Identifiable, but not visible: A privacy-preserving person reidentfication scheme

Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private dat...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHAO, Bowen, LI, Yingjiu, LIU, Ximeng, LI, Xiaoguo, PANG, Hwee Hwa, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2023
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/8112
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-9115
record_format dspace
spelling sg-smu-ink.sis_research-91152023-09-06T10:06:03Z Identifiable, but not visible: A privacy-preserving person reidentfication scheme ZHAO, Bowen LI, Yingjiu LIU, Ximeng LI, Xiaoguo PANG, Hwee Hwa DENG, Robert H. Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private data. To address these concerns, this article explores the first solution for building a privacy-preserving person Re-ID system. Specifically, this article formulizes privacy-preserving person Re-ID as similarity metrics of encrypted feature vectors because the underlying operation of person Re-ID is to compute the similarity of feature vectors that are extracted from person images by a machine learning model. However, feature vectors are generally denoted by floating-point numbers. To this end, this article exploits a series of new encoding mechanisms and secure batch computing protocols to encrypt floating-point feature vectors and achieve the underlying operation of person Re-ID. Rigorous theoretical analyses demonstrate that this work achieves person Re-ID without compromising any personal image privacy. Furthermore, the proposed secure batch protocols significantly enhance the performance of privacy-preserving person Re-ID while outputting the same precision as the previous method. 2023-04-06T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/8112 info:doi/10.1109/TR.2023.3258983 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Batch computation image privacy person Re-ID privacy-preserving identification secure computing Databases and Information Systems
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Batch computation
image privacy
person Re-ID
privacy-preserving identification
secure computing
Databases and Information Systems
spellingShingle Batch computation
image privacy
person Re-ID
privacy-preserving identification
secure computing
Databases and Information Systems
ZHAO, Bowen
LI, Yingjiu
LIU, Ximeng
LI, Xiaoguo
PANG, Hwee Hwa
DENG, Robert H.
Identifiable, but not visible: A privacy-preserving person reidentfication scheme
description Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private data. To address these concerns, this article explores the first solution for building a privacy-preserving person Re-ID system. Specifically, this article formulizes privacy-preserving person Re-ID as similarity metrics of encrypted feature vectors because the underlying operation of person Re-ID is to compute the similarity of feature vectors that are extracted from person images by a machine learning model. However, feature vectors are generally denoted by floating-point numbers. To this end, this article exploits a series of new encoding mechanisms and secure batch computing protocols to encrypt floating-point feature vectors and achieve the underlying operation of person Re-ID. Rigorous theoretical analyses demonstrate that this work achieves person Re-ID without compromising any personal image privacy. Furthermore, the proposed secure batch protocols significantly enhance the performance of privacy-preserving person Re-ID while outputting the same precision as the previous method.
format text
author ZHAO, Bowen
LI, Yingjiu
LIU, Ximeng
LI, Xiaoguo
PANG, Hwee Hwa
DENG, Robert H.
author_facet ZHAO, Bowen
LI, Yingjiu
LIU, Ximeng
LI, Xiaoguo
PANG, Hwee Hwa
DENG, Robert H.
author_sort ZHAO, Bowen
title Identifiable, but not visible: A privacy-preserving person reidentfication scheme
title_short Identifiable, but not visible: A privacy-preserving person reidentfication scheme
title_full Identifiable, but not visible: A privacy-preserving person reidentfication scheme
title_fullStr Identifiable, but not visible: A privacy-preserving person reidentfication scheme
title_full_unstemmed Identifiable, but not visible: A privacy-preserving person reidentfication scheme
title_sort identifiable, but not visible: a privacy-preserving person reidentfication scheme
publisher Institutional Knowledge at Singapore Management University
publishDate 2023
url https://ink.library.smu.edu.sg/sis_research/8112
_version_ 1779157158979436544