Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance

被引:12
作者
Sun, Xin [1 ,2 ]
Tian, Chengliang [1 ,2 ]
Hu, Changhui [3 ]
Tian, Weizhong [4 ]
Zhang, Hanlin [1 ]
Yu, Jia [1 ,2 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[3] Hainan Univ, Sch Cyberspace Secur, Sch Cryptol, Haikou 570228, Peoples R China
[4] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Guangdong, Peoples R China
关键词
Computation outsourcing; Face recognition; Privacy-preserving; Sparse representation classification; l(1) -Minimization; EIGENFACES; ALGORITHM; SECURITY;
D O I
10.1016/j.cose.2022.102740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the current cloud computing era, outsourcing overloaded computations to cloud servers has become an increasingly popular computing paradigm. Meanwhile, face recognition (FR), as a typical and extensively deployed biometric authentication technique in the real world, always involves time-consuming large-scale matrix operations or complex optimization problems. Therefore, it is a naturally actual demand to study the cloud/edge server-assisted FR algorithm. Nevertheless, the sensitivity of the FR data and the incredibility of the cloud/edge server make this intriguing computing paradigm suffer from many security challenges. In this paper, we focus on the popular SRC-based FR and, for the first time, present a high-efficiency and secure outsourcing design for this algorithm. The key technique ingredient that emerged in our design is a new norm-preserving matrix transformation which is utilized to outsource the heavy l(1)-minimization problem in SRC-based FR. This novel technique makes our design well protect the critical privacy information in SRC-based FR and discern the dishonest server with an optimal probability of 1. Simultaneously, compared with existing linear programming outsourcing algorithms, our design is tailored for SRC-based FR and enables the client to gain considerable computational savings without significantly increasing the cloud/edge server's computational load. Also, we corroborate our theoretical claims by conducting extensive experiments on the publicly available database.(C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 64 条
[11]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[12]  
Choi K., 2008, Proc. IEEE Conference on Automatic Face and Gesture Recognition, P1
[13]   Solving Linear Programs in the Current Matrix Multiplication Time [J].
Cohen, Michael B. ;
Lee, Yin Tat ;
Song, Zhao .
JOURNAL OF THE ACM, 2021, 68 (01)
[14]  
Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
[15]   Compressive Binary Patterns: Designing a Robust Binary Face Descriptor with Random-Field Eigenfilters [J].
Deng, Weihong ;
Hu, Jiani ;
Guo, Jun .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2019, 41 (03) :758-767
[16]   Face Recognition via Collaborative Representation: Its Discriminant Nature and Superposed Representation [J].
Deng, Weihong ;
Hu, Jiani ;
Guo, Jun .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2018, 40 (10) :2513-2521
[17]  
Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14
[18]  
Gennaro R, 2010, LECT NOTES COMPUT SC, V6223, P465, DOI 10.1007/978-3-642-14623-7_25
[19]   Face recognition using Laplacianfaces [J].
He, XF ;
Yan, SC ;
Hu, YX ;
Niyogi, P ;
Zhang, HJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2005, 27 (03) :328-340
[20]  
Hong Y, 2011, LECT NOTES COMPUT SC, V6818, P170, DOI 10.1007/978-3-642-22348-8_14