4.7 Article

Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data

期刊

IEEE TRANSACTIONS ON IMAGE PROCESSING
卷 25, 期 7, 页码 3411-3425

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIP.2016.2568460

关键词

Scale-invariant feature transform; privacy-preserving; security; homomorphic encryption; cloud computing

资金

  1. National Natural Science Foundation of China [61373167]
  2. National Basic Research Program of China (973 Program) [2014CB340600]
  3. National High Technology Research and Development Program of China (863 Program) [2015AA016004]
  4. Wuhan Science and Technology Bureau [2015010101010020]
  5. Fundamental Research Funds for the Central Universities [2042016kf0137]
  6. U.S. National Science Foundation [CNS-1262277]
  7. Division Of Computer and Network Systems
  8. Direct For Computer & Info Scie & Enginr [1262277] Funding Source: National Science Foundation

向作者/读者索取更多资源

Advances in cloud computing have greatly motivated data owners to outsource their huge amount of personal multimedia data and/or computationally expensive tasks onto the cloud by leveraging its abundant resources for cost saving and flexibility. Despite the tremendous benefits, the outsourced multimedia data and its originated applications may reveal the data owner's private information, such as the personal identity, locations, or even financial profiles. This observation has recently aroused new research interest on privacy-preserving computations over outsourced multimedia data. In this paper, we propose an effective and practical privacy-preserving computation outsourcing protocol for the prevailing scale-invariant feature transform (SIFT) over massive encrypted image data. We first show that the previous solutions to this problem have either efficiency/security or practicality issues, and none can well preserve the important characteristics of the original SIFT in terms of distinctiveness and robustness. We then present a new scheme design that achieves efficiency and security requirements simultaneously with the preservation of its key characteristics, by randomly splitting the original image data, designing two novel efficient protocols for secure multiplication and comparison, and carefully distributing the feature extraction computations onto two independent cloud servers. We both carefully analyze and extensively evaluate the security and effectiveness of our design. The results show that our solution is practically secure, outperforms the state-of-the-art, and performs comparably with the original SIFT in terms of various characteristics, including rotation invariance, image scale invariance, robust matching across affine distortion, and addition of noise and change in 3D viewpoint and illumination.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据