SecSIFT: Secure Image SIFT Feature Extraction in Cloud Computing

被引:9
作者
Qin, Zhan [1 ]
Yan, Jingbo [1 ]
Ren, Kui [1 ]
Chen, Chang Wen [1 ]
Wang, Cong [2 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, 338 Davis Hall, Buffalo, NY 14260 USA
[2] City Univ Hong Kong, Dept Comp Sci, 83 Tat Chee Ave, Kowloon, Hong Kong, Peoples R China
基金
美国国家科学基金会;
关键词
Image feature detection; SIFT; privacy-preserving; cloud computing;
D O I
10.1145/2978574
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The image and multimedia data produced by individuals and enterprises is increasing every day. Motivated by the advances in cloud computing, there is a growing need to outsource such computational intensive image feature detection tasks to cloud for its economic computing resources and on-demand ubiquitous access. However, the concerns over the effective protection of private image and multimedia data when outsourcing it to cloud platform become the major barrier that impedes the further implementation of cloud computing techniques over massive amount of image and multimedia data. To address this fundamental challenge, we study the state-of-the-art image feature detection algorithms and focus on Scalar Invariant Feature Transform (SIFT), which is one of the most important local feature detection algorithms and has been broadly employed in different areas, including object recognition, image matching, robotic mapping, and so on. We analyze and model the privacy requirements in outsourcing SIFT computation and propose Secure Scalar Invariant Feature Transform (SecSIFT), a high-performance privacy-preserving SIFT feature detection system. In contrast to previous works, the proposed design is not restricted by the efficiency limitations of current homomorphic encryption scheme. In our design, we decompose and distribute the computation procedures of the original SIFT algorithm to a set of independent, co-operative cloud servers and keep the outsourced computation procedures as simple as possible to avoid utilizing a computationally expensive homomorphic encryption scheme. The proposed SecSIFT enables implementation with practical computation and communication complexity. Extensive experimental results demonstrate that SecSIFT performs comparably to original SIFT on image benchmarks while capable of preserving the privacy in an efficient way.
引用
收藏
页数:24
相关论文
共 40 条
[1]  
Agrawal R., 2004, P ACM SIGMOD INT C M, P563
[2]  
[Anonymous], 2008, 2008 IEEE C COMPUTER, DOI DOI 10.1109/CVPR.2008.4587388
[3]  
[Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3
[4]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[5]   Privacy-Preserving ECG Classification With Branching Programs and Neural Networks [J].
Barni, Mauro ;
Failla, Picrluigi ;
Lazzeretti, Riccardo ;
Sadeghi, Ahmad-Reza ;
Schneider, Thomas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :452-468
[6]  
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[7]   Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals [J].
Bianchi, Tiziano ;
Piva, Alessandro ;
Barni, Mauro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :180-187
[8]  
Boldyreva A, 2011, LECT NOTES COMPUT SC, V6841, P578, DOI 10.1007/978-3-642-22792-9_33
[9]  
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[10]   Privacy-Preserving Biometric Identification Using Secure Multiparty Computation [J].
Bringer, Julien ;
Chabanne, Herve ;
Patey, Alain .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :42-52