Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance

被引:12
作者
Sun, Xin [1 ,2 ]
Tian, Chengliang [1 ,2 ]
Hu, Changhui [3 ]
Tian, Weizhong [4 ]
Zhang, Hanlin [1 ]
Yu, Jia [1 ,2 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[3] Hainan Univ, Sch Cyberspace Secur, Sch Cryptol, Haikou 570228, Peoples R China
[4] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Guangdong, Peoples R China
关键词
Computation outsourcing; Face recognition; Privacy-preserving; Sparse representation classification; l(1) -Minimization; EIGENFACES; ALGORITHM; SECURITY;
D O I
10.1016/j.cose.2022.102740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the current cloud computing era, outsourcing overloaded computations to cloud servers has become an increasingly popular computing paradigm. Meanwhile, face recognition (FR), as a typical and extensively deployed biometric authentication technique in the real world, always involves time-consuming large-scale matrix operations or complex optimization problems. Therefore, it is a naturally actual demand to study the cloud/edge server-assisted FR algorithm. Nevertheless, the sensitivity of the FR data and the incredibility of the cloud/edge server make this intriguing computing paradigm suffer from many security challenges. In this paper, we focus on the popular SRC-based FR and, for the first time, present a high-efficiency and secure outsourcing design for this algorithm. The key technique ingredient that emerged in our design is a new norm-preserving matrix transformation which is utilized to outsource the heavy l(1)-minimization problem in SRC-based FR. This novel technique makes our design well protect the critical privacy information in SRC-based FR and discern the dishonest server with an optimal probability of 1. Simultaneously, compared with existing linear programming outsourcing algorithms, our design is tailored for SRC-based FR and enables the client to gain considerable computational savings without significantly increasing the cloud/edge server's computational load. Also, we corroborate our theoretical claims by conducting extensive experiments on the publicly available database.(C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 64 条
[1]  
[Anonymous], 1998, TECH REP
[2]  
[Anonymous], 1998, Theory of Linear and Integer Programming
[3]   Evaluating Open-Universe Face Identification on the Web [J].
Becker, Brian C. ;
Ortiz, Enrique G. .
2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2013, :904-911
[4]   Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection [J].
Belhumeur, PN ;
Hespanha, JP ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :711-720
[5]  
Bernstein D., 2007, IEEE Trans. Autom. Control, V52, P1539, DOI DOI 10.1109/TAC.2007.902261
[6]  
Bna M., 2012, Combinatorics of Permutations, V2
[7]   Face recognition technology: Security versus privacy [J].
Bowyer, KW .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2004, 23 (01) :9-20
[8]   Face Recognition with Learning-based Descriptor [J].
Cao, Zhimin ;
Yin, Qi ;
Tang, Xiaoou ;
Sun, Jian .
2010 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2010, :2707-2714
[9]   PCANet: A Simple Deep Learning Baseline for Image Classification? [J].
Chan, Tsung-Han ;
Jia, Kui ;
Gao, Shenghua ;
Lu, Jiwen ;
Zeng, Zinan ;
Ma, Yi .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (12) :5017-5032
[10]   Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud [J].
Chen, Fei ;
Xiang, Tao ;
Yang, Yuanyuan .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) :2141-2151