Abstract
Viola-Jones algorithm (Viola and Jones 2001; Int J Comput Vis 57(2):137–154, 2004) is a milestone in the development of face detection technology. It greatly improves the efficiency of face detection on the premise of ensuring the accuracy, which indicates that the research results in the field of computer vision have the ability to put into practical applications. In an application scenario, the client uploads photos to the client server which has trained Viola-Jones detector to detect objects. In the process, privacy leakage of both side is the problem to be solved. Clients want to protect their photos and the cloud server wants to protect its algorithm parameters. Blind Vision (Avidan and Butman 2006), introduced by Avidan & Butman, combined OT(Obvious Transfer) protocol with Viola-Jones face detector to construct a secure face detection protocol. However, the efficiency of Blind Vision is not ideal. It will take a couple of hours to scan a single image. In this paper, we proposed the Random Base Image (RBI) Representation based secure object detection method to speed the process. The original image is divided into several pictures which are sent to the cloud randomly. At the same time, random numbers and redundant fake classifiers are generated to protect privacy parameters of the cloud. Compared with the traditional Blind Vision (Avidan and Butman 2006) method, we did not use OT protocol and Secure Millionaire protocol to calculate feture response of classifiers and compare them with thresholds, but uses random numbers and redundant fake classifiers to protect the privacy of both sides. In addition, the integral-graph can be used to accelerate the calculation of random base images. Experiments show that our method can achieve the same detection accuracy as the original Viola-Jones detector and is much faster than the traditional Blind Vision (Avidan and Butman 2006) method.
Similar content being viewed by others
References
Avidan S, Butman M (2006) Blind vision. In: Computer vision - ECCV 2006, 9th European conference on computer vision, Graz, Austria, May 7–13, 2006, proceedings, Part III, pp 1–13
Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems 19, proceedings of the twentieth annual conference on neural information processing systems, Vancouver, British Columbia, Canada, December 4–7, 2006, pp 57–64
Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. In: 22nd annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014
Chu C-T, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the ACM international conference on multimedia, MM’14, Orlando, FL, USA, November 03–07, 2014, pp 837–840
Chu C-T, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the 22nd ACM international conference on multimedia, MM ’14, New York, NY, USA. Association for computing machinery, pp 837–840
Chu K-Y, Kuo Y-H, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia, MM ’13, New York, NY, USA. Association for computing machinery, pp 597–600
Çiftçi S, Akyüz A O, Ebrahimi T (2018) A reliable and reversible image privacy protection based on false colors. IEEE Trans Multimed 20(1):68–81
Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR 2005), 20–26 June 2005, San Diego, CA, USA, pp 886–893
Ergun OO (2014) Privacy preserving face recognition in encrypted domain. In: 2014 IEEE Asia pacific conference on circuits and systems (APCCAS). IEEE, pp 643–646
Fanti GC, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30(2):53–61
Geng Z, Kui G, Xin J (2015) A moving object detection method of surveillance video based on privacy protection in the cloud. Journal of Beijing Electronic Science & Technology Institute (4), 55–60
Jain V, Learned-Miller E (2010) Fddb: a benchmark for face detection in unconstrained settings. Technical Report UM-CS-2010-009, University of Massachusetts Amherst
Jin X, Guo K, Song C, Li X, et al (2016) Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Multimedia modeling - 22nd international conference, MMM 2016, Miami, FL, USA, January 4–6, 2016, Proceedings, Part I, pp 562–573
Jin X, Yuan P, Li X, Song C, Ge S, Zhao G, Chen Y (2017) Efficient privacy preserving viola-jones type object detection via random base image representation. In: 2017 IEEE international conference on multimedia and expo, ICME 2017, Hong Kong, China, July 10–14, 2017, pp 673–678
Ore Ø (1988) Number theory and its history. Dover Pubns, pp 129–131. ISBN: 9780486656205
Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi - a system for secure face identification. In: 31St IEEE symposium on security and privacy, s&p 2010, 16–19 May 2010, Berleley/Oakland, California, USA, pp 239–254
Rabin T, Ben-Or M (1989) Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the twenty-first annual ACM symposium on theory of computing. ACM, pp 73–85
Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: 2008 IEEE computer society conference on computer vision and pattern recognition (CVPR 2008), 24–26 June 2008, Anchorage, Alaska, USA
Sohn H, Plataniotis KN, Ro YM (2010) Privacy-preserving watch list screening in video surveillance system. In: Advances in multimedia information processing - PCM 2010 - 11th pacific rim conference on multimedia, Shanghai, China, September 21–24, 2010, proceedings, Part I, pp 622–632
Spacek L (2007) Collection of facial images: faces96. http://cswww.essex.ac.uk/mv/allfaces/faces96.html
Thomaz CE, Giraldi GA (2010) A new ranking method for principal components analysis and its application to face image analysis. Image Vision Comput 28(6):902–913
Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient privacy preserving video surveillance. In: IEEE 12th international conference on computer vision, ICCV, Kyoto, Japan, September 27–October 4, pp 1639–1646
Viola PA, Jones MJ (2001) Robust real-time face detection. In: IEEE 8th international conference on computer vision ICCV 2011, Vancouver, British Columbia, Canada, July 7–14, 2001, p 747
Viola PA, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154
Wang Q, Gao L, Wang H, Wei X (2019) Face detection for privacy protected images. IEEE Access 7:3918–3927
Acknowledgments
Parts of the results and figures presented in this paper have previously appeared in our previous work [14]. We add more technical details and experimental results in this version. This work is partially supported by the National Natural Science Foundation of China (grant numbers 62072014), the Beijing Natural Science Foundation (grant number L192040), the Open Research Fund of Beijing Key Laboratory of Big Data Technology for Food Safety (grant number BTBD- 2018KF-07), Beijing Technology and Business University, the Open Project Program of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (grant number VRLAB2019C03), and the Fundamental Research Funds for the Central Universities (grant number. 328201906).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jin, X., Zhang, H., Li, X. et al. Random base image representation for efficient blind vision. Multimed Tools Appl 80, 7711–7726 (2021). https://doi.org/10.1007/s11042-020-10124-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10124-z