Skip to main content
Log in

Privacy Enhanced Cloud-Based Facial Recognition

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

Homomorphic encryption is a significant method to protect user privacy in cloud computing environment. Due to the computation efficiency issue, there is still not many homomorphic encryption applications for common users. In this paper,we try to use homomorphic encryption to enhance the privacy in cloud-based face recognition system. By balancing the workload between client and server,and reimplementing the similarity measurement function, our homomorphic encryption version’s performance is almost the same as the original version in terms of accuracy and time consumption. Our work is especially beneficial to many face recognition methods that are using Euclidian distance as their similarity metric.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Barni M, Orlandi C, Piva A (2006) A privacy-preserving protocol for neural-network-based computation. In: Proceedings of the 8th workshop on Multimedia and security, pp 146–151

  2. Bos JW, Lauter K, Loftus J, Naehrig M (2013) Improved security for a ring-based fully homomorphic encryption scheme. IMA international conference on cryptography and coding. Springer, Berlin, pp 45–64

    Chapter  Google Scholar 

  3. Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical gapsvp. Annual cryptology conference. Springer, Berlin, pp 868–886

    Google Scholar 

  4. Brakerski Z, Gentry C, Vaikuntanathan V (2014) (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):1–36

    Article  MathSciNet  Google Scholar 

  5. Cao Q, Shen L, Xie W, Parkhi OM, Zisserman A (2018) Vggface2: A dataset for recognising faces across pose and age. In: 2018 13th IEEE international conference on automatic face and gesture recognition (FG 2018), pp 67–74. IEEE

  6. Cheon JH, Kim A, Kim M, Song Y (2017) Homomorphic encryption for arithmetic of approximate numbers. International conference on the theory and application of cryptology and information security. Springer, Berlin, pp 409–437

    Google Scholar 

  7. Dadi HS, Pillutla GM (2016) Improved face recognition rate using hog features and svm classifier. IOSR J Electr Commun Eng 11(4):34–44

    Article  Google Scholar 

  8. dlib c++ library. http://dlib.net (2020)

  9. Failla P, Barni M, Catalano D, Raimondo MD, Bianchi T (2010) A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In: IEEE international conference on biometrics: theory applications systems

  10. Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. IACR Cryptol ePrint Arch 2012:144

    Google Scholar 

  11. Faruqe MO, Hasan MAM (2009) Face recognition using pca and svm. In: 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, pp 97–101. IEEE

  12. Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp 169–178

  13. Halevi S, Shoup V (2014) Helib-an implementation of homomorphic encryption. Cryptology ePrint Archive, Report 2014/039

  14. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778

  15. Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Tech. Rep. 07-49, University of Massachusetts, Amherst

  16. Kotropoulos C, Tefas A, Pitas I (2000) Frontal face authentication using morphological elastic graph matching. IEEE Trans Image Process 9(4):555–560

    Article  Google Scholar 

  17. Lades M, Vorbruggen JC, Buhmann J, Lange J, Von Der Malsburg C, Wurtz RP, Konen W (1993) Distortion invariant object recognition in the dynamic link architecture. IEEE Trans Comput 42(3):300–311

    Article  Google Scholar 

  18. López-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the forty-fourth annual ACM symposium on Theory of computing, pp 1219–1234

  19. Morampudi MK, Prasad MVNK, Raju USN (2020) Privacy-preserving iris authentication using fully homomorphic encryption. Multim Tools Appl 79(2)

  20. Parkhi OM, Vedaldi A, Zisserman A (2020) Deep face recognition

  21. Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. Proceedings of the IEEE conference on computer vision and pattern recognition, pp 815–823

  22. Microsoft SEAL, (release 3.5). https://github.com/Microsoft/SEAL (2020) Microsoft Research. Redmond, WA

  23. Stehlé D, Steinfeld R (2011) Making ntru as secure as worst-case problems over ideal lattices. Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 27–47

    Google Scholar 

  24. Sun Y, Liang D, Wang X, Tang X (2015) Deepid3: Face recognition with very deep neural networks. arXiv preprint arXiv:1502.00873

  25. Taigman Y, Yang M, Ranzato M, Wolf L (2014) Deepface: Closing the gap to human-level performance in face verification. Proceedings of the IEEE conference on computer vision and pattern recognition 1701–1708

  26. Titus AJ, Kishore S, Stavish T, Rogers SM, Ni K (2018) Pyseal: A python wrapper implementation of the seal homomorphic encryption library. arXiv preprint arXiv:1803.01891

  27. Van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. Annual international conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 24–43

    MATH  Google Scholar 

  28. Yao AC (1982) Protocols for secure computations. In: 23rd annual symposium on foundations of computer science (sfcs 1982), pp 160–164. IEEE

Download references

Acknowledgements

The research is supported by National Key Research and Development Plan (2018YFB1404102),National Nature Science Foundation of China(U1609215),and Nature Science Foundation of Zhejiang Province(LQ20F020008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Sun.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, T., Zhang, Y., Sun, J. et al. Privacy Enhanced Cloud-Based Facial Recognition. Neural Process Lett 54, 2717–2725 (2022). https://doi.org/10.1007/s11063-021-10477-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-021-10477-y

Keywords

Navigation