Skip to main content

Privacy Preserving Face Identification in the Cloud through Sparse Representation

  • Conference paper
  • First Online:
Biometric Recognition (CCBR 2015)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 9428))

Included in the following conference series:

Abstract

Nowadays, with tremendous visual media stored and even processed in the cloud, the privacy of visual media is also exposed to the cloud. In this paper we propose a private face identification method based on sparse representation. The identification is done in a secure way which protects both the privacy of the subjects and the confidentiality of the database. The face identification server in the cloud contains a list of registered faces. The surveillance client captures a face image and require the server to identify if the client face matches one of the suspects, but otherwise reveals no information to neither of the two parties. This is the first work that introduces sparse representation to the secure protocol of private face identification, which reduces the dimension of the face representation vector and avoid the patch based attack of a previous work. Besides, we introduce a secure Euclidean distance algorithm for the secure protocol. The experimental results reveal that the cloud server can return the identification results to the surveillance client without knowing anything about the client face image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Osadchy, M., Pinkas, B., Jarrous, A., et al.: SCiFI - a system for secure face identification. In: IEEE Symposium on Security and Privacy (S&P), pp. 239–254. IEEE (2010)

    Google Scholar 

  2. Luong, A., Gerbush, M., Waters, B., Grauman, K.: Reconstructing a fragmented face from a cryptographic identification protocol. In: IEEE Workshop on Applications of Computer Vision (WACV), pp. 238–245. IEEE (2013)

    Google Scholar 

  3. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Paillier Cryptosystem. https://en.wikipedia.org/wiki/Paillier_cryptosystem

  5. Oblivious Transfer. https://en.wikipedia.org/wiki/Oblivious_transfer

  6. Wright, J., Ganesh, A., et al.: Robust Face Recognition via Sparse Representation. IEEE Trans. Pattern. Anal. Mach. Intell. 31(2), 210–227 (2008). IEEE

    Article  Google Scholar 

  7. Collection of Facial Images: Faces94. http://cswww.essex.ac.uk/mv/allfaces/faces94.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Jin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Jin, X., Liu, Y., Li, X., Zhao, G., Chen, Y., Guo, K. (2015). Privacy Preserving Face Identification in the Cloud through Sparse Representation. In: Yang, J., Yang, J., Sun, Z., Shan, S., Zheng, W., Feng, J. (eds) Biometric Recognition. CCBR 2015. Lecture Notes in Computer Science(), vol 9428. Springer, Cham. https://doi.org/10.1007/978-3-319-25417-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25417-3_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25416-6

  • Online ISBN: 978-3-319-25417-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics