Alice would like to detect faces in a collection of sensitive surveillance images she own. Bob has a face detection algorithm that he is willing to let Alice use, for a fee, as long as she learns nothing about his detector. Alice is willing to use Bob’s detector provided that he will learn nothing about her images, not even the result of the face detection operation. Blind vision is about applying secure multi-party techniques to vision algorithms so that Bob will learn nothing about the images he operates on, not even the result of his own operation and Alice will learn nothing about the detector. The proliferation of surveillance cameras raises privacy concerns that can be addressed by secure multi-party techniques and their adaptation to vision algorithms.
KeywordsHash Function Face Detection Secure Protocol Detection Window Vision Algorithm
Unable to display preview. Download preview PDF.
- 1.Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: WASDS2001: 7th International Workshop on Algorithms and Data Structures, Providence Rhode Island, USA, August 8-10, pp. 165–179 (2001)Google Scholar
- 2.Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: Proceedings of the 6th ACM conference on Computer and Communications Security, Singapore, November 1-4, pp. 120–127 (1999)Google Scholar
- 4.Dalal, N., Triggs, B.: Histograms of Oriented Gradients for Human Detection. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2005)Google Scholar
- 6.Goldreich, O.: Foundations of Cryptography (2004)Google Scholar
- 7.Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218–229 (1987)Google Scholar
- 11.Naor, M., Pinkas, B.: Oblivious Polynomial Evaluation. In: Proc. of the 31st Symp. on Theory of Computer Science (STOC), Atlanta, GA, May 1-4, pp. 245–254 (1999)Google Scholar
- 12.Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: Proc. of the twelfth annual ACM-SIAM symposium on Discrete algorithms, Washington, D.C., USA, pp. 448–457 (2001)Google Scholar
- 13.Rabin, M.O.: How to exchange secrets by oblivious transfer, Tech. Memo TR-81, Aiken Computation Laboratory (1981)Google Scholar
- 14.Schneier, B.: Applied Cryptography (1996)Google Scholar
- 15.Viola, P., Jones, M.: Rapid Object Detection using a Boosted Cascade of Simple Features. In: IEEE Conference on Computer Vision and Pattern Recognition, Hawaii (2001)Google Scholar
- 16.Yao, A.C.: How to generate and exchange secrets. In: 27th FOCS, pp. 162–167 (1986)Google Scholar