Key independent encrypted face clustering

In a cloud environment to preserve privacy of the end user, there arises a need to match and classify images in the encrypted domain. To impart granularity to image-data access it is important to make the matching process key independent, without compromising on the strength of the cipher or precision in the matching process. In this paper we propose a simple block intensity substitution as an encryption algorithm. The feature that remains transparent to this form of encryption is the sorted intensity histogram and its derivatives. These secondary and tertiary histogram based features remain robust to pose variations and yet discriminating across different subjects. A blind encrypted image classification procedure based on a standard unsupervised clustering algorithm has been used to validate the proposed concept.

[1]  Wai Lok Woo,et al.  Secure face biometric verification in the randomized Radon space , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[2]  Dimitrios Hatzinakos,et al.  Cancelable Face Recognition Using Random Multiplicative Transform , 2010, 2010 20th International Conference on Pattern Recognition.

[3]  Kannan Karthik,et al.  Authenticating encrypted data , 2011, 2011 National Conference on Communications (NCC).

[4]  Soo-Chang Pei,et al.  Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction , 2011, Electronic Imaging.

[5]  Kannan Karthik,et al.  Transparent hashing in the encrypted domain for privacy preserving image retrieval , 2013, Signal Image Video Process..

[6]  Margarita Osadchy,et al.  Illumination invariant representation for privacy preserving face identification , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[7]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[8]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[9]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.