Skip to main content
Log in

Double-Blinded Finder: a two-side secure children face recognition system

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

When taking photos of a suspicious missing child in the street and posting them to the social network is becoming a feasible way to find missing children, the exposure of photos may cause privacy issues. To address this problem, we propose Double-Blinded Finder, an efficient and double-blinded system for finding missing children via low-dimensional multi-attribute representation of child face and blind face matching. To obtain enough knowledge for representing child faces, we build the Labeled Child Face in the Wild dataset, which contains 60K Internet images with 6K unique identities. Based on this dataset, we further train a multi-task deep face model to describe a child face as a 128d fixed-point feature vector and extensive gender and age attributes. Using the keys generated from face descriptors, the face photos from the social network and face representation from the parent(s) of missing children are both encrypted. In addition, we devise inner-production encryption to run blind face matching in the public cloud. In this manner, Double-Blinded Finder can provide efficient face matching while protecting the privacies of both sides: (1) the suspicious missing children side for avoiding the invasion of the human rights, and (2) the true missing children side for preserving the secondary victimization. The experiments show that our system can achieve practical performance of child face matching with negligible leakage of privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. http://cmusatyalab.github.io/openface/.

References

  1. Amos, B., Bartosz, L., & Satyanarayanan, M. (2016). Openface: A general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science.

  2. Avidan, S., & Butman, M. (2006). Efficient methods for privacy preserving face detection. In NIPS (pp. 57–64).

  3. Bost, R., Popa, R. A., Tu, S., & Goldwasser, S. (2015). Machine learning classification over encrypted data. In NDSS.

  4. Daemen, J., & Rijmen, V. (2002). The design of Rijndael. New York: Springer.

    Book  Google Scholar 

  5. Hu, P., & Ramanan, D. (2017). Finding tiny faces. In IEEE CVPR (pp. 1522–1530).

  6. Jiang, Q., Zeng, W., Ou, W., & Xu, R. (2016). A scrambling and encryption algorithm for selective block of identification photo. In 2016 8th International conference on wireless communications and signal processing (WCSP) (pp. 1–5). IEEE.

  7. Jin, X., Ge, S., Song, C., Li, X., Lei, J., Wu, C., & Yu, H. (2019). Double-blinded finder: A two-side privacy-preserving approach for finding missing children. In EAI International conference on robotic sensor networks (ROSENET), Kitakyushu, Japan, 17 August.

  8. Jin, X., Li, Y., Ge, S., Song, C., Wu, L., & Zhou, X. (2019). Secure face retrieval for group mobile users. Soft Computing. https://doi.org/10.1007/s00500-019-03834-6.

  9. Jin, X., Liu, Y., Li, X., Zhao, G., Chen, Y., & Guo, K. (2015). Privacy preserving face identification in the cloud through sparse representation. In Proceedings of biometric recognition: 10th Chinese conference, CCBR 2015, Tianjin, China, November 13–15, 2015 (pp. 160–167). https://doi.org/10.1007/978-3-319-25417-3_20.

  10. Jin, X., Yin, S., Liu, N., Li, X., Zhao, G., & Ge, S. (2018). Color image encryption in non-rgb color spaces. Multimedia Tools and Applications, 77(12), 15851–15873. https://doi.org/10.1007/s11042-017-5159-y.

    Article  Google Scholar 

  11. Jin, X., Yuan, P., Li, X., Song, C., Ge, S., Zhao, G., & Chen, Y. (2017). Efficient privacy preserving viola-jones type object detection via random base image representation. In 2017 IEEE international conference on multimedia and expo, ICME 2017, Hong Kong, China, July 10–14, 2017 (pp. 673–678). https://doi.org/10.1109/ICME.2017.8019497.

  12. Katz, J., Sahai, A., & Waters, B. (2008). Predicate encryption supporting disjunctions, polynomial equations and inner products. In EUROCRYPT (Vol. 17, pp. 146–162).

  13. Krizhevsky, A., Sutskever, I., & Hinton, G. (2012). Imagenet classification with deep convolutional neural networks. In NIPS (pp. 453–464).

  14. Lu, H., Liu, G., Li, Y., Kim, H., & Serikawa, S. (2019). Cognitive internet of vehicles for automatic driving. IEEE Network, 33, 12–20.

    Article  Google Scholar 

  15. Lu, H., Wang, D., Li, Y., Li, J., Li, X., Kim, H., Serikawa, S., & Humar, I. (2019). Conet: A cognitive ocean network. arXiv preprint arXiv:1901.06253.

  16. Miller, E. L., Huang, G. B., & RoyChowdhury, A. (2016). Labeled faces in the wild: A survey. In M. Kawulok, E. Celebi, & B. Smolka (Eds.), Advances in face detection and facial image analysis (pp. 189–248). New York: Springer.

    Google Scholar 

  17. Okamoto, T., & Takashima, K. (2016). Adaptively attribute-hiding (hierarchical) inner product encryption. IEICE Transactions on Fundamentals of Electronics, Communications and Computer, E99–A(1), 92–117.

    MATH  Google Scholar 

  18. Osadchy, M., Pinkas, B., Jarrous, A., & Moskovich, B. (2010). Scifi: A system for secure face identification. In IEEE S & P (Vol. 16, pp. 239–254).

  19. Ou, W., Luan, X., Gou, J., Zhou, Q., Xiao, W., Xiong, X., et al. (2018). Robust discriminative nonnegative dictionary learning for occluded face recognition. Pattern Recognition Letters, 107, 41–49.

    Article  Google Scholar 

  20. Ou, W., You, X., Tao, D., Zhang, P., Tang, Y., & Zhu, Z. (2014). Robust face recognition via occlusion dictionary learning. Pattern Recognition, 47(4), 1559–1572.

    Article  Google Scholar 

  21. Sahai, A., & Waters, B. (2008). Functional encryption: Beyond public key cryptography. Technical report, INS.

  22. Sakai, Y., Lu, H., Tan, J. K., & Kim, H. (2019). Recognition of surrounding environment from electric wheelchair videos based on modified yolov2. Future Generation Computer Systems, 92, 157–161.

    Article  Google Scholar 

  23. Schroff, F., Kalenichenko, D., & Philbin, J. (2015). Facenet: A unified embedding for face recognition and clustering. In IEEE CVPR (pp. 815–823).

  24. Sohn, H., Plataniotis, K. N., & Ro, Y. M. (2010). Privacy-preserving watch list screening in video surveillance system. In PCM (pp. 622–632).

  25. Xu, X., Lu, H., Song, J., Yang, Y., Shen, H. T., & Li, X. (2019). Ternary adversarial networks with self-supervision for zero-shot cross-modal retrieval. IEEE Transactions on Cybernetics. https://doi.org/10.1109/TCYB.2019.2928180.

    Article  Google Scholar 

  26. Zhang, P., You, X., Ou, W., Chen, C. P., & Cheung, Y. (2016). Sparse discriminative multi-manifold embedding for one-sample face identification. Pattern Recognition, 52, 249–259.

    Article  Google Scholar 

Download references

Acknowledgements

We thank the editors and reviewers. Parts of the results presented in this paper have previously appeared in our previous work [7]. This paper is the extension of the conference short version [7]. This work is partially supported by the National Natural Science Foundation of China (Grant Nos. 61772047, 61772513), the Open Project Program of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (No. VRLAB2019C03), Big Data Application on lmproving Government Governance Capabilities National Engineering Laboratory Open Fund Project (Grant No. W-2018022), and the Fundamental Research Funds for the Central Universities (Grant Nos. 328201906).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiming Ge.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, X., Lei, J., Ge, S. et al. Double-Blinded Finder: a two-side secure children face recognition system. Wireless Netw 28, 927–936 (2022). https://doi.org/10.1007/s11276-019-02199-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-019-02199-w

Keywords

Navigation