160 likes | 413 Views
Privacy-Preserving Face Recognition. Zekeriya Erkin1, Martin Franz2, Jorge Guajardo3, Stefan Katzenbeisser2, Inald Lagendijk1, and Tomas Toft4. Introduction. Alice. ?. Bob. Run face recognition to determine whether the face image is in database. Owns a face image
E N D
Privacy-Preserving Face Recognition Zekeriya Erkin1, Martin Franz2, Jorge Guajardo3, Stefan Katzenbeisser2, Inald Lagendijk1, and Tomas Toft4
Introduction Alice ? Bob Run face recognition to determine whether the face image is in database Owns a face image Is neither willing to share the image nor the detection result Owns a face database Is not willing to reveal his data
Paillier cryptosystem • additively homomorphic public-key encryption schemes • [a + b] = [a][b], • [ab] = [a]b. ( b is a constant)
Face Recognition • Run Principal Component Analysis (PCA) from a set of criminal images to obtain eigenface • Projects face images onto eigenfaces.
PrincipalComponent Analysis (PCA) • Θ1,Θ2, . . . , ΘM : vectors of length N • average of the training images • covariance matrix • Run PCA • To determine the face space, we select K << M eigenvectors u1, . . . , uKthat correspond to the K largest eigenvalues.
criminal projection • Θ1,Θ2, . . . , ΘMare projected onto the subspace spanned by the basis u1, . . . , uKto obtain their feature vector representation Ω1, . . . , ΩM.
Suspect Projection • input image Γ
Progection in the encrypted domain • input image
Calculating distances Client’s
Calculating distances(conti) Alice Bob
Paillier cryptosystem • Two large prime number p, q • n = p*q • Select random integer g • Encryption • Decryption Public key Private key
Paillier cryptosystem • Homomorphic addition of plaintexts • Homomorphic multiplication of plaintexts