Person re-identification over encrypted outsourced surveillance videos
Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs have posed a great challenge for the resource-constra...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4406 https://ink.library.smu.edu.sg/context/sis_research/article/5409/viewcontent/087426201__1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5409 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-54092019-08-05T07:53:19Z Person re-identification over encrypted outsourced surveillance videos CHENG, Hang WANG, Huaxiong LIU, Ximeng FANG, Yan WANG, Meiqing ZHANG, Xiaojun Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs have posed a great challenge for the resource-constrained users. In recent years, the cloud storage services have made a large volume of video data outsourcing become possible. However, person Re-ID over outsourced surveillance videos could lead to a security threat, i.e., the privacy leakage of the innocent person in these videos. Therefore, we propose an efFicient privAcy-preseRving peRson Re-ID Scheme (FARRIS) over outsourced surveillance videos, which can ensure the privacy of the detected person while providing the person Re-ID service. Specifically, FARRIS exploits the convolutional neural network (CNN) and kernels based supervised hashing (KSH) to extract the efficient person Re-ID feature. Then, we design a secret sharing based Hamming distance computation protocol to allow cloud servers to calculate similarities among obfuscated feature indexes. Furthermore, a dual Merkle hash trees based verification is proposed, which permits users to validate the correctness of the matching results. The extensive experimental results and security analysis demonstrate that FARRIS can work efficiently, without compromising the privacy of the involved person. CCBY 2019-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4406 info:doi/10.1109/TDSC.2019.2923653 https://ink.library.smu.edu.sg/context/sis_research/article/5409/viewcontent/087426201__1_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Merkle hash tree Person re-identification Privacy-Preserving Secret sharing Secure Hamming distance Computer and Systems Architecture Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Merkle hash tree Person re-identification Privacy-Preserving Secret sharing Secure Hamming distance Computer and Systems Architecture Software Engineering |
spellingShingle |
Merkle hash tree Person re-identification Privacy-Preserving Secret sharing Secure Hamming distance Computer and Systems Architecture Software Engineering CHENG, Hang WANG, Huaxiong LIU, Ximeng FANG, Yan WANG, Meiqing ZHANG, Xiaojun Person re-identification over encrypted outsourced surveillance videos |
description |
Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs have posed a great challenge for the resource-constrained users. In recent years, the cloud storage services have made a large volume of video data outsourcing become possible. However, person Re-ID over outsourced surveillance videos could lead to a security threat, i.e., the privacy leakage of the innocent person in these videos. Therefore, we propose an efFicient privAcy-preseRving peRson Re-ID Scheme (FARRIS) over outsourced surveillance videos, which can ensure the privacy of the detected person while providing the person Re-ID service. Specifically, FARRIS exploits the convolutional neural network (CNN) and kernels based supervised hashing (KSH) to extract the efficient person Re-ID feature. Then, we design a secret sharing based Hamming distance computation protocol to allow cloud servers to calculate similarities among obfuscated feature indexes. Furthermore, a dual Merkle hash trees based verification is proposed, which permits users to validate the correctness of the matching results. The extensive experimental results and security analysis demonstrate that FARRIS can work efficiently, without compromising the privacy of the involved person. CCBY |
format |
text |
author |
CHENG, Hang WANG, Huaxiong LIU, Ximeng FANG, Yan WANG, Meiqing ZHANG, Xiaojun |
author_facet |
CHENG, Hang WANG, Huaxiong LIU, Ximeng FANG, Yan WANG, Meiqing ZHANG, Xiaojun |
author_sort |
CHENG, Hang |
title |
Person re-identification over encrypted outsourced surveillance videos |
title_short |
Person re-identification over encrypted outsourced surveillance videos |
title_full |
Person re-identification over encrypted outsourced surveillance videos |
title_fullStr |
Person re-identification over encrypted outsourced surveillance videos |
title_full_unstemmed |
Person re-identification over encrypted outsourced surveillance videos |
title_sort |
person re-identification over encrypted outsourced surveillance videos |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2019 |
url |
https://ink.library.smu.edu.sg/sis_research/4406 https://ink.library.smu.edu.sg/context/sis_research/article/5409/viewcontent/087426201__1_.pdf |
_version_ |
1770574699582980096 |