HOG feature extraction from encrypted images for privacy-preserving machine learning

04/29/2019
by   Masaki Kitayama, et al.
0

In this paper, we propose an extraction method of HOG (histograms-of-oriented-gradients) features from encryption-then-compression (EtC) images for privacy-preserving machine learning, where EtC images are images encrypted by a block-based encryption method proposed for EtC systems with JPEG compression, and HOG is a feature descriptor used in computer vision for the purpose of object detection and image classification. Recently, cloud computing and machine learning have been spreading in many fields. However, the cloud computing has serious privacy issues for end users, due to unreliability of providers and some accidents. Accordingly, we propose a novel block-based extraction method of HOG features, and the proposed method enables us to carry out any machine learning algorithms without any influence, under some conditions. In an experiment, the proposed method is applied to a face image recognition problem under the use of two kinds of classifiers: linear support vector machine (SVM), gaussian SVM, to demonstrate the effectiveness.

READ FULL TEXT
research
11/01/2019

Privacy-Preserving Machine Learning Using EtC Images

In this paper, we propose a novel privacy-preserving machine learning sc...
research
04/03/2021

Generation of Gradient-Preserving Images allowing HOG Feature Extraction

In this paper, we propose a method for generating visually protected ima...
research
10/21/2021

ML with HE: Privacy Preserving Machine Learning Inferences for Genome Studies

Preserving the privacy and security of big data in the context of cloud ...
research
04/23/2020

ArchNet: Data Hiding Model in Distributed Machine Learning System

Cloud computing services has become the de facto standard technique for ...
research
10/14/2020

Privacy-Preserving Object Detection Localization Using Distributed Machine Learning: A Case Study of Infant Eyeblink Conditioning

Distributed machine learning is becoming a popular model-training method...
research
09/19/2018

Privacy-Preserving SVM Computing by Using Random Unitary Transformation

A privacy-preserving Support Vector Machine (SVM) computing scheme is pr...
research
08/11/2020

Key-Nets: Optical Transformation Convolutional Networks for Privacy Preserving Vision Sensors

Modern cameras are not designed with computer vision or machine learning...

Please sign up or login with your details

Forgot password? Click here to reset