1 / 15

Privacy-Preserving Face Recognition

Privacy-Preserving Face Recognition. Zekeriya Erkin1, Martin Franz2, Jorge Guajardo3, Stefan Katzenbeisser2, Inald Lagendijk1, and Tomas Toft4. Introduction. Alice. ?. Bob. Run face recognition to determine whether the face image is in database. Owns a face image

elisa
Download Presentation

Privacy-Preserving Face Recognition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy-Preserving Face Recognition Zekeriya Erkin1, Martin Franz2, Jorge Guajardo3, Stefan Katzenbeisser2, Inald Lagendijk1, and Tomas Toft4

  2. Introduction Alice ? Bob Run face recognition to determine whether the face image is in database Owns a face image Is neither willing to share the image nor the detection result Owns a face database Is not willing to reveal his data

  3. FIND

  4. Paillier cryptosystem • additively homomorphic public-key encryption schemes • [a + b] = [a][b], • [ab] = [a]b. ( b is a constant)

  5. Face Recognition • Run Principal Component Analysis (PCA) from a set of criminal images to obtain eigenface • Projects face images onto eigenfaces.

  6. PrincipalComponent Analysis (PCA) • Θ1,Θ2, . . . , ΘM : vectors of length N • average of the training images • covariance matrix • Run PCA • To determine the face space, we select K << M eigenvectors u1, . . . , uKthat correspond to the K largest eigenvalues.

  7. criminal projection • Θ1,Θ2, . . . , ΘMare projected onto the subspace spanned by the basis u1, . . . , uKto obtain their feature vector representation Ω1, . . . , ΩM.

  8. Suspect Projection • input image Γ

  9. Progection in the encrypted domain • input image

  10. Calculating distances Client’s

  11. Calculating distances(conti) Alice Bob

  12. Calculating distances

  13. DEMO~

  14. Paillier cryptosystem • Two large prime number p, q • n = p*q • Select random integer g • Encryption • Decryption Public key Private key

  15. Paillier cryptosystem • Homomorphic addition of plaintexts • Homomorphic multiplication of plaintexts

More Related