2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020
DOI: 10.1109/cvpr42600.2020.00942
|View full text |Cite
|
Sign up to set email alerts
|

ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 20 publications
0
12
0
Order By: Relevance
“…For instance, the conventional 𝑘-nearest neighbor algorithm was combined with DP [ 232 ] for privacy-preserving face attribute recognition and person reidentification. Homomorphic convolution was proposed by combining HE and secret sharing [ 233 ] for visual object detection, and adversarial perturbation was devised to prevent disclosure of biometric information in finger-selfie images [ 234 ].…”
Section: Resultsmentioning
confidence: 99%
“…For instance, the conventional 𝑘-nearest neighbor algorithm was combined with DP [ 232 ] for privacy-preserving face attribute recognition and person reidentification. Homomorphic convolution was proposed by combining HE and secret sharing [ 233 ] for visual object detection, and adversarial perturbation was devised to prevent disclosure of biometric information in finger-selfie images [ 234 ].…”
Section: Resultsmentioning
confidence: 99%
“…Since the CNN-based model considers both low-and high-frequency components, addressing high-frequency components in the frequency domain plays a significant role [13]. Several recent works have been introduced to solve various problems in the frequency domain instead of in the spatial domain [14,15]. In this paper, we propose a novel data augmentation method by filtering specific patterns in the frequency domain.…”
Section: Frequency Domain Data Augmentationmentioning
confidence: 99%
“…Our protocol guarantees that Alice learns only the segmentation results, while Bob learns nothing about the inputs from Alice. The security of the proposed protocol can be easily reduced to that of existing works [3,15], where any attack against BUNET will result in a non-negligible advantage against the ENSEI [3] and Gazelle [15] protocols.…”
Section: Threat Model and Securitymentioning
confidence: 99%
“…HomConv: The HomConv operator obliviously convolve two vectors u and w. A very recent work [3] discovered that, instead of the complex rotate-andaccumulate approach proposed by previous works [15], homomorphic convolution can be performed in the frequency domain, where the only computation needed in the homomorphic domain is the (homomorphic Hadamard product) operator. Therefore, the homomorphic convolution protocol proceeds as follows.…”
Section: The Cryptographic Building Blocksmentioning
confidence: 99%
See 1 more Smart Citation