Blind Vision

  • Shai Avidan
  • Moshe Butman
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3953)


Alice would like to detect faces in a collection of sensitive surveillance images she own. Bob has a face detection algorithm that he is willing to let Alice use, for a fee, as long as she learns nothing about his detector. Alice is willing to use Bob’s detector provided that he will learn nothing about her images, not even the result of the face detection operation. Blind vision is about applying secure multi-party techniques to vision algorithms so that Bob will learn nothing about the images he operates on, not even the result of his own operation and Alice will learn nothing about the detector. The proliferation of surveillance cameras raises privacy concerns that can be addressed by secure multi-party techniques and their adaptation to vision algorithms.


Hash Function Face Detection Secure Protocol Detection Window Vision Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: WASDS2001: 7th International Workshop on Algorithms and Data Structures, Providence Rhode Island, USA, August 8-10, pp. 165–179 (2001)Google Scholar
  2. 2.
    Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: Proceedings of the 6th ACM conference on Computer and Communications Security, Singapore, November 1-4, pp. 120–127 (1999)Google Scholar
  3. 3.
    Chang, Y.C., Lu, C.J.: Oblivious polynomial evaluation and oblivious neural learning. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 369. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Dalal, N., Triggs, B.: Histograms of Oriented Gradients for Human Detection. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2005)Google Scholar
  5. 5.
    Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM 28, 637–647 (1985)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Goldreich, O.: Foundations of Cryptography (2004)Google Scholar
  7. 7.
    Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218–229 (1987)Google Scholar
  8. 8.
    Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145–161. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
    Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 36. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  10. 10.
    Lowe, D.G.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision 60(2), 91–110 (2004)CrossRefGoogle Scholar
  11. 11.
    Naor, M., Pinkas, B.: Oblivious Polynomial Evaluation. In: Proc. of the 31st Symp. on Theory of Computer Science (STOC), Atlanta, GA, May 1-4, pp. 245–254 (1999)Google Scholar
  12. 12.
    Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: Proc. of the twelfth annual ACM-SIAM symposium on Discrete algorithms, Washington, D.C., USA, pp. 448–457 (2001)Google Scholar
  13. 13.
    Rabin, M.O.: How to exchange secrets by oblivious transfer, Tech. Memo TR-81, Aiken Computation Laboratory (1981)Google Scholar
  14. 14.
    Schneier, B.: Applied Cryptography (1996)Google Scholar
  15. 15.
    Viola, P., Jones, M.: Rapid Object Detection using a Boosted Cascade of Simple Features. In: IEEE Conference on Computer Vision and Pattern Recognition, Hawaii (2001)Google Scholar
  16. 16.
    Yao, A.C.: How to generate and exchange secrets. In: 27th FOCS, pp. 162–167 (1986)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Shai Avidan
    • 1
  • Moshe Butman
    • 2
  1. 1.Mitsubishi Electric Research LabsCambridgeUSA
  2. 2.Department of Computer ScienceBar-Ilan UniversityRamat-GanIsrael

Personalised recommendations