 4th International Conference on Computing Communication Control and Automation (ICCUBEA’18). IEEE, 1–6.
[28]
P. Jonathon Phillips, Hyeonjoon Moon, Syed A. Rizvi, and Patrick J. Rauss. 2000. The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22, 10 (2000), 1090–1104.
[29]
Benny Pinkas, Thomas Schneider, Nigel P. Smart, and Stephen C. Williams. 2009. Secure two-party computation is practical. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security. Springer, 250–267.
[30]
Yinian Qi and Mikhail J. Atallah. 2008. Efficient privacy-preserving k-nearest neighbor search. In Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS’08). IEEE, 311–319.
[31]
Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2009. Efficient privacy-preserving face recognition. In Proceedings of the International Conference on Information Security and Cryptology. Springer, 229–244.
[32]
Muhammad Sajjad, Mansoor Nasir, Khan Muhammad, Siraj Khan, Zahoor Jan, Arun Kumar Sangaiah, Mohamed Elhoseny, and Sung Wook Baik. 2020. Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities. Fut. Gener. Comput. Syst. 108 (2020), 995–1007.
[33]
Axel Schropfer, Florian Kerschbaum, and Gunter Muller. 2011. L1-an intermediate language for mixed-protocol secure computation. In Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference (COMPSAC’11). IEEE, 298–307.
[34]
Jaroslav Šeděnka, Sathya Govindarajan, Paolo Gasti, and Kiran S. Balagani. 2015. Secure outsourced biometric authentication with performance evaluation on smartphones. IEEE Trans. Inf. Forens. Secur. 10, 2 (2015), 384–396.
[35]
Sayyada Fahmeeda Sultana and D. C. Shubhangi. 2017. Privacy preserving LBP based feature extraction on encrypted images. In Proceedings of the International Conference on Computer Communication and Informatics (ICCCI’17). IEEE, 1–4.
[36]
Motahareh Taheri, Saeed Mozaffari, and Parviz Keshavarzi. 2018. Face authentication in encrypted domain based on correlation filters. Multimedia Tools Appl. 77, 13 (2018), 17043–17067.
[37]
The European Parliament and the Council of the European Union. 2016. Regulation (EU) 2916/679 (general data protection regulation). Off. J. Eur. Union (2016).
[38]
Matthew Turk and Alex Pentland. 1991. Eigenfaces for recognition. J. Cogn. Neurosci. 3, 1 (1991), 71–86.
[39]
Matthew A. Turk and Alex P. Pentland. 1991. Face recognition using eigenfaces. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’91). IEEE, 586–591.
[40]
Thijs Veugen, Frank Blom, Sebastiaan J. A. de Hoogh, and Zekeriya Erkin. 2015. Secure comparison protocols in the semi-honest model. IEEE J. Select. Top. Sign. Process. 9, 7 (2015), 1217–1228.
[41]
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, and Zhibo Wang. 2015. CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In Proceedings of the European Symposium on Research in Computer Security. Springer, 186–205.
[42]
Li Weng, Laurent Amsaleg, and Teddy Furon. 2016. Privacy-preserving outsourced media search. IEEE Trans. Knowl. Data Eng. 28, 10 (2016), 2738–2751.
[43]
Wai Kit Wong, David Wai-lok Cheung, Ben Kao, and Nikos Mamoulis. 2009. Secure knn computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. ACM, 139–152.
[44]
Jiawei Yuan and Shucheng Yu. 2013. Efficient privacy-preserving biometric identification in cloud computing. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’13). IEEE, 2652–2660.
[45]
Samee Zahur and David Evans. 2015. Obliv-C: A language for extensible data-oblivious computation. IACR Cryptol. ePrint Arch. 2015 (2015), 1153.
[46]
Fan Zhang, Xiaoping Wang, and Ke Sun. 2016. A report on multilinear PCA plus GTDA to deal with face image. Cybernet. Inf. Technol. 16, 1 (2016), 146–157.

Cited By

View all
  • (2024)Learning Nighttime Semantic Segmentation the Hard WayACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365003220:7(1-23)Online publication date: 16-May-2024
  • (2024)SWRM: Similarity Window Reweighting and Margin for Long-Tailed RecognitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364381620:6(1-18)Online publication date: 8-Mar-2024
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Sensor Networks
ACM Transactions on Sensor Networks  Volume 17, Issue 3
August 2021
333 pages
ISSN:1550-4859
EISSN:1550-4867
DOI:10.1145/3470624
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 21 June 2021
Accepted: 01 January 2021
Revised: 01 November 2020
Received: 01 June 2020
Published in TOSN Volume 17, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Secure two-party computation
  2. face recognition
  3. privacy-preserving
  4. clustering
  5. computational complexity

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • ARC DECRA
  • Australian Government

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)54
  • Downloads (Last 6 weeks)4
Reflects downloads up to 04 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Learning Nighttime Semantic Segmentation the Hard WayACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365003220:7(1-23)Online publication date: 16-May-2024
  • (2024)SWRM: Similarity Window Reweighting and Margin for Long-Tailed RecognitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364381620:6(1-18)Online publication date: 8-Mar-2024
  • (2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
  • (2024)Maintaining Privacy in Face Recognition Using Federated Learning MethodIEEE Access10.1109/ACCESS.2024.337369112(39603-39613)Online publication date: 2024
  • (2023)An Image Classification Method Based on Adaptive Attention Mechanism and Feature Extraction NetworkComputational Intelligence and Neuroscience10.1155/2023/43055942023Online publication date: 1-Jan-2023
  • (2023)Practical Charger Placement Scheme for Wireless Rechargeable Sensor Networks with ObstaclesACM Transactions on Sensor Networks10.1145/361443120:1(1-23)Online publication date: 20-Oct-2023
  • (2023)Double-Layer Search and Adaptive Pooling Fusion for Reference-Based Image Super-ResolutionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/360493720:1(1-23)Online publication date: 25-Aug-2023
  • (2023)Real-time Image Enhancement with Attention AggregationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/356460719:2s(1-19)Online publication date: 17-Feb-2023
  • (2023)A Survey on Video Moment LocalizationACM Computing Surveys10.1145/355653755:9(1-37)Online publication date: 16-Jan-2023
  • (2023)Progressive Localization Networks for Language-Based Moment LocalizationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/354385719:2(1-21)Online publication date: 6-Feb-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media