Privacy-preserving face recognition with outsourced computation
Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at...
Ausführliche Beschreibung
Autor*in: |
Xiang, Can [verfasserIn] Tang, Chunming [verfasserIn] Cai, Yunlu [verfasserIn] Xu, Qiuxia [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Soft Computing - Springer-Verlag, 2003, 20(2015), 9 vom: 08. Juli, Seite 3735-3744 |
---|---|
Übergeordnetes Werk: |
volume:20 ; year:2015 ; number:9 ; day:08 ; month:07 ; pages:3735-3744 |
Links: |
---|
DOI / URN: |
10.1007/s00500-015-1759-5 |
---|
Katalog-ID: |
SPR006491065 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR006491065 | ||
003 | DE-627 | ||
005 | 20201124002822.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201005s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s00500-015-1759-5 |2 doi | |
035 | |a (DE-627)SPR006491065 | ||
035 | |a (SPR)s00500-015-1759-5-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Xiang, Can |e verfasserin |4 aut | |
245 | 1 | 0 | |a Privacy-preserving face recognition with outsourced computation |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. | ||
650 | 4 | |a Face recognition |7 (dpeaa)DE-He213 | |
650 | 4 | |a Outsourced computation |7 (dpeaa)DE-He213 | |
650 | 4 | |a Privacy-preserving |7 (dpeaa)DE-He213 | |
700 | 1 | |a Tang, Chunming |e verfasserin |4 aut | |
700 | 1 | |a Cai, Yunlu |e verfasserin |4 aut | |
700 | 1 | |a Xu, Qiuxia |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Soft Computing |d Springer-Verlag, 2003 |g 20(2015), 9 vom: 08. Juli, Seite 3735-3744 |w (DE-627)SPR006469531 |7 nnns |
773 | 1 | 8 | |g volume:20 |g year:2015 |g number:9 |g day:08 |g month:07 |g pages:3735-3744 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s00500-015-1759-5 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
951 | |a AR | ||
952 | |d 20 |j 2015 |e 9 |b 08 |c 07 |h 3735-3744 |
author_variant |
c x cx c t ct y c yc q x qx |
---|---|
matchkey_str |
xiangcantangchunmingcaiyunluxuqiuxia:2015----:rvcpeevnfcrcgiinihusu |
hierarchy_sort_str |
2015 |
publishDate |
2015 |
allfields |
10.1007/s00500-015-1759-5 doi (DE-627)SPR006491065 (SPR)s00500-015-1759-5-e DE-627 ger DE-627 rakwb eng Xiang, Can verfasserin aut Privacy-preserving face recognition with outsourced computation 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. Face recognition (dpeaa)DE-He213 Outsourced computation (dpeaa)DE-He213 Privacy-preserving (dpeaa)DE-He213 Tang, Chunming verfasserin aut Cai, Yunlu verfasserin aut Xu, Qiuxia verfasserin aut Enthalten in Soft Computing Springer-Verlag, 2003 20(2015), 9 vom: 08. Juli, Seite 3735-3744 (DE-627)SPR006469531 nnns volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 https://dx.doi.org/10.1007/s00500-015-1759-5 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 20 2015 9 08 07 3735-3744 |
spelling |
10.1007/s00500-015-1759-5 doi (DE-627)SPR006491065 (SPR)s00500-015-1759-5-e DE-627 ger DE-627 rakwb eng Xiang, Can verfasserin aut Privacy-preserving face recognition with outsourced computation 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. Face recognition (dpeaa)DE-He213 Outsourced computation (dpeaa)DE-He213 Privacy-preserving (dpeaa)DE-He213 Tang, Chunming verfasserin aut Cai, Yunlu verfasserin aut Xu, Qiuxia verfasserin aut Enthalten in Soft Computing Springer-Verlag, 2003 20(2015), 9 vom: 08. Juli, Seite 3735-3744 (DE-627)SPR006469531 nnns volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 https://dx.doi.org/10.1007/s00500-015-1759-5 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 20 2015 9 08 07 3735-3744 |
allfields_unstemmed |
10.1007/s00500-015-1759-5 doi (DE-627)SPR006491065 (SPR)s00500-015-1759-5-e DE-627 ger DE-627 rakwb eng Xiang, Can verfasserin aut Privacy-preserving face recognition with outsourced computation 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. Face recognition (dpeaa)DE-He213 Outsourced computation (dpeaa)DE-He213 Privacy-preserving (dpeaa)DE-He213 Tang, Chunming verfasserin aut Cai, Yunlu verfasserin aut Xu, Qiuxia verfasserin aut Enthalten in Soft Computing Springer-Verlag, 2003 20(2015), 9 vom: 08. Juli, Seite 3735-3744 (DE-627)SPR006469531 nnns volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 https://dx.doi.org/10.1007/s00500-015-1759-5 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 20 2015 9 08 07 3735-3744 |
allfieldsGer |
10.1007/s00500-015-1759-5 doi (DE-627)SPR006491065 (SPR)s00500-015-1759-5-e DE-627 ger DE-627 rakwb eng Xiang, Can verfasserin aut Privacy-preserving face recognition with outsourced computation 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. Face recognition (dpeaa)DE-He213 Outsourced computation (dpeaa)DE-He213 Privacy-preserving (dpeaa)DE-He213 Tang, Chunming verfasserin aut Cai, Yunlu verfasserin aut Xu, Qiuxia verfasserin aut Enthalten in Soft Computing Springer-Verlag, 2003 20(2015), 9 vom: 08. Juli, Seite 3735-3744 (DE-627)SPR006469531 nnns volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 https://dx.doi.org/10.1007/s00500-015-1759-5 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 20 2015 9 08 07 3735-3744 |
allfieldsSound |
10.1007/s00500-015-1759-5 doi (DE-627)SPR006491065 (SPR)s00500-015-1759-5-e DE-627 ger DE-627 rakwb eng Xiang, Can verfasserin aut Privacy-preserving face recognition with outsourced computation 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. Face recognition (dpeaa)DE-He213 Outsourced computation (dpeaa)DE-He213 Privacy-preserving (dpeaa)DE-He213 Tang, Chunming verfasserin aut Cai, Yunlu verfasserin aut Xu, Qiuxia verfasserin aut Enthalten in Soft Computing Springer-Verlag, 2003 20(2015), 9 vom: 08. Juli, Seite 3735-3744 (DE-627)SPR006469531 nnns volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 https://dx.doi.org/10.1007/s00500-015-1759-5 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 20 2015 9 08 07 3735-3744 |
language |
English |
source |
Enthalten in Soft Computing 20(2015), 9 vom: 08. Juli, Seite 3735-3744 volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 |
sourceStr |
Enthalten in Soft Computing 20(2015), 9 vom: 08. Juli, Seite 3735-3744 volume:20 year:2015 number:9 day:08 month:07 pages:3735-3744 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Face recognition Outsourced computation Privacy-preserving |
isfreeaccess_bool |
false |
container_title |
Soft Computing |
authorswithroles_txt_mv |
Xiang, Can @@aut@@ Tang, Chunming @@aut@@ Cai, Yunlu @@aut@@ Xu, Qiuxia @@aut@@ |
publishDateDaySort_date |
2015-07-08T00:00:00Z |
hierarchy_top_id |
SPR006469531 |
id |
SPR006491065 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR006491065</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124002822.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00500-015-1759-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR006491065</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s00500-015-1759-5-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Xiang, Can</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy-preserving face recognition with outsourced computation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Face recognition</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Outsourced computation</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy-preserving</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tang, Chunming</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cai, Yunlu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Qiuxia</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Soft Computing</subfield><subfield code="d">Springer-Verlag, 2003</subfield><subfield code="g">20(2015), 9 vom: 08. Juli, Seite 3735-3744</subfield><subfield code="w">(DE-627)SPR006469531</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:20</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:9</subfield><subfield code="g">day:08</subfield><subfield code="g">month:07</subfield><subfield code="g">pages:3735-3744</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s00500-015-1759-5</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">20</subfield><subfield code="j">2015</subfield><subfield code="e">9</subfield><subfield code="b">08</subfield><subfield code="c">07</subfield><subfield code="h">3735-3744</subfield></datafield></record></collection>
|
author |
Xiang, Can |
spellingShingle |
Xiang, Can misc Face recognition misc Outsourced computation misc Privacy-preserving Privacy-preserving face recognition with outsourced computation |
authorStr |
Xiang, Can |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)SPR006469531 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
Privacy-preserving face recognition with outsourced computation Face recognition (dpeaa)DE-He213 Outsourced computation (dpeaa)DE-He213 Privacy-preserving (dpeaa)DE-He213 |
topic |
misc Face recognition misc Outsourced computation misc Privacy-preserving |
topic_unstemmed |
misc Face recognition misc Outsourced computation misc Privacy-preserving |
topic_browse |
misc Face recognition misc Outsourced computation misc Privacy-preserving |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Soft Computing |
hierarchy_parent_id |
SPR006469531 |
hierarchy_top_title |
Soft Computing |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)SPR006469531 |
title |
Privacy-preserving face recognition with outsourced computation |
ctrlnum |
(DE-627)SPR006491065 (SPR)s00500-015-1759-5-e |
title_full |
Privacy-preserving face recognition with outsourced computation |
author_sort |
Xiang, Can |
journal |
Soft Computing |
journalStr |
Soft Computing |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
3735 |
author_browse |
Xiang, Can Tang, Chunming Cai, Yunlu Xu, Qiuxia |
container_volume |
20 |
format_se |
Elektronische Aufsätze |
author-letter |
Xiang, Can |
doi_str_mv |
10.1007/s00500-015-1759-5 |
author2-role |
verfasserin |
title_sort |
privacy-preserving face recognition with outsourced computation |
title_auth |
Privacy-preserving face recognition with outsourced computation |
abstract |
Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. |
abstractGer |
Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. |
abstract_unstemmed |
Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER |
container_issue |
9 |
title_short |
Privacy-preserving face recognition with outsourced computation |
url |
https://dx.doi.org/10.1007/s00500-015-1759-5 |
remote_bool |
true |
author2 |
Tang, Chunming Cai, Yunlu Xu, Qiuxia |
author2Str |
Tang, Chunming Cai, Yunlu Xu, Qiuxia |
ppnlink |
SPR006469531 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s00500-015-1759-5 |
up_date |
2024-07-03T23:16:05.706Z |
_version_ |
1803601644833734656 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR006491065</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124002822.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s00500-015-1759-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR006491065</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s00500-015-1759-5-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Xiang, Can</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy-preserving face recognition with outsourced computation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals’ privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals’ privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Face recognition</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Outsourced computation</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy-preserving</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tang, Chunming</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cai, Yunlu</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Qiuxia</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Soft Computing</subfield><subfield code="d">Springer-Verlag, 2003</subfield><subfield code="g">20(2015), 9 vom: 08. Juli, Seite 3735-3744</subfield><subfield code="w">(DE-627)SPR006469531</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:20</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:9</subfield><subfield code="g">day:08</subfield><subfield code="g">month:07</subfield><subfield code="g">pages:3735-3744</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s00500-015-1759-5</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">20</subfield><subfield code="j">2015</subfield><subfield code="e">9</subfield><subfield code="b">08</subfield><subfield code="c">07</subfield><subfield code="h">3735-3744</subfield></datafield></record></collection>
|
score |
7.400672 |