Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security 2016
DOI: 10.1145/2897845.2897861
|View full text |Cite
|
Sign up to set email alerts
|

SecHOG

Abstract: Abundant multimedia data generated in our daily life has intrigued a variety of very important and useful real-world applications such as object detection and recognition etc. Accompany with these applications, many popular feature descriptors have been developed, e.g., SIFT, SURF and HOG. Manipulating massive multimedia data locally, however, is a storage and computation intensive task, especially for resourceconstrained clients. In this work, we focus on exploring how to securely outsource the famous feature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…They achieve this by constructing special polynomial approximations of well-known machine learning algorithms that are more suitable for FHE applications [22]. Wang et al also present a system to privately outsource feature-extraction to the cloud using FHE by redesigning the Histogram-of-Gradients calculation to be more suitable for FHE [40].…”
Section: Hand-written Fhe Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…They achieve this by constructing special polynomial approximations of well-known machine learning algorithms that are more suitable for FHE applications [22]. Wang et al also present a system to privately outsource feature-extraction to the cloud using FHE by redesigning the Histogram-of-Gradients calculation to be more suitable for FHE [40].…”
Section: Hand-written Fhe Applicationsmentioning
confidence: 99%
“…It is however less known that despite this slowdown, there are scenarios where FHE can be practical or near-practical. For instance, Wang et al show a system to privately outsource feature-extraction to the cloud using FHE [40]. Their solution outperforms local computation for reasonably sized images, even with the overhead of FHE.…”
mentioning
confidence: 99%
“…Histogram of Oriented Gradien (HOG) forms the feature descriptors of an image by computing the gradient direction histogram of the local region 27 . Wang et al 28 presented a secure outsourcing computing scheme based on HOG. The scheme can be divided into two cases: single‐server and dual‐server.…”
Section: Introductionmentioning
confidence: 99%