2017
DOI: 10.1007/978-3-319-72359-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…In the last step, the client decrypts and recovers the feature descriptors combining both portions returned from the servers. Utilizing a more efficient homomorphic method (i.e., vector homomorphic encryption (VHE) [257]), Yang et al [240] also proposed a privacy-preserving scheme for extracting HOG features. The encryption is performed directly on the image vectors, which can be well applied for image processing.…”
Section: ) Image Feature Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the last step, the client decrypts and recovers the feature descriptors combining both portions returned from the servers. Utilizing a more efficient homomorphic method (i.e., vector homomorphic encryption (VHE) [257]), Yang et al [240] also proposed a privacy-preserving scheme for extracting HOG features. The encryption is performed directly on the image vectors, which can be well applied for image processing.…”
Section: ) Image Feature Extractionmentioning
confidence: 99%
“…In the protocols, SURF and HOG tasks are implemented over rational and fixed-point binary numbers, respectively. Experimental evaluations demonstrated that the proposed solutions [239], [240], and [241] reach comparable performance to the original HOG solution.…”
Section: ) Image Feature Extractionmentioning
confidence: 99%
“…The HOG descriptor is one of the most popular approaches for object detection. It is invariant to illumination and geometric transformations and it has been successfully applied to many security applications, such as privacy in image feature extraction using homomorphic encryption [40], phishing detection [41], classification of sensitive information embedded within uploaded photos [42], handwritten digits recognition [43], facial expression recognition with CNNs [44] and, particularly, to face spoofing detection [11,[45][46][47][48]. Due to its popularity in anti-spoofing detection, in this work a variant of the HOG descriptor will be presented and experimentally validated.…”
Section: Related Workmentioning
confidence: 99%
“…The methods are classified into two types: perceptual encryption-based type [2][3][4][5] and homomorphic encryption (HE)-based one. [6][7][8][9] In recent years, considerable efforts have been made in the fields of fully HE and multi-party computation. 10 Some attempts with HE-based one have been made on learning.…”
Section: Introductionmentioning
confidence: 99%
“…10 Some attempts with HE-based one have been made on learning. [6][7][8][9] However, HE-based schemes require algorithms specialized for computing encrypted data be prepared, and high computational complexity. 7 In addition, it is also difficult to maintain high computational accuracy.…”
Section: Introductionmentioning
confidence: 99%