Skip to main content
Log in

Efficient blind face recognition in the cloud

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, with the maturity and wide application of face recognition technology, the recognition accuracy, recognition efficiency, and data security have attracted people’s attention. However, when face recognition is performed, face information is completely exposed to the cloud server without any protection measures. Therefore, a series of problems caused by insecure face information is coming. Can we find a way to prevent uncontrolled use of facial information without cloud protection and improve recognition efficiency and accuracy? Given this situation, we have proposed two options. The first requires a third-party library; the second does not require a third-party library. The first scheme is efficient privacy preserving face identification in the cloud through sparse representation, which relies on the third-party face image database, and the first scheme is simply referred to as SRBased. The second scheme is efficient privacy preserving face identification in the cloud based on deep neural network, which does not depend on the third-party face image database, and the second scheme is simply referred to as DNNBased. Both schemes can be divided into two parts: client and cloud server. The client is responsible for acquiring face images, and the server is responsible for recognizing and calculating. Through homomorphic encryption and OT protocol, secure face recognition is realized. In the whole recognition process, the server does not need to decrypt the image data. In the two schemes, the client and the server will not get any information from each other. Even if the third party intercepts the ciphertext in the transmission process, it will not get any information under the premise of private key security. Therefore, the two schemes can achieve the purpose of protecting privacy and security. The experimental results show that the efficiency of the two schemes is greatly improved compared with SCiFI schemes. The second scheme improves recognition accuracy greatly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Harn L, Lin HY (1991) An oblivious transfer protocol and its application for the exchange of secrets[J]

  2. Jin X, Liu Y, Li X, Zhao G et al (2015) Privacy preserving face identification in the cloud through sparse representation. The 10th Chinese conference on biometric recognition (CCBR), Tianjin, China, 13-15 November, pp 160–167

  3. Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools and Applications

  4. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal processing: Image communication

  5. Liao X, Guo S, Yin J, Wang H, Sangaiah AK (2017) New cubic reference table based image steganography. Multimedia Tools and Applications 77(4)

  6. Li X, Han Q, Jin X (2018) A secure and efficient face-recognition scheme in the cloud based on deep neural networks and homomorphic encryption. The 8th international conference on virtual reality and visualization (ICVRV), Qingdao, China, 22-24 October

  7. Luong A, Gerbush M, Waters B, Grauman K (2013) Reconstructing a fragmented face from a cryptographic identification protocol. IEEE Workshop on Applications of Computer Vision (WACV), pp. 238–245. IEEE

  8. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 1–1

  9. Ma Y, Wu L, Gu X et al (2017) A secure face-verification scheme based on homomorphic encryption and deep neural networks[J]. IEEE Access 5:16532–16538

    Article  Google Scholar 

  10. Moosavi-Dezfooli S M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In Proceedings of IEEE conference on computer vision and pattern recognition (CVPR)

  11. Osadchy M, Pinkas B, Jarrous A et al (2010) SCiFI - A system for Secure Face Identification. IEEE Symposium on Security and Privacy (S&P), pp. 239–254, IEEE

  12. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. EUROCRYPT, pp. 223–238. Springer

  13. Runhua S, Hong Z, Jie C et al (2014) A novel oblivious transfer protocol with statistical analysis[J]. Acta Electronica Sinica 42(11):2273–2279

    Google Scholar 

  14. Sun Y, Liang D, Wang X et al (2015) Deep ID3: Face recognition with very deep neural networks[J]. arXiv:1502.00873

  15. Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 2818–2826

  16. Taigman Y, Yang M, Ranzato M et al (2014) DeepFace: Closing the gap to human-level performance in face verification. CVPR 00:1701–1708

    Google Scholar 

  17. Wang H, Wang Y, Zhou Z et al (2018) CosFace: Large margin cosine loss for deep face recognition[J]. arXiv:1801.09414

  18. Wright J et al (2009) Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis & Machine Intelligence, pp 210–227, IEEE

Download references

Acknowledgements

Parts of the results and figures presented in this paper have previously appeared in our previous work [2, 6]. We add more technical details and experimental results in this version. This work is partially supported by the National Natural Science Foundation of China (grant numbers 61772047, 61772513), Big Data Application on lmproving Government Governance Capabilities National Engineering Laboratory Open Fund Project (grant number W-2018022), the Open Research Fund of Beijing Key Laboratory of Big Data Technology for Food Safety (grant number BTBD-2018KF-07), Beijing Technology and Business University, and the Fundamental Research Funds for the Central Universities (grant numbers. 328201903).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaodong Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, X., Han, Q., Li, X. et al. Efficient blind face recognition in the cloud. Multimed Tools Appl 79, 12533–12550 (2020). https://doi.org/10.1007/s11042-019-08280-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08280-y

Keywords

Navigation