Blind Face Retrieval for Mobile Users

  • Xin Jin
  • Shiming GeEmail author
  • Chenggen Song
  • Le Wu
  • Hongbo Sun
Conference paper
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


Recently, cloud storage and processing have been widely adopted. Mobile users in one family or one team may automatically backup their photos to the same shared cloud storage space. The powerful face detector trained and provided by a 3rd party may be used to retrieve the photo collection which contains a specific group of persons from the cloud storage server. However, the privacy of the mobile users may be leaked to the cloud server providers. In the meanwhile, the copyright of the face detector should be protected. Thus, in this paper, we propose a protocol of privacy preserving face retrieval in the cloud for mobile users, which protects the user photos and the face detector simultaneously. The cloud server only provides the resources of storage and computing and cannot learn anything from the user photos and the face detector. We test our protocol inside several families and classes. The experimental results reveal that our protocol can successfully retrieve the proper photos from the cloud server and protect the user photos and the face detector.


Privacy preserving Face retrieval Cloud 



This work is partially supported by the National Natural Science Foundation of China (Grant Nos. 61772047, 61772513), the Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), and the Fundamental Research Funds for the Central Universities (Grant No. 328201803, 328201801).


  1. 1.
    Avidan, S., & Butman, M. (2006). Blind vision. In Proceedings of the 9th European Conference on Computer Vision – Volume Part III (pp. 1–13). Berlin: Springer.Google Scholar
  2. 2.
    Bost, R., Popa, R. A., Tu, S., & Goldwasser, S. (2015). Machine learning classification over encrypted data. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8–11, 2014.Google Scholar
  3. 3.
    Chu, C., Jung, J., Liu, Z., & Mahajan, R. (2014). sTRACK: Secure tracking in community surveillance. In Proceedings of the ACM International Conference on Multimedia, MM’14 (pp. 837–840). New York, NY: ACM.Google Scholar
  4. 4.
    Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES – the Advanced Encryption Standard. Berlin: Springer.CrossRefGoogle Scholar
  5. 5.
    Fanti, G. C., Finiasz, M., & Ramchandran, K. (2013). One-way private media search on public databases: The role of signal processing. IEEE Signal Processing Magazine, 30(2), 53–61.CrossRefGoogle Scholar
  6. 6.
    Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., et al. (2015). Applications and techniques in information security. In Proceedings of the 6th International Conference, ATIS 2015 – Color Image Encryption in CIE L*a*b* Space (pp. 74–85). Berlin: Springer.Google Scholar
  7. 7.
    Jin, X., Guo, K., Song, C., Li, X., Zhao, G., Luo, J., et al. (2016). Private video foreground extraction through chaotic mapping based encryption in the cloud. In Proceedings, Part I, of the 22nd International Conference on Multimedia Modeling (pp. 562–573). Berlin: Springer.Google Scholar
  8. 8.
    Jin, X., Wu, Y., Li, X., Li, Y., Zhao, G., & Guo, K. (2016). PPViBe: Privacy preserving background extractor via secret sharing in multiple cloud servers. In 8th International Conference on Wireless Communications & Signal Processing, WCSP 2016 (pp. 1–5). Piscataway: IEEE.Google Scholar
  9. 9.
    Jin, X., Yuan, P., Li, X., Song, C., Ge, S., Zhao, G., et al. (2017). Efficient privacy preserving Viola-Jones type object detection via random base image representation. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME) 2017. Piscataway: IEEE.Google Scholar
  10. 10.
    Osadchy, M., Pinkas, B., Jarrous, A., & Moskovich, B. (2010). SCiFI – a system for secure face identification. In 31st IEEE Symposium on Security and Privacy, S&P 2010 (pp. 239–254). Piscataway: IEEE.CrossRefGoogle Scholar
  11. 11.
    Shashank, J., Kowshik, P., Srinathan, K., & Jawahar, C.V. (2008). Private content based image retrieval. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008). Piscataway: IEEE.Google Scholar
  12. 12.
    Sohn, H., Plataniotis, K. N., & Ro, Y. M. (2010). Privacy-preserving watch list screening in video surveillance system. In Proceedings of the Advances in Multimedia Information Processing - PCM 2010 – 11th Pacific Rim Conference on Multimedia (pp. 622–632). Berlin: Springer.CrossRefGoogle Scholar
  13. 13.
    Upmanyu, M., Namboodiri, A. M., Srinathan, K., & Jawahar, C. V. (2009). Efficient privacy preserving video surveillance. In IEEE 12th International Conference on Computer Vision, ICCV 2009 (pp. 1639–1646). Piscataway: IEEE.CrossRefGoogle Scholar
  14. 14.
    Viola, P. A., & Jones, M. J. (2001). Robust real-time face detection. In IEEE 8th International Conference on Computer Vision, ICCV 2011 (p. 747). Piscataway: IEEE.Google Scholar
  15. 15.
    Viola, P. A., & Jones, M. J. (2004). Robust real-time face detection. International Journal of Computer Vision, 57(2), 137–154.CrossRefGoogle Scholar
  16. 16.
    Wong, W. K., Cheung, D. W. l., Kao, B., & Mamoulis, N. (2009). Secure kNN computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data (p. 139–152). New York, NY: ACM.Google Scholar
  17. 17.
    Wright, J., Yang, A. Y., Ganesh, A., Sastry, S. S., & Ma, Y. (2009). Robust face recognition via sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(2), 210–227.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Xin Jin
    • 1
    • 2
  • Shiming Ge
    • 3
    Email author
  • Chenggen Song
    • 4
  • Le Wu
    • 4
  • Hongbo Sun
    • 4
  1. 1.Department of Cyber SecurityBeijing Electronic Science and Technology InstituteBeijingChina
  2. 2.CETC Big Data Research Institute Co., Ltd.GuiyangChina
  3. 3.Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  4. 4.Beijing Electronic Science and Technology InstituteBeijingChina

Personalised recommendations