A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval

The emergence of cloud computing provides an unlimited computation/storage for users, and yields new opportunities for multimedia analysis and retrieval research. However, privacy of users, e.g., search intention, may be leaked to the server and maliciously utilized by companies or individuals with animus. This paper presents a privacy-preserving multimedia analysis framework based on a widely-adopted structure, i.e., bipartite graph, so that multimedia analysis and retrieval in the encrypted domain is enabled. This work aims to keep the server unaware of what the user wants to retrieve, and at the same time take advantage of the server's computation power. Homomorphic encryption schemes and communication protocols in the encrypted domain are integrated to facilitate bipartite graph construction and implement the Hungarian algorithm to find the best matching. Two applications, video tag suggestion and video copy detection, are developed on top of the privacy-preserving framework, and the evaluation results demonstrate that performance obtained in the encrypted domain is comparable with that obtained in the plain text domain.

[1]  Frank Harary,et al.  Graph Theory , 2016 .

[2]  Guan-Ming Su,et al.  Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.

[3]  Ze-Nian Li,et al.  Learning image similarities via Probabilistic Feature Matching , 2010, 2010 IEEE International Conference on Image Processing.

[4]  Silvio Jamil Ferzoli Guimarães,et al.  Bipartite graph matching for video clip localization , 2007, XX Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2007).

[5]  Ivan Damgård,et al.  Efficient and Secure Comparison for On-Line Auctions , 2007, ACISP.

[6]  Alan F. Smeaton,et al.  Automatic Summarization of Rushes Video Using Bipartite Graphs , 2008, SAMT.

[7]  Haibin Liu,et al.  Video linkage: group based copied video detection , 2008, CIVR '08.

[8]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[9]  Silvio Jamil Ferzoli Guimarães,et al.  Bipartite graph matching for video clip localization , 2007 .

[10]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[11]  Olivier Buisson,et al.  Video and image copy detection demo , 2007, CIVR '07.

[12]  Wei-Ta Chu,et al.  Tag suggestion and localization for web videos by bipartite graph matching , 2011, WSM '11.

[13]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[14]  Soo-Chang Pei,et al.  Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.

[15]  Silvio Jamil Ferzoli Guimarães,et al.  Gradual transition detection based on bipartite graph matching approach , 2009, 2009 IEEE International Workshop on Multimedia Signal Processing.

[16]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[17]  Yue Gao,et al.  3D model retrieval using weighted bipartite graph matching , 2011, Signal Process. Image Commun..

[18]  Nikos A. Vlassis,et al.  The global k-means clustering algorithm , 2003, Pattern Recognit..

[19]  Bart Thomee,et al.  TOP-SURF: a visual words toolkit , 2010, ACM Multimedia.

[20]  K. Srinathan,et al.  Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[21]  Lifeng Sun,et al.  Fast and robust detection of near-duplicates in web video database , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[22]  Ahmad-Reza Sadeghi,et al.  Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..

[23]  Ivan Damgård,et al.  A correction to 'efficient and secure comparison for on-line auctions' , 2009, Int. J. Appl. Cryptogr..

[24]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[25]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.