Privacy-Preserving Support Vector Machine Computing Using Random Unitary Transformation

A privacy-preserving support vector machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as the unauthorized use of cloud services, data leaks, and privacy being compromised. Accordingly, we consider privacy-preserving SVM computing. We focus on protecting visual \red{information} of images by using a random unitary transformation. Some properties of the protected images are discussed. The proposed scheme enables us not only to protect images, but also to have the same performance as that of unprotected images even when using typical kernel functions such as the linear kernel, radial basis function(RBF) kernel and polynomial kernel. Moreover, it can be directly carried out by using well-known SVM algorithms, without preparing any algorithms specialized for secure SVM computing. In an experiment, the proposed scheme is applied to a face-based authentication algorithm with SVM classifiers to confirm the effectiveness.

[1]  Hitoshi Kiya,et al.  An Encryption-then-Compression System for JPEG/Motion JPEG Standard , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Hitoshi Kiya,et al.  Unitary Transform-Based Template Protection and Its Application to l2-norm Minimization Problems , 2016, IEICE Trans. Inf. Syst..

[3]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[4]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[5]  Hitoshi Kiya,et al.  Grayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems , 2019, APSIPA Transactions on Signal and Information Processing.

[6]  Hitoshi Kiya,et al.  Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Marc G. Genton,et al.  Classes of Kernels for Machine Learning: A Statistics Perspective , 2002, J. Mach. Learn. Res..

[8]  Yoshinori Aono,et al.  Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption , 2016, IEICE Trans. Inf. Syst..

[9]  Mauro Barni,et al.  Private Computing with Garbled Circuits [Applications Corner] , 2013, IEEE Signal Processing Magazine.

[10]  Hitoshi Kiya,et al.  One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..

[11]  Noboru Babaguchi,et al.  Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services , 2019, IEEE Transactions on Information Forensics and Security.

[12]  Yehuda Lindell,et al.  Optimized Honest-Majority MPC for Malicious Adversaries — Breaking the 1 Billion-Gate Per Second Barrier , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[13]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  Jun Sakuma,et al.  Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data , 2016, NDSS.

[15]  Hitoshi Kiya,et al.  An encryption-then-compression system for JPEG standard , 2015, 2015 Picture Coding Symposium (PCS).

[16]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[17]  Hitoshi Kiya,et al.  Unitary transform-based template protection and its properties , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[18]  B. Suneetha,et al.  Designing an Efficient Image Encryption-then Compression System , 2015 .

[19]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[20]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[21]  Hitoshi Kiya,et al.  On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Hitoshi Kiya,et al.  Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks , 2017, 2017 IEEE International Conference on Multimedia and Expo (ICME).

[23]  Mauro Barni,et al.  Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing , 2015, IEEE Signal Processing Magazine.

[24]  Yehuda Lindell,et al.  High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..

[25]  Shantanu Rane,et al.  Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.

[26]  Vijay Varadharajan,et al.  Apsipa Transactions on Signal and Information Processing Additional Services for Apsipa Transactions on Signal and Information Processing: Survey on Securing Data Storage in the Cloud , 2022 .