Skip to main content
Log in

Encrypted image classification based on multilayer extreme learning machine

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Nowadays, numerous corporations (such as Google, Baidu, etc.) require an efficient and effective search algorithm to crawl out the images with queried objects from databases. Moreover, privacy protection is a significant issue such that confidential images must be encrypted in corporations. Nevertheless, decrypting and then classifying millions of encrypted images becomes a heavy burden to computation. In this paper, we proposed an encrypted image classification framework based on multi-layer extreme learning machine that is able to directly classify encrypted images without decryption. Experiments were conducted on popular handwritten digits and letters databases. Results demonstrate that the proposed framework is secure, efficient and accurate for classifying encrypted images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. http://yann.lecun.com/exdb/mnist.

  2. http://www.nist.gov/srd/nistsd19.cfm.

References

  • Bardossy, A., & Duckstein, L. (1995). Fuzzy rule-based modeling with applications to geophysical, biological, and engineering systems (Vol. 8). Boca Raton: CRC press.

    MATH  Google Scholar 

  • Bengio, Y. (2009). Learning deep architectures for AI. Foundations and Trends in Machine Learning, 2(1), 1–127.

    Article  MathSciNet  MATH  Google Scholar 

  • Bost, R., Popa, R.A., Tu, S., & Goldwasser, S. (2014). Machine learning classification over encrypted data. Crypto ePrint Archive.

  • Cao, J., Huang, W., Zhao, T., Wang, J., & Wang, R. (2015). An enhance excavation equipments classification algorithm based on acoustic spectrum dynamic feature. Multidimensional Systems and Signal Processing. doi:10.1007/s11045-015-0374-z.

  • Daemen, J., & Rijmen, V. (1999). AES Proposal: Rijndael. A Report, NIST, the Computer Security Resource Center (CSRC). http://www.science.upm.ro/~apetrescu/OLD/public_html/Tehnologia%20Informatiei/Securitatea%20informatiei/Laborator/AES/rijndael%20doc%20V2.pdf. Accessed 31 Mar 2016.

  • Friedman, N., Geiger, D., & Goldszmidt, M. (1997). Bayesian network classifiers. Machine Learning, 29(2–3), 131–163.

    Article  MATH  Google Scholar 

  • Graepel, T., Lauter, K., & Naehrig, M. (2013). Ml confidential: Machine learning on encrypted data. In: Information security and cryptology CICISC 2012, Lecture notes in computer science (Vol. 7839, pp. 1–21). Berlin: Springer.

  • Huang, G. B., Zhu, Q. Y., & Siew, C. K. (2006). Extreme learning machine: Theory and applications. Neurocomputing, 70(1), 489–501.

    Article  Google Scholar 

  • Huang, G. B., Zhou, H., Ding, X., & Zhang, R. (2012). Extreme learning machine for regression and multiclass classification. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 42(2), 513–529.

    Article  Google Scholar 

  • Ishibuchi, H., Nakashima, T., & Morisawa, T. (1999). Voting in fuzzy rule-based systems for pattern classification problems. Fuzzy Sets and Systems, 103(2), 223–238.

    Article  Google Scholar 

  • Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. Boca Raton: CRC Press.

    MATH  Google Scholar 

  • LeCun, Y., Huang, F.J., & Bottou, L. (2004). Learning methods for generic object recognition with invariance to pose and lighting. In: Proceedings of the 2004 IEEE computer society conference on computer vision and pattern recognition(CVPR) (vol 2, pp. II-97–104), IEEE.

  • Liou, C. Y., Cheng, W. C., Liou, J. W., & Liou, D. R. (2014). Autoencoder for words. Neurocomputing, 139, 84–96.

    Article  Google Scholar 

  • Liu, J., Jin, X., Dong, F., He, L., & Liu, H. (2016a). Fading channel modelling using single-hidden layer feedforward neural networks. Multidimensional Systems and Signal Processing. doi:10.1007/s11045-015-0380-1.

  • Liu, S., Feng, L., Liu, Y., Wu, J., Sun, M., & Wang, W. (2016b). Robust discriminative extreme learning machine for relevance feedback in image retrieval. Multidimensional Systems and Signal Processing. doi:10.1007/s11045-016-0386-3.

  • Ng, A. (2011). Sparse autoencoder. CS294A Lecture Notes, 72, 1–19. http://web.stanford.edu/class/cs294a/sparseAutoencoder.pdf. Accessed 31 Mar 2016.

  • NIST-FIPS. (1977). Fips pub 46 (appendix a): Data encryption standard. Federal Information Processing Standards Publication.

  • NIST-FIPS. (2001). Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication, 197, 1C51.

  • Olshausen, B. A., et al. (1996). Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature, 381(6583), 607–609.

    Article  Google Scholar 

  • Schmidhuber, J. (2015). Deep learning in neural networks: An overview. Neural Networks, 61, 85–117.

    Article  Google Scholar 

  • Suykens, J., & Vandewalle, J. (1999). Least squares support vector machine classifiers. Neural Processing Letters, 9(3), 293–300.

    Article  MATH  Google Scholar 

  • Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., & Manzagol, P. A. (2010). Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. The Journal of Machine Learning Research, 11, 3371–3408.

    MathSciNet  MATH  Google Scholar 

  • Zaki, M., Ghalwash, A., & Elkouny, A. (1996). CNN: A speaker recognition system using a cascaded neural network. International Journal of Neural Systems, 7(02), 203–212.

    Article  MATH  Google Scholar 

  • Zhao, H., Wei, W., Cai, J., Lei, F., & Luo, J. (2015). Distributed compressed sensing for multi-sourced fusion and secure signal processing in private cloud. Multidimensional Systems and Signal Processing. doi:10.1007/s11045-015-0371-2.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Man Vong.

Additional information

This research work is supported by the University of Macau Research Grant, Grant Numbers MYRG2014-00083-FST, MYRG2014-00178-FST, and Fundo para o Desenvolvimento das Ciencias e da Tecnologia, Grant Number FDCT/050/2015/A.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, W., Vong, CM., Yang, Y. et al. Encrypted image classification based on multilayer extreme learning machine. Multidim Syst Sign Process 28, 851–865 (2017). https://doi.org/10.1007/s11045-016-0408-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-016-0408-1

Keywords

Navigation