4.6 Article

Privacy-preserving face recognition with outsourced computation

Journal

SOFT COMPUTING
Volume 20, Issue 9, Pages 3735-3744

Publisher

SPRINGER
DOI: 10.1007/s00500-015-1759-5

Keywords

Face recognition; Outsourced computation; Privacy-preserving

Funding

  1. National Natural Science Foundation of China [11271003]
  2. National Research Foundation for the Doctoral Program of Higher Education of China [20134410110003]
  3. High Level Talents Project of Guangdong, Guangdong Provincial Natural Science Foundation [S2012010009950]
  4. Project of Department of Education of Guangdong Province [2013KJ-CX0146]
  5. Natural Science Foundation of Bureau of Education of Guangzhou [2012A004]
  6. basic research major projects of Department of Education of Guangdong Province [2004KZDXM044]
  7. Guangzhou Zhujiang Science and Technology Future Fellow Fund [2012J2200094]

Ask authors/readers for more resources

Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data raises important concerns, in particular if computations over biometric data is performed at untrusted servers. In previous work of privacy-preserving face recognition, in order to protect individuals' privacy, face recognition is performed over encrypted face images. However, these results increase the computation cost of the client and the face database owners, which may enable face recognition not to be executed. Consequently, it would be desirable to reduce computation cost over sensitive biometric data in such environments. Currently, no secure techniques for outsourcing face biometric recognition are readily available. In this paper, we propose a privacy-preserving face recognition protocol with outsourced computation for the first time, which efficiently protects individuals' privacy. Our protocol substantially improves the previous works in terms of the online computation cost by outsourcing large computation task to a cloud server who has large computing power. In particular, the overall online computation cost of the client and the database owner in our protocol is at most 1/2 of the corresponding protocol in the state-of-the-art algorithms. In addition, the client requires the decryption operations with only O(1) independent of M, where M is the size of the face database. Furthermore, the client can verify the correctness of the recognition result.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available