Identifiable, but not visible: A privacy-preserving person reidentfication scheme
Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private dat...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2023
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/8112 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-9115 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-91152023-09-06T10:06:03Z Identifiable, but not visible: A privacy-preserving person reidentfication scheme ZHAO, Bowen LI, Yingjiu LIU, Ximeng LI, Xiaoguo PANG, Hwee Hwa DENG, Robert H. Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private data. To address these concerns, this article explores the first solution for building a privacy-preserving person Re-ID system. Specifically, this article formulizes privacy-preserving person Re-ID as similarity metrics of encrypted feature vectors because the underlying operation of person Re-ID is to compute the similarity of feature vectors that are extracted from person images by a machine learning model. However, feature vectors are generally denoted by floating-point numbers. To this end, this article exploits a series of new encoding mechanisms and secure batch computing protocols to encrypt floating-point feature vectors and achieve the underlying operation of person Re-ID. Rigorous theoretical analyses demonstrate that this work achieves person Re-ID without compromising any personal image privacy. Furthermore, the proposed secure batch protocols significantly enhance the performance of privacy-preserving person Re-ID while outputting the same precision as the previous method. 2023-04-06T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/8112 info:doi/10.1109/TR.2023.3258983 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Batch computation image privacy person Re-ID privacy-preserving identification secure computing Databases and Information Systems |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Batch computation image privacy person Re-ID privacy-preserving identification secure computing Databases and Information Systems |
spellingShingle |
Batch computation image privacy person Re-ID privacy-preserving identification secure computing Databases and Information Systems ZHAO, Bowen LI, Yingjiu LIU, Ximeng LI, Xiaoguo PANG, Hwee Hwa DENG, Robert H. Identifiable, but not visible: A privacy-preserving person reidentfication scheme |
description |
Person re-identification (Person Re-ID) is widely regarded as a promising technique to identify a target person through surveillance cameras in the wild. Nevertheless, person Re-ID leads to severe personal image privacy concerns as personal images are stipulated by laws and guidelines as private data. To address these concerns, this article explores the first solution for building a privacy-preserving person Re-ID system. Specifically, this article formulizes privacy-preserving person Re-ID as similarity metrics of encrypted feature vectors because the underlying operation of person Re-ID is to compute the similarity of feature vectors that are extracted from person images by a machine learning model. However, feature vectors are generally denoted by floating-point numbers. To this end, this article exploits a series of new encoding mechanisms and secure batch computing protocols to encrypt floating-point feature vectors and achieve the underlying operation of person Re-ID. Rigorous theoretical analyses demonstrate that this work achieves person Re-ID without compromising any personal image privacy. Furthermore, the proposed secure batch protocols significantly enhance the performance of privacy-preserving person Re-ID while outputting the same precision as the previous method. |
format |
text |
author |
ZHAO, Bowen LI, Yingjiu LIU, Ximeng LI, Xiaoguo PANG, Hwee Hwa DENG, Robert H. |
author_facet |
ZHAO, Bowen LI, Yingjiu LIU, Ximeng LI, Xiaoguo PANG, Hwee Hwa DENG, Robert H. |
author_sort |
ZHAO, Bowen |
title |
Identifiable, but not visible: A privacy-preserving person reidentfication scheme |
title_short |
Identifiable, but not visible: A privacy-preserving person reidentfication scheme |
title_full |
Identifiable, but not visible: A privacy-preserving person reidentfication scheme |
title_fullStr |
Identifiable, but not visible: A privacy-preserving person reidentfication scheme |
title_full_unstemmed |
Identifiable, but not visible: A privacy-preserving person reidentfication scheme |
title_sort |
identifiable, but not visible: a privacy-preserving person reidentfication scheme |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2023 |
url |
https://ink.library.smu.edu.sg/sis_research/8112 |
_version_ |
1779157158979436544 |