Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles

被引:22
作者
Bi, Renwan [1 ,2 ]
Xiong, Jinbo [1 ,2 ]
Tian, Youliang [3 ]
Li, Qi [4 ,5 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] Informat Engn Univ, Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[3] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
[5] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Object detection; Cryptography; Protocols; Servers; Privacy; Computational modeling; Image edge detection; Connected autonomous vehicles (CAVs); edge computing; faster R-convolutional neural network (CNN); object detection; privacy protection; FRAMEWORK;
D O I
10.1109/JIOT.2022.3212464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connected autonomous vehicles (CAVs) are capable of capturing high-definition images from onboard sensors, which can be used to facilitate the detection of objects in the vicinity. Such images may, however, contain sensitive information (e.g., human faces and license plates) as well as the indirect location of CAVs. To protect the object privacy of images shared by CAVs, this article proposes a privacy-preserving object detection (P2OD) framework. Specifically, we propose multiple secure computing protocols designed to construct a privacy-preserving Faster $R$ -convolutional neural network (CNN) model to securely extract features and bounding-boxes of objects in an image. By leveraging edge computing (with higher performance computation and lower latency, in comparison to cloud-based solutions), CAVs randomly split the captured images and upload them to two noncollusive edge servers. Both servers will then perform the P2OD framework cooperatively to directly detect objects over random image shares without exposing sensitive information. The theoretical analysis demonstrates the security, correctness, and efficiency of the P2OD framework, and the experimental findings show that the P2OD framework can effectively protect the classification and location privacy of image objects for CAVs. Compared with the original Faster R-CNN model, the classification and regression errors of the P2OD framework can be controlled within 10-12 and 10-14, respectively.
引用
收藏
页码:2314 / 2329
页数:16
相关论文
共 42 条
[11]   Domain Adaptive Faster R-CNN for Object Detection in the Wild [J].
Chen, Yuhua ;
Li, Wen ;
Sakaridis, Christos ;
Dai, Dengxin ;
Van Gool, Luc .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :3339-3348
[12]  
Das N., 2020, PROC FUSION, P1
[13]  
Dave R., 2019, Journal of Computer Sciences and Applications, V7, P31, DOI [DOI 10.12691/JCSA-7-1-5, 10.12691/jcsa-7-1-5]
[14]  
Fan QF, 2016, IEEE INT VEH SYM, P124, DOI 10.1109/IVS.2016.7535375
[15]   Privacy-Preserving Selective Video Surveillance [J].
Fitwi, Alem ;
Chen, Yu .
2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
[16]   Vision meets robotics: The KITTI dataset [J].
Geiger, A. ;
Lenz, P. ;
Stiller, C. ;
Urtasun, R. .
INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH, 2013, 32 (11) :1231-1237
[17]   CoFF: Cooperative Spatial Feature Fusion for 3-D Object Detection on Autonomous Vehicles [J].
Guo, Jingda ;
Carrillo, Dominic ;
Tang, Sihai ;
Chen, Qi ;
Yang, Qing ;
Fu, Song ;
Wang, Xi ;
Wang, Nannan ;
Palacharla, Paparao .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) :11078-11087
[18]   Multi-adversarial Faster-RCNN for Unrestricted Object Detection [J].
He, Zhenwei ;
Zhang, Lei .
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, :6667-6676
[19]   A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing [J].
Huang, Kai ;
Liu, Ximeng ;
Fu, Shaojing ;
Guo, Deke ;
Xu, Ming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1441-1455
[20]  
Juvekar C, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1651