Non-Interactive and secure outsourcing of PCA-Based face recognition

被引:12
|
作者
Ren, Yanli [1 ]
Xu, Xiao [1 ]
Feng, Guorui [1 ]
Zhang, Xinpeng [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Cloud computing; Face recognition; PCA; Non-interactive;
D O I
10.1016/j.cose.2021.102416
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there have been more and more researches focus on the field of face recognition with the development of artificial intelligence (AI). Principal Component Analysis (PCA) is an important face recognition algorithm which has high accuracy without a large amount of data. Currently, the outsourcing of PCA-based face recognition protocol required three interactions between the clients and the cloud to execute matrix multiplications and eigenvalue decomposition, respectively, which needs very high communicational costs. In this paper, we propose a non-interactive PCA-based face recognition outsourcing protocol, which only needs one encryption and decryption without interactions between the clients and the cloud. That is to say, the client can obtain the final result of face recognition by encrypting the original images and decrypting the outsourcing results only once. The privacy of input and output is protected well by the proposed protocol, and the computational complexity is greatly reduced. In addition, the client can effectively detect the bad behaviors of the cloud and refuse the wrong outsourcing results by a verification algorithm. We prove the feasibility of our protocol from both theoretical and experimental analysis. The theoretical analysis shows that our proposed protocol reduces the computational overheads on the client's side from O (n(3)) to O (n(2)) . We simulate the proposed protocol and the experimental results show that when the matrix dimension exceeds 2500 x 3000 , the client can gain more than 16.9825 overhead savings which indicates the efficiency of the proposed protocol. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Computational and performance aspects of PCA-based face-recognition algorithms
    Moon, H
    Phillips, PJ
    PERCEPTION, 2001, 30 (03) : 303 - 321
  • [22] A comparison between two preprocessing techniques in PCA-based face recognition
    Ciocoiu, IB
    Valmar, B
    SCS 2003: INTERNATIONAL SYMPOSIUM ON SIGNALS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2003, : 285 - 288
  • [23] Secure Non-interactive Reducibility is Decidable
    Bhushan, Kaartik
    Misra, Ankit Kumar
    Narayanan, Varun
    Prabhakaran, Manoj
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 408 - 437
  • [24] Provably secure non-interactive key distribution based on pairings
    Dupont, R
    Enge, A
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 270 - 276
  • [25] Non-Interactive Secure Computation Based on Cut-and-Choose
    Afshar, Arash
    Mohassel, Payman
    Pinkas, Benny
    Riva, Ben
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 387 - 404
  • [26] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [27] PCA-Based Face Recognition from Video Using Super-Resolution
    Al-Azzeh, Maal
    Eleyan, Alaa
    Demirel, Hasan
    23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 166 - 169
  • [28] PCA-based recognition for efficient inpainting
    Korah, T
    Rasmussen, C
    COMPUTER VISION - ACCV 2006, PT I, 2006, 3851 : 206 - 215
  • [29] Adaptively Secure Non-interactive Threshold Cryptosystems
    Libert, Benoit
    Yung, Moti
    Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
  • [30] On the (in)efficiency of non-interactive secure multiparty computation
    Maki Yoshida
    Satoshi Obana
    Designs, Codes and Cryptography, 2018, 86 : 1793 - 1805