Non-Interactive and secure outsourcing of PCA-Based face recognition

被引:12
|
作者
Ren, Yanli [1 ]
Xu, Xiao [1 ]
Feng, Guorui [1 ]
Zhang, Xinpeng [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Cloud computing; Face recognition; PCA; Non-interactive;
D O I
10.1016/j.cose.2021.102416
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there have been more and more researches focus on the field of face recognition with the development of artificial intelligence (AI). Principal Component Analysis (PCA) is an important face recognition algorithm which has high accuracy without a large amount of data. Currently, the outsourcing of PCA-based face recognition protocol required three interactions between the clients and the cloud to execute matrix multiplications and eigenvalue decomposition, respectively, which needs very high communicational costs. In this paper, we propose a non-interactive PCA-based face recognition outsourcing protocol, which only needs one encryption and decryption without interactions between the clients and the cloud. That is to say, the client can obtain the final result of face recognition by encrypting the original images and decrypting the outsourcing results only once. The privacy of input and output is protected well by the proposed protocol, and the computational complexity is greatly reduced. In addition, the client can effectively detect the bad behaviors of the cloud and refuse the wrong outsourcing results by a verification algorithm. We prove the feasibility of our protocol from both theoretical and experimental analysis. The theoretical analysis shows that our proposed protocol reduces the computational overheads on the client's side from O (n(3)) to O (n(2)) . We simulate the proposed protocol and the experimental results show that when the matrix dimension exceeds 2500 x 3000 , the client can gain more than 16.9825 overhead savings which indicates the efficiency of the proposed protocol. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Secure Non-interactive Simulation: Feasibility and Rate
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 767 - 796
  • [32] Concurrently Composable Non-interactive Secure Computation
    Morgan, Andrew
    Pass, Rafael
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 526 - 555
  • [33] On the (in)efficiency of non-interactive secure multiparty computation
    Yoshida, Maki
    Obana, Satoshi
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (08) : 1793 - 1805
  • [34] Adaptively secure non-interactive threshold cryptosystems
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2013, 478 : 76 - 100
  • [35] Mobile agent protection based on non-interactive secure function evaluation
    Wu, Jian-Jun
    Gao, Ji
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
  • [36] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [37] An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System
    Abusham, Eimad
    Ibrahim, Basil
    Zia, Kashif
    Al Maskari, Sanad
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [38] Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
    Gennaro, Rosario
    Gentry, Craig
    Parno, Bryan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 465 - 482
  • [39] An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System
    Abusham, Eimad
    Ibrahim, Basil
    Zia, Kashif
    Al Maskari, Sanad
    Scientific Programming, 2022, 2022
  • [40] Semi-supervised PCA-based face recognition using self-training
    Roli, Fabio
    Marcialis, Gian Luca
    STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION, PROCEEDINGS, 2006, 4109 : 560 - 568