Abstract
Nowadays, with the maturity and wide application of face recognition technology, the recognition accuracy, recognition efficiency, and data security have attracted people’s attention. However, when face recognition is performed, face information is completely exposed to the cloud server without any protection measures. Therefore, a series of problems caused by insecure face information is coming. Can we find a way to prevent uncontrolled use of facial information without cloud protection and improve recognition efficiency and accuracy? Given this situation, we have proposed two options. The first requires a third-party library; the second does not require a third-party library. The first scheme is efficient privacy preserving face identification in the cloud through sparse representation, which relies on the third-party face image database, and the first scheme is simply referred to as SRBased. The second scheme is efficient privacy preserving face identification in the cloud based on deep neural network, which does not depend on the third-party face image database, and the second scheme is simply referred to as DNNBased. Both schemes can be divided into two parts: client and cloud server. The client is responsible for acquiring face images, and the server is responsible for recognizing and calculating. Through homomorphic encryption and OT protocol, secure face recognition is realized. In the whole recognition process, the server does not need to decrypt the image data. In the two schemes, the client and the server will not get any information from each other. Even if the third party intercepts the ciphertext in the transmission process, it will not get any information under the premise of private key security. Therefore, the two schemes can achieve the purpose of protecting privacy and security. The experimental results show that the efficiency of the two schemes is greatly improved compared with SCiFI schemes. The second scheme improves recognition accuracy greatly.
Similar content being viewed by others
References
Harn L, Lin HY (1991) An oblivious transfer protocol and its application for the exchange of secrets[J]
Jin X, Liu Y, Li X, Zhao G et al (2015) Privacy preserving face identification in the cloud through sparse representation. The 10th Chinese conference on biometric recognition (CCBR), Tianjin, China, 13-15 November, pp 160–167
Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools and Applications
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal processing: Image communication
Liao X, Guo S, Yin J, Wang H, Sangaiah AK (2017) New cubic reference table based image steganography. Multimedia Tools and Applications 77(4)
Li X, Han Q, Jin X (2018) A secure and efficient face-recognition scheme in the cloud based on deep neural networks and homomorphic encryption. The 8th international conference on virtual reality and visualization (ICVRV), Qingdao, China, 22-24 October
Luong A, Gerbush M, Waters B, Grauman K (2013) Reconstructing a fragmented face from a cryptographic identification protocol. IEEE Workshop on Applications of Computer Vision (WACV), pp. 238–245. IEEE
Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology, 1–1
Ma Y, Wu L, Gu X et al (2017) A secure face-verification scheme based on homomorphic encryption and deep neural networks[J]. IEEE Access 5:16532–16538
Moosavi-Dezfooli S M, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. In Proceedings of IEEE conference on computer vision and pattern recognition (CVPR)
Osadchy M, Pinkas B, Jarrous A et al (2010) SCiFI - A system for Secure Face Identification. IEEE Symposium on Security and Privacy (S&P), pp. 239–254, IEEE
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. EUROCRYPT, pp. 223–238. Springer
Runhua S, Hong Z, Jie C et al (2014) A novel oblivious transfer protocol with statistical analysis[J]. Acta Electronica Sinica 42(11):2273–2279
Sun Y, Liang D, Wang X et al (2015) Deep ID3: Face recognition with very deep neural networks[J]. arXiv:1502.00873
Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 2818–2826
Taigman Y, Yang M, Ranzato M et al (2014) DeepFace: Closing the gap to human-level performance in face verification. CVPR 00:1701–1708
Wang H, Wang Y, Zhou Z et al (2018) CosFace: Large margin cosine loss for deep face recognition[J]. arXiv:1801.09414
Wright J et al (2009) Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis & Machine Intelligence, pp 210–227, IEEE
Acknowledgements
Parts of the results and figures presented in this paper have previously appeared in our previous work [2, 6]. We add more technical details and experimental results in this version. This work is partially supported by the National Natural Science Foundation of China (grant numbers 61772047, 61772513), Big Data Application on lmproving Government Governance Capabilities National Engineering Laboratory Open Fund Project (grant number W-2018022), the Open Research Fund of Beijing Key Laboratory of Big Data Technology for Food Safety (grant number BTBD-2018KF-07), Beijing Technology and Business University, and the Fundamental Research Funds for the Central Universities (grant numbers. 328201903).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jin, X., Han, Q., Li, X. et al. Efficient blind face recognition in the cloud. Multimed Tools Appl 79, 12533–12550 (2020). https://doi.org/10.1007/s11042-019-08280-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08280-y