Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors

Modern cameras are not designed with computer vision or machine learning as the target application. There is a need for a new class of vision sensors that are privacy preserving by design, that do not leak private information and collect only the information necessary for a target machine learning task. In this paper, we introduce key-nets, which are convolutional networks paired with a custom vision sensor which applies an optical/analog transform such that the key-net can perform exact encrypted inference on this transformed image, but the image is not interpretable by a human or any other key-net. We provide five sufficient conditions for an optical transformation suitable for a key-net, and show that generalized stochastic matrices (e.g. scale, bias and fractional pixel shuffling) satisfy these conditions. We motivate the key-net by showing that without it there is a utility/privacy tradeoff for a network fine-tuned directly on optically transformed images for face identification and object detection. Finally, we show that a key-net is equivalent to homomorphic encryption using a Hill cipher, with an upper bound on memory and runtime that scales quadratically with a user specified privacy parameter. Therefore, the key-net is the first practical, efficient and privacy preserving vision sensor based on optical homomorphic encryption.

[1]  Janusz Konrad,et al.  VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[2]  Albert Wang,et al.  An angle-sensitive CMOS imager for single-sensor 3D photography , 2011, 2011 IEEE International Solid-State Circuits Conference.

[3]  Graham Neubig,et al.  Controllable Invariance through Adversarial Feature Learning , 2017, NIPS.

[4]  Kaiming He,et al.  Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Suren Jayasuriya,et al.  Reconfiguring the Imaging Pipeline for Computer Vision , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[6]  Richard G. Baraniuk,et al.  The smashed filter for compressive classification and target recognition , 2007, Electronic Imaging.

[7]  Jinyuan Zhao Active scene illumination metods for privacy-preserving indoor occupant localization , 2019 .

[8]  Albert Wang,et al.  A 180nm CMOS image sensor with on-chip optoelectronic image compression , 2012, Proceedings of the IEEE 2012 Custom Integrated Circuits Conference.

[9]  H. Sebastian Seung,et al.  Learning the parts of objects by non-negative matrix factorization , 1999, Nature.

[10]  Sanjeev J. Koppal,et al.  Pre-Capture Privacy for Small Vision Sensors , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[12]  Aswin C. Sankaranarayanan,et al.  Lensless Imaging: A computational renaissance , 2016, IEEE Signal Processing Magazine.

[13]  R. Dicke SCATTER-HOLE CAMERAS FOR X-RAYS AND GAMMA RAYS. , 1968 .

[14]  Zhenyu Wu,et al.  Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.

[15]  Terrance E. Boult,et al.  Are facial attributes adversarially robust? , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[16]  Chiman Kwan,et al.  Multiple Human Objects Tracking and Classification Directly in Compressive Measurement Domain for Long Range Infrared Videos , 2019, 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[17]  Anantha Chandrakasan,et al.  Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..

[18]  Hajime Nagahara,et al.  Deep Compressive Sensing for Visual Privacy Protection in FlatCam Imaging , 2019, 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW).

[19]  Pascal Paillier,et al.  Fast Homomorphic Evaluation of Deep Discretized Neural Networks , 2018, IACR Cryptol. ePrint Arch..

[20]  Rin-ichiro Taniguchi,et al.  Anonymous Camera for Privacy Protection , 2014, 2014 22nd International Conference on Pattern Recognition.

[21]  Janusz Konrad,et al.  Towards privacy-preserving activity recognition using extremely low temporal and spatial resolution cameras , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[22]  Ashok Veeraraghavan,et al.  Single-frame 3D fluorescence microscopy with ultraminiature lensless FlatScope , 2017, Science Advances.

[23]  Sanjeev Arora,et al.  Computing a nonnegative matrix factorization -- provably , 2011, STOC '12.

[24]  T. Tkaczyk,et al.  3D printed fiber optic faceplates by custom controlled fused deposition modeling. , 2018, Optics express.

[25]  Jie Lin,et al.  The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs , 2018, IACR Cryptol. ePrint Arch..

[26]  Ashok Veeraraghavan,et al.  ASP Vision: Optically Computing the First Layer of Convolutional Neural Networks Using Angle Sensitive Pixels , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[27]  Aswin C. Sankaranarayanan,et al.  FlatCam: Thin, Bare-Sensor Cameras using Coded Aperture and Computation , 2015, ArXiv.

[28]  Ick,et al.  DiffuserCam : Lensless Single-exposure 3 D Imaging , 2017 .

[29]  Sanjeev J. Koppal,et al.  Privacy preserving optics for miniature vision sensors , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[30]  David Pointcheval,et al.  Partially Encrypted Machine Learning using Functional Encryption , 2019, NeurIPS 2019.

[31]  Ran Gilad-Bachrach,et al.  Low Latency Privacy Preserving Inference , 2018, ICML.

[32]  George W. Quinn,et al.  Modest proposals for improving biometric recognition papers , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[33]  Sharmeen Browarek High resolution, low cost, privacy preserving human motion tracking system via passive thermal sensing , 2010 .

[34]  Yao Lu,et al.  Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..

[35]  Hassan Takabi,et al.  CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.

[36]  Feng Li,et al.  A Coprime Blur Scheme for Data Security in Video Surveillance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  Ramesh Raskar,et al.  Lensless Imaging With Compressive Ultrafast Sensing , 2016, IEEE Transactions on Computational Imaging.

[38]  Weichen Liu,et al.  HolyLight: A Nanophotonic Accelerator for Deep Learning in Data Centers , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[39]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[40]  Lin Zhong,et al.  Better accuracy with quantified privacy: representations learned via reconstructive adversarial network , 2019, 1901.08730.

[41]  Stephen P. Boyd,et al.  End-to-end optimization of optics and image processing for achromatic extended depth of field and super-resolution imaging , 2018, ACM Trans. Graph..

[42]  Nikos D. Sidiropoulos,et al.  Non-Negative Matrix Factorization Revisited: Uniqueness and Algorithm for Symmetric Decomposition , 2014, IEEE Transactions on Signal Processing.

[43]  Sharath Pankanti,et al.  Towards Deep Neural Network Training on Encrypted Data , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[44]  Alex Krizhevsky,et al.  Learning Multiple Layers of Features from Tiny Images , 2009 .

[45]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[46]  Ralph Etienne-Cummings,et al.  Deep Learning-Based Target Tracking and Classification for Low Quality Videos Using Coded Aperture Cameras , 2019, Sensors.

[47]  Ashok Veeraraghavan,et al.  Direct face detection and video reconstruction from event cameras , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).

[48]  Eli Shlizerman,et al.  An Optical Frontend for a Convolutional Neural Network , 2018, Applied optics.

[49]  Michael Naehrig,et al.  CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.

[50]  Qiming Zhang,et al.  Artificial neural networks enabled by nanophotonics , 2019, Light: Science & Applications.

[51]  Ashwin Machanavajjhala,et al.  Olympus: Sensor Privacy through Utility Aware Obfuscation , 2019, Proc. Priv. Enhancing Technol..

[52]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[53]  David G. Stork Optical elements as computational devices for low-power sensing and imaging , 2017 .

[54]  Vibhav Vineet,et al.  Privacy-Preserving Action Recognition Using Coded Aperture Videos , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[55]  Ayan Chakrabarti,et al.  Learning Privacy Preserving Encodings Through Adversarial Training , 2018, 2019 IEEE Winter Conference on Applications of Computer Vision (WACV).

[56]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[57]  A. Molnar,et al.  Angle sensitive single photon avalanche diode , 2015 .

[58]  Thomas Brox,et al.  Striving for Simplicity: The All Convolutional Net , 2014, ICLR.

[59]  Arun Ross,et al.  FlowSAN: Privacy-Enhancing Semi-Adversarial Networks to Confound Arbitrary Face-Based Gender Classifiers , 2019, IEEE Access.

[60]  T. M. Cannon,et al.  Coded aperture imaging with uniformly redundant arrays. , 1978, Applied optics.

[61]  Gordon Wetzstein,et al.  Hybrid optical-electronic convolutional neural networks with optimized diffractive optics for image classification , 2018, Scientific Reports.

[62]  Stephen A. Vavasis,et al.  On the Complexity of Nonnegative Matrix Factorization , 2007, SIAM J. Optim..

[63]  Vishnu Naresh Boddeti Secure Face Matching Using Fully Homomorphic Encryption , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[64]  E. E. Fenimore,et al.  Coded Aperture Imaging: Many Holes Make Light Work , 1980 .

[65]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[66]  Tao Li,et al.  AnonymousNet: Natural Face De-Identification With Measurable Privacy , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[67]  Yi Luo,et al.  All-optical machine learning using diffractive deep neural networks , 2018, Science.

[68]  Sanjeev J. Koppal,et al.  Sensor-level privacy for thermal cameras , 2016, 2016 IEEE International Conference on Computational Photography (ICCP).

[69]  Li Fei-Fei,et al.  Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference , 2018, ArXiv.

[70]  Frédo Durand,et al.  Image and depth from a conventional camera with a coded aperture , 2007, ACM Trans. Graph..

[71]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.