Skip to main content

Advertisement

Log in

Privacy-preserving face detection based on linear and nonlinear kernels

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the advance of computer vision, some technologies such as face detection and human detection, have been used widely. However, when processing photos through computer vision technologies, we have to face a privacy-related problem : people do not want their photos to be distributed to others even for taking advantage of computer vision. Since kernel method has been used widely in object classifiers, we proposed a cryptographic algorithm for the kernel method to process encrypted images without decrypting them. So the owner of these images can have them processed by some classifiers belong to other people without leaking the content of these images to these people, and the owner also learns nothing about the classifier. In this paper, we analyze the security, correctness and efficiency of our proposed cryptographic algorithms, then approve the effectiveness of them through some face detection experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. http://www.mathworks.com/matlabcentral/fileexchange/29834-face-detection-using-support-vector-machine-svm

References

  1. Avidan S, Butman M (2006) Blind vision. Comput Vis–ECCV 2006:1–13

    Google Scholar 

  2. Boneh D (1998) The decision diffie-hellman problem. Algor Number Theory:48–63

  3. Chang F-C, Huang H-C, Hang H-M (2007) Layered access control schemes on watermarked scalable media. J VLSI Signal Process Syst Signal Image Vid Technol 49(3):443–455

    Article  Google Scholar 

  4. Chen K, Liu L (2005) Privacy preserving data classification with rotation perturbation. In: Fifth IEEE International conference on data mining, pp 4

  5. Cristianini N, Shawe-Taylor J (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press

  6. Danial T, Latif A (2014) Visual cryptography for grayscale images using bit-level decomposition. J Inf Hid Multimed Signal Process 5(1):109–120

    Google Scholar 

  7. Daugman J, et al (1985) Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. Opt Soc Amer J A: Opt Image Sci 2:1160–1169

    Article  Google Scholar 

  8. Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: Privacy enhancing technologies. Springer, pp 235–253

  9. Feng Q, Pan J-S, Yan L (2012) Restricted nearest feature line with ellipse for face recognition. J Inf Hid Multimed Signal Process 3(3):297–305

    Google Scholar 

  10. Goethals B, Laur S, Lipmaa H, Mielikäinen T (2005) On private scalar product computation for privacy-preserving data mining. Inf Secur Cryptol–ICISC 2004:23–25

    Google Scholar 

  11. Guo G, Li S Z, Chan K L (2000) Face recognition by support vector machines. In: Fourth IEEE international conference on automatic face and gesture recognition, 2000. Proceedings. IEEE, pp 196–201

  12. Jesorsky O, Kirchberg KJ, Frischholz RW (2001) Robust face detection using the hausdorff distance. In: International conference on audio-and video-based biometric person authentication. Springer, pp 90–95

  13. Katz J, Lindell Y (2007) Introduction to modern cryptography. CRC Press

  14. Laur S, Lipmaa H, Mielikäinen T (2006) Cryptographically private support vector machines. In: Inproceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 618–624

  15. Lin K, Chen M (2010) Privacy-preserving outsourcing support vector machines with random transformation. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 363–372

  16. Lin K, Chen M (2011) On the design and analysis of the privacy-preserving svm classifier. IEEE Trans Knowl Data Eng 23(11):1704–1717

    Article  Google Scholar 

  17. Mangasarian O, Wild E (2007) Privacy-preserving classification of horizontally partitioned data via random kernels. In: Proceedings of the 2008 international conference on data mining, DMIN08, vol 2, pp 473–479

  18. Osuna E, Freund R, Girosi F (1997) Training support vector machines: an application to face detection. In: 1997 IEEE Computer society conference on computer vision and pattern recognition, 1997. Proceedings. IEEE, pp 130–136

  19. Sadeghi A, Schneider T, Wehrenberg I (2010) Efficient privacy-preserving face recognition. Inf Secur Cryptol–ICISC 2009:229–244

    MathSciNet  Google Scholar 

  20. Shih P, Liu C (2006) Face detection using discriminating feature analysis and support vector machine. Pattern Recogn 39(2):260–276

    Article  Google Scholar 

  21. Smola A, Schölkopf B, Müller K (1998) The connection between regularization operators and support vector kernels. Neural Netw 11(4):637–649

    Article  Google Scholar 

  22. Vaidya J, Yu H, Jiang X (2008) Privacy-preserving svm classification. Knowl Inf Syst 14(2):161–178

    Article  Google Scholar 

  23. Vapnik VN (1998) Statistical learning theory. Wiley

  24. Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition, 2001. CVPR 2001, vol 1. IEEE, pp I–511

  25. Wikipedia, http://en.wikipedia.org/wiki/Google/Street/View/privacy/concerns/

  26. Zhong S (2007) Privacy-preserving algorithms for distributed mining of frequent itemsets. In: Journal of database management (JDM), the international journal of applied decision sciences (IJADS), the international journal of intelligent data analysis (IJIDA), the international journal of intelligent information and database systems (IJIIDS), and t, 2007

Download references

Acknowledgments

LiWang is supported partially by NSFC-61300235. This work was supported partially by NSFC-61425024, NSFC-61402223, the Jiangsu Province Double Innovation Talent Program, and NSFC-61321491.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, L., Shi, J.J., Chen, C. et al. Privacy-preserving face detection based on linear and nonlinear kernels. Multimed Tools Appl 77, 7261–7281 (2018). https://doi.org/10.1007/s11042-017-4632-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4632-y

Keywords

Navigation