4.6 Article

Outsourcing LDA-Based Face Recognition to an Untrusted Cloud

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 20, Issue 3, Pages 2058-2070

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2022.3172143

Keywords

Outsourcing; Protocols; Face recognition; Servers; Cryptography; Computational modeling; Eigenvalues and eigenfunctions; Cloud computing; linear discriminant analysis; face recognition; secure outsourcing; privacy-preserving

Ask authors/readers for more resources

This paper proposes a protocol for outsourcing LDA-based face recognition tasks to an untrusted cloud, allowing clients to complete matrix inversion, matrix multiplication, and eigenvalue decomposition operations. The protocol ensures the privacy of client data and allows the client to verify the correctness of the outsourcing results. Additionally, it reduces the computational complexity for the client, enabling efficient execution of the LDA algorithm.
Face recognition has been extensively employed in practice, such as attendance system and public security. Linear discriminant analysis (LDA) algorithm is one of the most significant ones in the field of face recognition, but it is very difficult for many clients to employ it in their resource-constrained devices (e.g., smartphones and notebook computers). Outsourcing computation provides a promising method for clients to perform heavy tasks with limited computing power. In this paper, we design a protocol of outsourcing LDA-based face recognition to an untrusted cloud, which can help the client to complete the operations of matrix inversion (MI), matrix multiplication (MM) and eigenvalue decomposition (ED) simultaneously. The proposed outsourcing protocol can hide the private data of the client from the cloud. More importantly, the client can verify whether the outsourcing results are correct or not with probability one and so it is impossible for the server to deceive the client. In addition, the proposed protocol greatly decreases the computational complexity of the client thus enabling the client to complete LDA algorithm efficiently. Finally, we implement the protocol and give a comprehensive evaluation. The experimental results demonstrate that the client obtain great computing savings and the face recognition accuracy in the proposed protocol is almost identical to the original LDA algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available