Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding

被引:0
|
作者
Tao, Yunting [1 ,3 ]
Li, Yuqun [3 ]
Kong, Fanyu [1 ]
Shi, Yuliang [1 ]
Yang, Ming [4 ,5 ]
Yu, Jia [2 ]
Zhang, Hanlin [2 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Shandong, Peoples R China
[2] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Shandong, Peoples R China
[3] Binzhou Polytech, Coll Informat Engn, Binzhou 256603, Shandong, Peoples R China
[4] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Minist Educ,Key Lab Comp Power Network & Informat, Jinan 250000, Shandong, Peoples R China
[5] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Comp Networks, Jinan 250000, Shandong, Peoples R China
关键词
Face recognition; Privacy-preserving outsourcing computation; Locally linear embedding (LLE); Matrix computation; Cloud computing; LARGE MATRIX; COMPUTATION;
D O I
10.1016/j.cose.2024.103931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face recognition is a biometric-based technology that identifies or verifies a person's identity by analyzing and comparing patterns in their facial features. Among kinds of face recognition algorithms, Locally Linear Embedding (LLE) algorithm has the advantage of preserving the local structure of face data. However, the LLE algorithm requires some computationally intensive matrix calculations, which might introduce latency to the device. In this paper, we propose a privacy -preserving outsourcing scheme of face recognition based on LLE algorithm for the first time. By outsourcing matrix multiplication, linear equations, and eigenvalue decomposition of the LLE algorithm to a cloud server, we reduce the computational load on the client device. To ensure data security, we generate a novel type of sparse orthogonal matrix through square root application and random permutation of diagonal elements, used as secret keys to blind the client's data. Meanwhile, due to the sparsity of key matrices, the complexity of client -side computation complexity is reduced from O ( n 3 ) to O ( n 2 ) . The experimental results show that our proposed scheme reduces computational costs while maintaining almost identical face recognition accuracy as the original LLE-based algorithm.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Lightweight Privacy-Preserving Ensemble Classification for Face Recognition
    Ma, Zhuo
    Liu, Yang
    Liu, Ximeng
    Ma, Jianfeng
    Ren, Kui
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5778 - 5790
  • [22] Privacy-Preserving Face Recognition for Access Control Systems
    Zhang, Sucan
    Ma, Jianfei
    Zhang, Mingxuan
    Hua, Jingyu
    2024 IEEE 21ST INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SMART SYSTEMS, MASS 2024, 2024, : 348 - 356
  • [23] Generating bimodal privacy-preserving data for face recognition
    Tomasevic, Darian
    Boutros, Fadi
    Damer, Naser
    Peer, Peter
    Struc, Vitomir
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 133
  • [24] Towards efficient privacy-preserving face recognition in the cloud
    Guo, Shangwei
    Xiang, Tao
    Li, Xiaoguo
    SIGNAL PROCESSING, 2019, 164 (320-328) : 320 - 328
  • [25] Supervised Locally Linear Embedding in face recognition
    Pang, Ying Han
    Teoh, Andrew Beng Jin
    Wong, Eng Kiong
    Abas, Fazly Salleh
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 82 - +
  • [26] Face recognition with weighted locally linear embedding
    Mekuz, N
    Bauckhage, C
    Tsotsos, JK
    2ND CANADIAN CONFERENCE ON COMPUTER AND ROBOT VISION, PROCEEDINGS, 2005, : 290 - 296
  • [27] Locally Linear Discriminate Embedding for Face Recognition
    Abusham, Eimad E.
    Wong, E. K.
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2009, 2009
  • [28] A novel privacy-preserving outsourcing computation scheme for Canny edge detection
    Bowen Li
    Fazhi He
    Xiantao Zeng
    The Visual Computer, 2022, 38 : 4437 - 4455
  • [29] Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 281 - 298
  • [30] Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    KSII Transactions on Internet and Information Systems, 2020, 14 (01) : 281 - 298