skip to main content
10.1145/3036290.3036301acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlscConference Proceedingsconference-collections
research-article

Image Feature Extraction with Homomorphic Encryption on Integer Vector

Published: 13 January 2017 Publication History

Abstract

With the amount of user-contributed image data increasing, it is a potential threat for users that everyone may have the access to gain privacy information. To reduce the possibility of the loss of real information, this paper combines homomorphic encryption scheme and image feature extraction to provide a guarantee for users' privacy. In this paper, the whole system model mainly consists of three parts, including social network service providers (SP), the Interested party (IP) and the applications. Except for the image preprocessing phase, the main operations of feature extraction are conducted in ciphertext domain, which means only SP has the access to the privacy of the users. The extraction algorithm is used to obtain a multi-dimensional histogram descriptor as image feature for each image. As a result, the histogram descriptor can be extracted correctly in encrypted domain in an acceptable time. Besides, the extracted feature can represent the image effectively because of relatively high accuracy. Additionally, many different applications can be conducted by using the encrypted features because of the support of our encryption scheme.

References

[1]
S. Lawson, "SSDs boost instagram's speed on amazon EC2," Computer World, Web. 21 Sep. 2012.
[2]
W. Lu, et al., "Secure image retrieval through feature protection," in Proc. of ICASSP' 09, 2009.
[3]
C.-Y. Hsu, et al. "Image feature extraction in encrypted domain with privacy-preserving sift," IEEE Trans. Image Processing, 21.11(2012): 4593--4607.
[4]
W. Lu, et al. "Enabling search over encrypted multimedia databases," in Proc. of SPIE'09, 2009.
[5]
J. Bringer, et al. "Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends," Signal Processing Magazine, 30.2(2013): 42--52.
[6]
C.-Y. Hsu, et al. "Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction," in Proc. of SPIE'11, 2011.
[7]
Zhou, Hongchao, and Gregory Wornell. "Efficient homomorphic encryption on integer vectors and its applications," Information Theory and Applications Workshop (ITA). IEEE, 2014.
[8]
Qin Z, Yan J, Ren K, et al. "Privacy-preserving outsourcing of image global feature detection," Global Communications Conference (GLOBECOM), 2014 IEEE. IEEE, 2014: 710--715.
[9]
C. Peikert, V. Vaikuntanathan, and B. "Waters, A framework for efficient and composable oblivious transfer," In CRYPTO'08, (LNCS) vol. 5157, pp. 554--571, 2008.
[10]
Z. Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," in Proc. 2011 IEEE 52nd Annu. Symp. on Foundations of Computer Science, pp. 97106.
[11]
Z. Brakerski, C. Gentry, and S. Halevi, "Packed ciphertexts in LWEbased homomorphic encryption," in Public-Key Cryptography - PKC, (LNCS) vol. 7778, pp. 1--13, 2013.
[12]
T. Sikora, "The mpeg-7 visual standard for content description-an overview," IEEE Trans. CSVT, 11.6(2001): 696--702.
[13]
K. Ivanova, et al. "Features for art painting classification based on vector quantization of mpeg-7 descriptors," Data Engineering and Management, Springer, pp. 146--153, 2012.
[14]
Zhou, Hongchao, and Gregory Wornell. "Efficient homomorphic encryption on integer vectors and its applications," Information Theory and Applications Workshop (ITA). IEEE, 2014.
[15]
Brakerski, Zvika, Craig Gentry, and Shai Halevi. "Packed ciphertext in LWE-based homomorphic encryption," Public Key Cryptography, vol. 7778, 2013.

Cited By

View all
  • (2022)Studying the Security Threats of Partially Processed Deep Neural Inference Data in an IoT DeviceProceedings of the 20th ACM Conference on Embedded Networked Sensor Systems10.1145/3560905.3568091(845-846)Online publication date: 6-Nov-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICMLSC '17: Proceedings of the 2017 International Conference on Machine Learning and Soft Computing
January 2017
233 pages
ISBN:9781450348287
DOI:10.1145/3036290
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 January 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Feature Extraction
  2. Histogram Descriptor
  3. Homomorphic Encryption
  4. Privacy Protection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • the National Natural Science Foundation of China
  • the International Science and Technology Cooperation and Exchange Program of Sichuan Province, China
  • China Postdoctoral Science Foundation funded project

Conference

ICMLSC '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Studying the Security Threats of Partially Processed Deep Neural Inference Data in an IoT DeviceProceedings of the 20th ACM Conference on Embedded Networked Sensor Systems10.1145/3560905.3568091(845-846)Online publication date: 6-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media