A Practical System for Privacy-Preserving Video Surveillance

被引:5
作者
Bentafat, Elmahdi [1 ]
Rathore, M. Mazhar [1 ]
Bakiras, Spiridon [1 ]
机构
[1] Hamad Bin Khalifa Univ, Div Informat & Comp Technol, Coll Sci & Engn, Doha, Qatar
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II | 2020年 / 12147卷
关键词
Video surveillance; Biometric privacy; Homomorphic encryption; FACE RECOGNITION; SECURE;
D O I
10.1007/978-3-030-57878-7_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Video surveillance on a massive scale can be a vital tool for law enforcement agencies. To mitigate the serious privacy concerns of wide-scale video surveillance, researchers have designed secure and privacy-preserving protocols that obliviously match live feeds against a suspects' database. However, existing approaches provide stringent privacy guarantees and, as a result, they do not scale well for ubiquitous deployment. To this end, we introduce a system that relaxes the underlying privacy requirements by giving away some information when a face is compared against the law enforcement's database. Specifically, our protocol reveals a random permutation of obfuscated similarity scores, where each obfuscated score discloses minimal information about the actual similarity score. We show that, despite the relaxed security definitions, our system protects the privacy of the underlying faces, while offering significant improvements in terms of performance. In particular, our protocol necessitates a single round of communication between the camera and the server and, for a database of 100 suspects, the online computation time at the camera and the server is 155 ms and 34 ms, respectively, while the online communication cost is only 12 KB.
引用
收藏
页码:21 / 39
页数:19
相关论文
共 29 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
Amos B, 2016, CMU Sch. Comput. Sci., V16, P1
[3]  
[Anonymous], 2011, P NETW DISTR SYST SE
[4]   OpenFace 2.0: Facial Behavior Analysis Toolkit [J].
Baltrusaitis, Tadas ;
Zadeh, Amir ;
Lim, Yao Chong ;
Morency, Louis-Philippe .
PROCEEDINGS 2018 13TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE & GESTURE RECOGNITION (FG 2018), 2018, :59-66
[5]  
Barker E., 2012, NIST Special Publication (SP) 800-38G, V800, P1, DOI DOI 10.6028/NIST.SP.800-57PT1R4
[6]  
Bringer Julien, 2014, P 2 ACM WORKSH INF H, P187, DOI DOI 10.1145/2600918.2600922
[7]  
Dagher I., 2010, Proceedings of the 2010 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA 2010), P97, DOI 10.1109/CIMSA.2010.5611752
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]  
Er MJ, 2002, IEEE T NEURAL NETWOR, V13, P697, DOI 10.1109/TNN.2002.1000134
[10]  
Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14