Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Random base image representation for efficient blind vision

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Viola-Jones algorithm (Viola and Jones 2001; Int J Comput Vis 57(2):137–154, 2004) is a milestone in the development of face detection technology. It greatly improves the efficiency of face detection on the premise of ensuring the accuracy, which indicates that the research results in the field of computer vision have the ability to put into practical applications. In an application scenario, the client uploads photos to the client server which has trained Viola-Jones detector to detect objects. In the process, privacy leakage of both side is the problem to be solved. Clients want to protect their photos and the cloud server wants to protect its algorithm parameters. Blind Vision (Avidan and Butman 2006), introduced by Avidan & Butman, combined OT(Obvious Transfer) protocol with Viola-Jones face detector to construct a secure face detection protocol. However, the efficiency of Blind Vision is not ideal. It will take a couple of hours to scan a single image. In this paper, we proposed the Random Base Image (RBI) Representation based secure object detection method to speed the process. The original image is divided into several pictures which are sent to the cloud randomly. At the same time, random numbers and redundant fake classifiers are generated to protect privacy parameters of the cloud. Compared with the traditional Blind Vision (Avidan and Butman 2006) method, we did not use OT protocol and Secure Millionaire protocol to calculate feture response of classifiers and compare them with thresholds, but uses random numbers and redundant fake classifiers to protect the privacy of both sides. In addition, the integral-graph can be used to accelerate the calculation of random base images. Experiments show that our method can achieve the same detection accuracy as the original Viola-Jones detector and is much faster than the traditional Blind Vision (Avidan and Butman 2006) method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Avidan S, Butman M (2006) Blind vision. In: Computer vision - ECCV 2006, 9th European conference on computer vision, Graz, Austria, May 7–13, 2006, proceedings, Part III, pp 1–13

  2. Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems 19, proceedings of the twentieth annual conference on neural information processing systems, Vancouver, British Columbia, Canada, December 4–7, 2006, pp 57–64

  3. Bost R, Popa RA, Tu S, Goldwasser S (2015) Machine learning classification over encrypted data. In: 22nd annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014

  4. Chu C-T, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the ACM international conference on multimedia, MM’14, Orlando, FL, USA, November 03–07, 2014, pp 837–840

  5. Chu C-T, Jung J, Liu Z, Mahajan R (2014) Strack: secure tracking in community surveillance. In: Proceedings of the 22nd ACM international conference on multimedia, MM ’14, New York, NY, USA. Association for computing machinery, pp 837–840

  6. Chu K-Y, Kuo Y-H, Hsu WH (2013) Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM international conference on multimedia, MM ’13, New York, NY, USA. Association for computing machinery, pp 597–600

  7. Çiftçi S, Akyüz A O, Ebrahimi T (2018) A reliable and reversible image privacy protection based on false colors. IEEE Trans Multimed 20(1):68–81

    Article  Google Scholar 

  8. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR 2005), 20–26 June 2005, San Diego, CA, USA, pp 886–893

  9. Ergun OO (2014) Privacy preserving face recognition in encrypted domain. In: 2014 IEEE Asia pacific conference on circuits and systems (APCCAS). IEEE, pp 643–646

  10. Fanti GC, Finiasz M, Ramchandran K (2013) One-way private media search on public databases: the role of signal processing. IEEE Signal Process Mag 30(2):53–61

    Article  Google Scholar 

  11. Geng Z, Kui G, Xin J (2015) A moving object detection method of surveillance video based on privacy protection in the cloud. Journal of Beijing Electronic Science & Technology Institute (4), 55–60

  12. Jain V, Learned-Miller E (2010) Fddb: a benchmark for face detection in unconstrained settings. Technical Report UM-CS-2010-009, University of Massachusetts Amherst

  13. Jin X, Guo K, Song C, Li X, et al (2016) Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Multimedia modeling - 22nd international conference, MMM 2016, Miami, FL, USA, January 4–6, 2016, Proceedings, Part I, pp 562–573

  14. Jin X, Yuan P, Li X, Song C, Ge S, Zhao G, Chen Y (2017) Efficient privacy preserving viola-jones type object detection via random base image representation. In: 2017 IEEE international conference on multimedia and expo, ICME 2017, Hong Kong, China, July 10–14, 2017, pp 673–678

  15. Ore Ø (1988) Number theory and its history. Dover Pubns, pp 129–131. ISBN: 9780486656205

  16. Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) Scifi - a system for secure face identification. In: 31St IEEE symposium on security and privacy, s&p 2010, 16–19 May 2010, Berleley/Oakland, California, USA, pp 239–254

  17. Rabin T, Ben-Or M (1989) Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the twenty-first annual ACM symposium on theory of computing. ACM, pp 73–85

  18. Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  Google Scholar 

  19. Shashank J, Kowshik P, Srinathan K, Jawahar CV (2008) Private content based image retrieval. In: 2008 IEEE computer society conference on computer vision and pattern recognition (CVPR 2008), 24–26 June 2008, Anchorage, Alaska, USA

  20. Sohn H, Plataniotis KN, Ro YM (2010) Privacy-preserving watch list screening in video surveillance system. In: Advances in multimedia information processing - PCM 2010 - 11th pacific rim conference on multimedia, Shanghai, China, September 21–24, 2010, proceedings, Part I, pp 622–632

  21. Spacek L (2007) Collection of facial images: faces96. http://cswww.essex.ac.uk/mv/allfaces/faces96.html

  22. Thomaz CE, Giraldi GA (2010) A new ranking method for principal components analysis and its application to face image analysis. Image Vision Comput 28(6):902–913

    Article  Google Scholar 

  23. Upmanyu M, Namboodiri AM, Srinathan K, Jawahar CV (2009) Efficient privacy preserving video surveillance. In: IEEE 12th international conference on computer vision, ICCV, Kyoto, Japan, September 27–October 4, pp 1639–1646

  24. Viola PA, Jones MJ (2001) Robust real-time face detection. In: IEEE 8th international conference on computer vision ICCV 2011, Vancouver, British Columbia, Canada, July 7–14, 2001, p 747

  25. Viola PA, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154

    Article  Google Scholar 

  26. Wang Q, Gao L, Wang H, Wei X (2019) Face detection for privacy protected images. IEEE Access 7:3918–3927

    Article  Google Scholar 

Download references

Acknowledgments

Parts of the results and figures presented in this paper have previously appeared in our previous work [14]. We add more technical details and experimental results in this version. This work is partially supported by the National Natural Science Foundation of China (grant numbers 62072014), the Beijing Natural Science Foundation (grant number L192040), the Open Research Fund of Beijing Key Laboratory of Big Data Technology for Food Safety (grant number BTBD- 2018KF-07), Beijing Technology and Business University, the Open Project Program of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (grant number VRLAB2019C03), and the Fundamental Research Funds for the Central Universities (grant number. 328201906).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaodong Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, X., Zhang, H., Li, X. et al. Random base image representation for efficient blind vision. Multimed Tools Appl 80, 7711–7726 (2021). https://doi.org/10.1007/s11042-020-10124-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10124-z

Keywords