{"title":"Private image computation: The case of cloud based privacy-preserving SIFT","authors":"Zhan Qin, Jingbo Yan, K. Ren","doi":"10.1109/INFCOMW.2014.6849214","DOIUrl":null,"url":null,"abstract":"In this paper, we present SecSIFT, a high-performance cloud based image feature detection system for performing Scalar Invariant Feature Transform (SIFT) over private image data without compromising the privacy. In contrast to previous works, we outsource the computation of image feature detection to a set of independent, co-operative cloud servers, and keep the outsourced computation procedures as simple as possible. Using this framework, we are not restricted by efficiency limitations of homomorphic encryption scheme and thus are able to implement applications such as social discovery or behavior prediction with less complexity on computation and communication.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"179-180"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOMW.2014.6849214","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In this paper, we present SecSIFT, a high-performance cloud based image feature detection system for performing Scalar Invariant Feature Transform (SIFT) over private image data without compromising the privacy. In contrast to previous works, we outsource the computation of image feature detection to a set of independent, co-operative cloud servers, and keep the outsourced computation procedures as simple as possible. Using this framework, we are not restricted by efficiency limitations of homomorphic encryption scheme and thus are able to implement applications such as social discovery or behavior prediction with less complexity on computation and communication.