CN110059630B - Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection - Google Patents

Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection Download PDF

Info

Publication number
CN110059630B
CN110059630B CN201910317372.XA CN201910317372A CN110059630B CN 110059630 B CN110059630 B CN 110059630B CN 201910317372 A CN201910317372 A CN 201910317372A CN 110059630 B CN110059630 B CN 110059630B
Authority
CN
China
Prior art keywords
storage server
cloud storage
authorized user
pedestrian
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910317372.XA
Other languages
Chinese (zh)
Other versions
CN110059630A (en
Inventor
程航
黄逸冰
方艳
王美清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou University
Original Assignee
Fuzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou University filed Critical Fuzhou University
Priority to CN201910317372.XA priority Critical patent/CN110059630B/en
Publication of CN110059630A publication Critical patent/CN110059630A/en
Application granted granted Critical
Publication of CN110059630B publication Critical patent/CN110059630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • G06V20/53Recognition of crowd images, e.g. recognition of crowd congestion

Abstract

The invention relates to a privacy-protecting verifiable outsourced monitoring video pedestrian re-identification method. Firstly, extracting effective pedestrian features by using a Convolutional Neural Network (CNN) and a kernel function-based supervised hash (KSH); then, a Hamming distance calculation protocol based on secret sharing is designed, so that a cloud server is allowed to calculate the similarity between ciphertext feature indexes; in addition, a verification mechanism based on the Merkle hash tree is provided, which allows a user to check the correctness of the matching result. The method of the invention protects the privacy of other non-related pedestrians and realizes the re-identification of the verified pedestrians of the outsourced monitoring video; and the information security of the video data is considered while the local calculation, communication overhead and file storage space are reduced.

Description

Privacy-protection verifiable outsourced monitoring video pedestrian re-identification method
Technical Field
The invention relates to a privacy-protecting verifiable outsourced monitoring video pedestrian re-identification method.
Background
With the increasing popularization of smart cities and digital home concepts, monitoring cameras have been widely adopted in our daily lives, and are generally installed in places such as highways, supermarkets, college campuses and the like. In particular, criminal activities and terrorist attacks have made security issues increasingly prominent, greatly facilitating the rapid growth of the surveillance camera market. In 2018, according to BBC news reports, China has deployed more than 1.7 hundred million monitoring cameras, and it is expected that in the next three years, 4 hundred million cameras will be installed[1]. Research and marks, as a world-known market Research institute, predicts that the video surveillance market will grow at a composite average growth rate of 11.8%, which is expected to grow from $ 183 billion in 2017 to $ 438 billion in 2025[2]
At present, video data from a monitoring camera is widely applied to the fields of traffic monitoring, crime evidence obtaining, activity detection and the like. Among them, re-identification of pedestrians as an important processing task for video data has attracted research interest of broad scholars and enterprises. The purpose of pedestrian re-identification in video data is to retrieve people of interest from different locations and different cameras[3](as shown in fig. 1). This means that it is possible to identify whether someone in one camera has appeared in other surveillance videos at different times and places. This task of pedestrian re-identification is currently widely used in many security-related fields, especially in the public safety field. For example, it can easily identify whether a suspect exists in different surveillance videos. Based on this information, the police can quickly grasp the whereabouts of the suspect. As the number of cameras continues to increase, the large amounts of video data generated greatly increases the storage and computing costs for the user. It is estimated that global surveillance video data exceeds 560PB per day[4]These huge amounts of video data are not processable by individuals or enterprises with limited resources.
The mass storage and strong computing power of the cloud server greatly reduce the large-scale data processing cost[5]. But the problem is that the user has no knowledge of the storage location of the packet data and whether the data has been tampered with. In this case, there is a risk that data security and privacy of the user are revealed. Encrypting data directly with a conventional encryption algorithm prior to outsourcing is a common method of ensuring confidentiality of data. However, it may prevent further processing of such encrypted data, such as pedestrian re-identification. Generally, a simple solution to employing secure pedestrian re-identification techniques is to download all encrypted video data and decrypt them to perform pedestrian re-identification locally. However, such operations introduce high computational and communication costs to the user. Therefore, how to effectively perform pedestrian re-identification and ensure that the confidentiality of video data is not leaked by encrypting the outsourced monitoring video becomes a task which needs to be solved urgently.
At present, signal processing on data of encrypted text and images has become a popular research field, and various research branches such as ciphertext text retrieval, ciphertext image compression, ciphertext domain reversible information hiding and the like successively appear. Compared with texts and images, the research on privacy protection data processing on videos is relatively less, and particularly the research on pedestrian re-identification of outsourced ciphertext monitoring videos is almost blank. Furthermore, another problem is that the cloud server may return a small fraction of the false match results for its malicious purpose, i.e. saving storage costs or hiding data corruption or loss incidents[6,7]. Currently, a feasible method for supporting privacy protection of a verifiable pedestrian re-identification scheme of outsourced monitoring video is still lacked in the field.
Reference documents:
[1]“Smart cameras catch man in 60,000crowd,”BBC News,April 13,2018,https://www.bbc.com/news/world-asia-china-43751276.
[2]“Video surveillance market to 2025-global analysis and forecasts by platforms(hardware and software),”https://www.researchandmarkets.com/research/zn5s9z/global videow=5.
[3]Y.-C.Chen,X.Zhu,W.-S.Zheng,and J.-H.Lai,“Person re-identification by camera correlation aware feature augmentation,”IEEE transactions on pattern analysis and machine intelligence,vol.40,no.2,pp.392–408,2018.
[4]L.Tian,H.Wang,Y.Zhou,and C.Peng,“Video big data in smart city:Background construction and optimization for surveillance video processing,”Future Generation Computer Systems,2018.
[5]X.Liu,R.Deng,K.-K.R.Choo,Y.Yang,and H.Pang,“Privacy-preserving outsourced calculation toolkit in the cloud,”IEEE Transactions on Dependable and Secure Computing,2018.
[6]W.Sun,S.Yu,W.Lou,Y.T.Hou,and H.Li,“Protecting your right:verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,”IEEE Transactions on Parallel and Distributed Systems,vol.27,no.4,pp.1187–1198,2016.
[7]Y.Miao,J.Weng,X.Liu,K.-K.R.Choo,Z.Liu,and H.Li,“Enabling verifiable multiple keywords search over encrypted cloud data,”Information Sciences,vol.465,pp.21–37,2018.。
disclosure of Invention
The invention aims to provide a method for identifying pedestrians in an outsourced surveillance video with verifiable privacy protection, which can protect the privacy of other non-related pedestrians and realize the pedestrian identification of the outsourced surveillance video with verifiable privacy protection; and the information security of the video data is considered while the local calculation, communication overhead and file storage space are reduced.
In order to realize the purpose, the technical scheme of the invention is as follows: a privacy-protecting verifiable outsourced monitoring video pedestrian re-identification method comprises the following steps:
step S1, firstly, extracting effective pedestrian feature vectors from a plaintext monitoring video by a content owner by using a convolutional neural network CNN and a kernel function-based supervision hash KSH, and constructing corresponding feature indexes; then, a content owner divides the feature index into n shares by adopting a secret sharing method based on a CRT and sends the n shares to a cloud data server, and in the process, all encrypted monitoring videos and corresponding identification numbers of the encrypted monitoring videos are outsourced to a cloud storage server;
step S2, the cloud storage server responds to the identification request of the content owner, provides storage service for the content owner, provides identification calculation and returns a monitoring video; in the step, the authorized user submits challenge information to the cloud storage server, and the cloud storage server is responsible for responding to the task of initiating the verification of the correctness of the matching result of the authorized user;
step S3, the cloud data server uses a part of the data storage space to store the shares submitted by the content owners; in addition, the cloud data server performs analog-to-digital addition operation on the shares and sends the calculated result to the cloud storage server;
step S4, the authorized user divides the inquired feature index into different parts and sends the different parts to the corresponding cloud data server at random, and after the returned result is obtained, the authorized user decrypts the index through the secret key to recover the plaintext video; in addition, the authorized user submits the initiated challenge information to the cloud storage server to verify the correctness of the returned data.
In an embodiment of the present invention, in step S1, a clear text surveillance video is set
Figure BDA0002033568360000031
Encrypt the corresponding ciphertext set as
Figure BDA0002033568360000032
Effective pedestrian feature vector
Figure BDA0002033568360000033
Extracted from the pedestrian image, the pedestrian image is a monitoring video from the plaintext
Figure BDA0002033568360000034
The acquired key frame.
In an embodiment of the present invention, in step S1, a specific implementation process in which a content owner splits a feature index into n shares by using a secret sharing method based on a CRT and sends the n shares to a cloud data server is as follows:
step S11, the content owner fills in z zeros
Figure BDA0002033568360000035
Therefore, the temperature of the molten metal is controlled,
Figure BDA0002033568360000036
will be extended to (d + z), denoted as
Figure BDA0002033568360000037
After step S12, the content owner randomly scrambles the feature vectors
Figure BDA0002033568360000038
Will replace the position of all elements of
Figure BDA0002033568360000039
Is converted into
Figure BDA00020335683600000310
Step S13, obtaining
Figure BDA00020335683600000311
When the content owner randomly selects a positive odd-number to replace 1 and a positive even-number to replace 0, where the range of selecting odd or even is set to [1, Γ],
Figure BDA00020335683600000312
1/0 in different positions may correspond to different odd/even numbers, all feature vectors being arranged according to the above-described replacement rule
Figure BDA00020335683600000313
Is modified into
Figure BDA00020335683600000314
Step S14, the content owner continues to modify
Figure BDA00020335683600000315
The value of the element; here, the telescoping technique is used for further protection
Figure BDA00020335683600000316
Is not leaked, the scale modification can be completed by the following method
u′=u·s+ε (4)
Wherein u is
Figure BDA0002033568360000041
The value of the middle element, s is a scale factor and takes the value as a positive number, epsilon is random noise, and the values are uniformly distributed, namely epsilon-U (0, gamma), (gamma is less than or equal to s); here, s is disclosed and allowed to follow
Figure BDA0002033568360000042
Elements are different and epsilon is private to the content owner; finally, each pedestrian image piIs modified to
Figure BDA0002033568360000043
Then, the content owner gets
Figure BDA0002033568360000044
As a pedestrian image piCharacteristic index of (1)iI.e. by
Figure BDA0002033568360000045
Step S15, after the characteristic preprocessing of the above steps, the content owner will IiShare in n
π(Ii)={Ii,1,Ii,2,…,Ii,n} (6)
Ii,j=Ii mod mj (7)
Where π (·) can be expressed as a splitting function based on a modulo operation, i.e., modmjWherein the number of elements is set { mj}1≤j≤nKnown to cloud data servers and cloud storage servers;
let IiThe w-th component of (A) is Ii(w) then its corresponding share is
π(Ii(w))={Ii,1(w),Ii,2(w),…,Ii,n(w)} (8)
Wherein the content of the first and second substances,
Ii,j(w)=Ii(w)mod mj (9)
step S16, finally, the content owner sets all encrypted video files C and ID to { ID ═ ID }1,…,idmUploading the data to a cloud storage server; furthermore, each of
Figure BDA0002033568360000047
The n shares are sent to the corresponding cloud data servers; the mapping relationship between these shares and the set D of cloud data servers is as follows:
Figure BDA0002033568360000046
in an embodiment of the present invention, in step S4, the specific implementation process that the authorized user splits the queried feature index into different parts and randomly sends them to the corresponding cloud data server is as follows:
feature index T for authorized user to queryQSplitting the part into n parts, and satisfying the following formula:
π(TQ)={TQ,1,TQ,2,…,TQ,n} (11)
and
π(TQ(w))={TQ,1(w),TQ,2(w),…,TQ,n(w)} (12)
TQ,j(w)=TQ(w)mod mj
wherein, TQ,j(w) is TQThe jth part of the w-th element of (1)
The user is then authorized to select from { T }Q,j}1≤j≤nAnd randomly selecting k shares and respectively and randomly sending the shares to k cloud data servers in the n cloud data servers.
In an embodiment of the present invention, in step S4, after the authorized user splits the queried feature index into different parts and randomly sends them to the corresponding cloud data server, the cloud data server and the cloud storage server execute the following steps:
the cloud data server performs and calculates processes:
feature index T for a given queryQAnd pedestrian image piIs indexed by
Figure BDA00020335683600000514
Activation by an authorized userjCloud data server is in module mjThe addition operation is performed, the sum of which is expressed as
Figure BDA0002033568360000051
Namely, it is
Figure BDA0002033568360000052
Wherein g represents the dimension of the feature index and is equal to d + z;
in calculating an arbitrary
Figure BDA0002033568360000053
Then, djThe cloud data server sends the intermediate value
Figure BDA0002033568360000054
Submitting to a cloud storage server;
the cloud storage server executes a similarity calculation process:
when k intermediate results of k cloud data servers are obtained
Figure BDA0002033568360000055
The cloud storage server will perform the following steps:
1) the cloud storage server firstly adopts a CRT method to reconstruct TQAnd each IiOriginal sum vector of
Figure BDA0002033568360000056
The cloud storage server then reduces the sum vector by the scaling factor s used in the feature pre-processing stage
Figure BDA0002033568360000057
Suppose that
Figure BDA0002033568360000058
Is { t }1,t2,…,tgAfter expansion, the
Figure BDA0002033568360000059
Specifically calculated by the following formula:
Figure BDA00020335683600000510
cloud storage server based on
Figure BDA00020335683600000511
Then Q and can be calculated
Figure BDA00020335683600000512
Hamming distance therebetween;
2) the cloud storage server performs ascending sequencing on all Hamming distances and returns the most relevant encrypted video set
Figure BDA00020335683600000513
And its corresponding identification set ID ═ ID'1,…,id′qGiving the authorized user.
In an embodiment of the present invention, in step S4, the specific implementation process that the authorized user submits the initiated challenge information to the cloud storage server to verify the correctness of the returned data is as follows:
(6-1) adopting an MAC method to set the ID number as IDi(i∈[1,m]) Encrypted video file ciGenerating the value of MAC with key k of MAC
Figure BDA0002033568360000061
Wherein MAC (-) is a secure MAC scheme; accordingly, more than one will be generated
Figure BDA0002033568360000062
As a MAC set of elements
Figure BDA0002033568360000063
Namely, it is
Figure BDA0002033568360000064
Thereafter, MAC aggregation
Figure BDA0002033568360000065
Outsourcing to a cloud storage server;
(6-2) upon receiving the pedestrian re-recognition result
Figure BDA0002033568360000066
Thereafter, the authorized user first selects from the collection
Figure BDA0002033568360000067
In the random selection of subsets
Figure BDA0002033568360000068
Wherein { li}1≤i≤tIndicating the selected encrypted video is
Figure BDA0002033568360000069
Q is less than or equal to t; the authorized user then challenges the information li}1≤i≤tSend to cloudA storage server;
(6-3), when obtaining the challenge request from the authorized user, the cloud storage server based on the challenge information { li}1≤i≤tConstructing two Merkle hash numbers for responding; in which MAC sets are assumed
Figure BDA00020335683600000610
Is a subset of the ciphertext video
Figure BDA00020335683600000611
A set of corresponding MACs; first, a Merkle hash tree MT is constructed, in which a hash function h is calledT:{0,1}*→{0,1}κTo calculate the hash values of all leaf nodes; for the intermediate node, the cloud storage server can obtain the hash value of the node by hashing the hash value obtained by combining the two direct child nodes of the intermediate node; if there is only one child node, the hash value of the parent node can be calculated by only hashing the hash value of the child node; in a similar manner, the cloud storage server may compute a hash value of the MT root node of the Merkle hash tree
Figure BDA00020335683600000612
And sending to an authorized user; in addition to the hash tree MT, the cloud storage server constructs a second hash tree CT, which is similar to the hash tree MT, except that the leaf nodes of the hash tree CT are directly encoded by the ciphertext video subset
Figure BDA00020335683600000613
As an input; also, a hash value of a root node is finally generated
Figure BDA00020335683600000614
And sending to an authorized user;
(6-4) upon reception
Figure BDA00020335683600000615
And
Figure BDA00020335683600000616
then, the authorized user correspondingly constructs two hash trees MT 'and CT', and respectively calculates the hash value of the root node
Figure BDA00020335683600000617
And
Figure BDA00020335683600000618
wherein the input MAC set of leaf nodes of the hash tree MT
Figure BDA00020335683600000619
Need to be calculated by an authorized user, i.e. by the MAC method
Figure BDA00020335683600000620
The generated set is the MAC value of
Figure BDA00020335683600000621
Wherein the key K involving the MAC is provided by the corresponding content owner in a shared manner; as for
Figure BDA00020335683600000622
Construction process of
Figure BDA00020335683600000623
The same as the above;
(6-5) authorized user through analysis
Figure BDA0002033568360000071
And corresponding
Figure BDA0002033568360000072
Judging whether the re-identification result of the pedestrian is correct or not according to the relationship; if it is not
Figure BDA0002033568360000073
The recognition result can be judged to be correct; if it is not
Figure BDA0002033568360000074
It can be determined that the returned recognition result is tampered by the third party; if it is not
Figure BDA0002033568360000075
And is
Figure BDA0002033568360000076
The recognition result is confirmed to be tampered by the cloud storage server.
Compared with the prior art, the invention has the following beneficial effects:
(1) the technology is a first attempt of obtaining privacy-protecting pedestrian re-identification through outsourcing monitoring videos, and the application allows users to store data of the users to a cloud server to obtain safe pedestrian re-identification service;
(2) safe Hamming distance calculation, the application constructs a novel safe Hamming distance protocol; the method allows the cloud server to calculate the Hamming distance on the ciphertext data, and the calculation process does not need to know the plaintext content;
(3) no key encryption, a key generation center is essential in general cryptosystems, which is responsible for managing and distributing the private keys of users. (ii) a However, over-reliance on key centers is highly prone to the problem of heavy key escrow; the present application is directed to allowing a user to encrypt a feature index in a keyless manner;
(4) the method has high precision and low cost, and the invariant pedestrian features are captured by adopting the function based on the CNN so as to obtain better matching performance; moreover, KSH techniques are used to reduce feature dimensions, thereby reducing storage and communication costs;
(5) and the verified pedestrian is identified again, and a double Merkle hash tree is developed by the application, so that the user is allowed to check the correctness of the matching result.
Drawings
FIG. 1 is a graph illustrating a pedestrian re-identification problem;
FIG. 2 is an infrastructure for pedestrian re-identification;
FIG. 3 is an overall framework of the method of the invention;
figure 4 is a verification mechanism based on a double Merkle hash tree.
Detailed Description
The technical scheme of the invention is specifically explained below with reference to the accompanying drawings.
The present invention provides an effective pedestrian re-identification method for privacy protection on outsourced surveillance video, which allows a cloud server to perform pedestrian re-identification tasks without knowing the plaintext content of the video data involved (e.g., video data and query information). In order to obtain effective high-precision retrieval performance, the scheme combines a CNN model and a KSH technology to capture effective characteristics in a video key frame in a binary form; in order to realize efficient and safe calculation among features, a Hamming distance safe calculation protocol aiming at binary expressed features is specially designed by utilizing a secret sharing technology based on the Chinese Remainder Theorem (CRT), so that the similarity among the features can be accurately calculated on the ciphertext features by a server; in addition, an identification result verification mechanism is constructed by utilizing the Merkle hash tree, so that a malicious server and a third party adversary cannot tamper the returned matching result, and the authorized user can judge whether the returned identification result is tampered by the server or the third party by utilizing the verification mechanism.
The invention specifically relates to a privacy-protecting verifiable outsourced monitoring video pedestrian re-identification method, which comprises the following steps:
step S1, firstly, extracting effective pedestrian feature vectors from a plaintext monitoring video by a content owner by using a convolutional neural network CNN and a kernel function-based supervision hash KSH, and constructing corresponding feature indexes; then, a content owner splits the feature index into n shares by adopting a secret sharing method based on CRT and sends the n shares to a cloud data server, and in the process, all encrypted monitoring videos and corresponding identification numbers thereof are outsourced to a cloud storage server;
step S2, the cloud storage server responds to the identification request of the content owner, provides storage service for the content owner, provides identification calculation and returns a monitoring video; in the step, the authorized user submits challenge information to the cloud storage server, and the cloud storage server is responsible for responding to the task of initiating the verification of the correctness of the matching result of the authorized user;
step S3, the cloud data server uses a part of the data storage space to store the shares submitted by the content owner; in addition, the cloud data server performs analog-to-digital addition operation on the shares and sends the calculated result to the cloud storage server;
step S4, the authorized user divides the inquired feature index into different parts and sends the different parts to the corresponding cloud data server at random, and after the returned result is obtained, the authorized user decrypts the index through the secret key to recover the plaintext video; in addition, the authorized user submits the initiated challenge information to the cloud storage server to verify the correctness of the returned data.
The following are specific embodiments of the present invention.
Hereinafter, CO means a content owner, CSS means a cloud storage server, CDS means a cloud data server, and AU means an authorized user.
Referring to fig. 2, the design of an infrastructure for pedestrian re-identification, according to its implementation elements, the present application proposes a safe pedestrian re-identification scheme in a cloud computing environment, which mainly includes four steps: content owners, cloud storage servers, cloud data servers, and authorized users.
The concrete implementation steps are as follows:
(1) and firstly, extracting a feature vector from the plain text surveillance video by a content owner, so that a corresponding feature index can be constructed. The content owner then sends the indexed share to the cloud data server using a CRT-based secret sharing method. While the process is generated, all encrypted monitoring videos and corresponding identification numbers thereof are outsourced to the cloud storage server.
(2) The cloud storage server mainly responds to the identification request of the content owner, provides storage service for the content owner, provides identification calculation and returns monitoring videos. In this step, the authorized user submits challenge information to the cloud storage server, and the cloud storage server is responsible for responding to the task of initiating the verification of the correctness of the matching result by the authorized user.
(3) The cloud data server may use some data storage space to store shares submitted by users. In addition, the cloud data server needs to have the computing capability of performing modular addition operation on the sharing of the feature index, and send the computed result to the cloud storage server.
(4) The authorized user splits the feature index of the query into different parts and sends them to the corresponding cloud data server at random, which does not involve a key. After the returned result is obtained, the authorized user can decrypt and recover the plaintext video by the aid of the secret key. In addition, the authorized user can submit the initiating challenge information to the cloud storage server to verify the correctness of the returned data.
The second embodiment:
assuming that the cloud server is an honest and curious model, the FARRIS (i.e., a set of efficient privacy protection pedestrian scheme) framework designed by the application can implement the task of re-identifying the privacy protection pedestrians by encrypting the outsourcing monitoring video.
The present application generally describes the infrastructure required for a pedestrian re-identification scheme in example one, and then further details of the implementation are described in the present application on the basis of example one. The special points are as follows:
(1) and a key rule: for video files, the present application employs traditional symmetric encryption (e.g., AES) to encrypt the outsourced surveillance video directly. In addition, the CRT-based secret sharing technology can realize the feature index keyless encryption of a content owner or an authorized user. The keyless nature will greatly reduce the cost of key management and storage, it may allow the user to split the data into multiple obfuscated portions, not involving encryption keys, and the original data may be reconstructed as long as a certain number of shares are aggregated.
(2) And index construction: as shown in step (r) of FIG. 3, the content owner will have all video files
Figure BDA0002033568360000091
Are encrypted one by one, and the corresponding ciphertext set is
Figure BDA0002033568360000092
Feature vector
Figure BDA0002033568360000093
Will be extracted from the pedestrian image, which is a video from the plain text
Figure BDA0002033568360000094
The acquired key frame. Next, preprocessing is performed to generate a feature index, which is performed to avoid leakage of feature vector information to the cloud data server and the cloud storage server. The content owner then splits each feature index into n shares using the CRT method.
More specifically, to achieve secure hamming distance calculation, some modifications should be made to the feature vectors in advance. The details are as follows:
(2-1), CO pack z zeros to
Figure BDA0002033568360000095
Therefore, the temperature of the molten metal is controlled,
Figure BDA0002033568360000096
will expand to (d + z), denoted as
Figure BDA0002033568360000097
This operation is mainly prevented from occurring
Figure BDA0002033568360000098
The dimension is small and is inferred by CSS in an exhaustive way from the phenomena of the original feature vectors.
(2-2) after the filling operation, CO randomly scrambles the feature vectors
Figure BDA0002033568360000099
The position of all elements of (a). The replacement operation is to
Figure BDA00020335683600000910
Is converted into
Figure BDA00020335683600000911
(2-3) obtaining
Figure BDA00020335683600000912
CO randomly selects positive odd to replace 1 and positive even to replace 0. Here, the range of selecting odd or even is set to [1, Γ ]]. It is noted that,
Figure BDA0002033568360000101
1/0 in different locations may correspond to different odd/even numbers. According to the above replacement rule, the CO will assign all feature vectors
Figure BDA0002033568360000102
Is modified to
Figure BDA0002033568360000103
The strategy of odd/even replacement aims at changing the fact that the number 1 or 0 always remains unchanged.
(2-4) after the third modification, CO continues to be modified
Figure BDA0002033568360000104
The value of the element. Here, the present application utilizes telescoping technology for further protection
Figure BDA0002033568360000105
Is not leaked. The scale modification can be accomplished by the following method
u′=u·s+ε (4)
Wherein u is
Figure BDA0002033568360000106
The value of the medium element, s is a scale factor and is a positive number, epsilon is random noise, and the values are uniformly distributed, namely epsilon-U (0, gamma), (gamma is less than or equal to s). Here, s is public and allowed to follow
Figure BDA0002033568360000107
The elements are different and epsilon is proprietary to CO. Finally, each person image piIs modified to
Figure BDA0002033568360000108
Then, CO is taken out
Figure BDA0002033568360000109
As a pedestrian image piCharacteristic index of (1)iI.e. by
Figure BDA00020335683600001010
This scaling step is to avoid that the parity of positive numbers may remain the same with a certain probability under modulo operation, resulting in that the CDS can deduce the original feature vector
Figure BDA00020335683600001011
1 and 0 in (1).
(2-5) after the characteristic pretreatment of the four modification steps, the CO will IiShare in n
π(Ii)={Ii,1,Ii,2,…,Ii,n} (6)
Ii,j=Ii mod mj (7)
Where π (. cndot.) can be expressed as a splitting function, which is based primarily on modulo arithmetic, i.e., mod mjIn which the number of elements is set { mj}1≤j≤nKnown for CDS and CSS.
In fact, IiAll components of (a) perform a pi operation in FARRIS, respectively. Let IiThe w-th component of (A) is Ii(w) then its corresponding share is
π(Ii(w))={Ii,1(w),Ii,2(w),…,Ii,n(w)} (8)
Wherein the content of the first and second substances,
Ii,j(w)=Ii(w)mod mj (9)
(2-6) finally, the CO will encrypt all video files
Figure BDA0002033568360000111
And ID ═ ID1,…,idmAre uploaded to the CSS together. In addition, each of
Figure BDA0002033568360000116
The n shares are sent to the respective CDS. These collections of sharing and CDS
Figure BDA0002033568360000112
The mapping relationship between the two is as follows:
Figure BDA0002033568360000113
(3) and query generation: as shown in step two of FIG. 3, index T is queriedQWill be generated using the four modifications described above prior to outsourcing. Similar to the splitting process of the CO index, the querying user will be TQThe separation into n parts meets the following requirements.
π(TQ)={TQ,1,TQ,2,…,TQ,n} (11)
And
π(TQ(w))={TQ,1(w),TQ,2(w),…,TQ,n(w)} (12)
TQ,j(w)=TQ(w)mod mj
wherein T isQ,j(w) is TQThe jth part of the w-th element of (a).
AU then follows { T }Q,j}1≤j≤nAnd randomly selecting k shares and respectively and randomly sending the shares to k CDSs in the n CDSs. In this case, the CSS need not actively send a request to the CDS with shares to obtain the reconstructed secret, since the k CDSs activated by the AU will automatically have them sentThe intermediate calculation result is sent to the CSS. The method avoids interaction between the CDSs and the CSS and reduces communication overhead.
(4) And calculating: once the query T is obtained from the querying user, step three of FIG. 3QFor the corresponding shares, the corresponding CDS starts to calculate the sum of its resulting query index share and all index shares stored thereon, respectively. Given a query index TQAnd any human image piIs indexed by
Figure BDA0002033568360000117
Dth activated by AUjCDS in mode mjThe addition operation is performed, the sum of which is expressed as
Figure BDA0002033568360000114
That is to say that the temperature of the molten steel,
Figure BDA0002033568360000115
where g represents the dimension of the feature index and is equal to d + z.
In calculating an arbitrary
Figure BDA0002033568360000121
Then, djCDS converts the intermediate value
Figure BDA0002033568360000122
Submitted to the CSS. Due to the final sum
Figure BDA0002033568360000123
Is done by the CSS of the FARRIS, so any one CDS is directed to
Figure BDA0002033568360000124
The values of (A) are unknown. Even though several CDSs may be in series with each other, only if the number of CDS involved is less than the threshold k,
Figure BDA0002033568360000125
value of (A)Is not leaked.
(5) And similarity calculation: when k intermediate results are obtained, as shown in step (r) of FIG. 3
Figure BDA0002033568360000126
The CSS will perform the following steps:
(5-1), CSS first reconstructs T using CRT methodQAnd each IiOriginal sum vector of
Figure BDA0002033568360000127
The CSS then reduces the sum vector according to the scale factor s used in the feature pre-processing stage
Figure BDA0002033568360000128
Suppose that
Figure BDA0002033568360000129
Is { t }1,t2,…,tgAfter expansion, the
Figure BDA00020335683600001210
Specifically calculated by the following formula
Figure BDA00020335683600001211
Although the CSS does not know the original feature vectors Q and
Figure BDA00020335683600001212
but it may still be based on
Figure BDA00020335683600001213
To calculate the hamming distance between them. In the following, the present application briefly introduces a calculation procedure:
as described in the index building algorithm of step (2),
Figure BDA00020335683600001214
is to pass the first three modifications during the feature vector preprocessingImprovement from
Figure BDA00020335683600001215
And (3) the product is obtained. Suppose Q' is a vector of query Q after the first three modifications have been preprocessed. Obviously, only when the random noise ε ≦ s,
Figure BDA00020335683600001216
exactly Q' and
Figure BDA00020335683600001217
the sum of (1). It is well known that the number of 1's in the sum of any two binary vectors of the same dimension is exactly equal to the hamming distance between them, and 1's are again odd numbers. This means that the hamming distance can be found by calculating the number of odd elements in the sum vector. Although Q' and after feature vector preprocessing
Figure BDA00020335683600001218
Significantly different from the corresponding original binary feature vectors, but the sum between them
Figure BDA00020335683600001219
The number of odd numbers in (b) remains unchanged. The main reason is the replacement rule in the index construction algorithm of the step (2)
Figure BDA00020335683600001220
The parity of the original binary vector elements is not changed. Furthermore, the odd number invariance is also not affected by the (2-1) padding zero modification step, since the even sum is still even. Based on the above analysis, CSS can be derived directly from the sum of their preprocessed feature vectors by counting the number of elements with odd values
Figure BDA00020335683600001221
To obtain Q and
Figure BDA00020335683600001222
hamming distance between.
(5-2) CSS DuchemSequencing the Hamming distance in an ascending order and returning the most relevant encrypted video set
Figure BDA00020335683600001223
And its corresponding identification set ID ═ ID'1,…,id′qGiving the authorized user.
(6) And verifying a matching result: in practical applications, the cloud server is more likely to follow a model that is semi-honest but curious and carries some malicious behavior. This means that the cloud server can forge or tamper with the matching result of the pedestrian re-identification. To address this problem, the present application provides FARRIS with a verifiable mechanism to strengthen it against models that are semi-honest but curious and carry part of the malicious behavior. In addition, the application considers that a third party adversary can distort the result in the transmission process, and also considers the fact that the CSS hides the true falsifier by means of the third party adversary tampering. In order to avoid ambiguity, the application designs an advanced verification mechanism based on a double Merkle hash tree, which is used for checking the correctness of the pedestrian re-identification result and determining a true determined falsifier from the CSS and a third party adversary when the verification fails. The key steps are as follows:
(6-1), the authentication mechanism of the present application herein uses Message Authentication Code (MAC) technology. MAC is a cryptographic primitive used to achieve message integrity and authentication. Firstly, the ID number is set as ID by the MAC methodi(i∈[1,m]) Encrypted video file ciGenerating the value of MAC with key k of MAC
Figure BDA0002033568360000131
Where MAC (-) is a secure MAC scheme (e.g., HMAC). Accordingly, more than one will be generated
Figure BDA0002033568360000132
As a MAC set of elements
Figure BDA0002033568360000133
Namely, it is
Figure BDA0002033568360000134
Thereafter, MAC aggregation
Figure BDA0002033568360000135
Outsourcing to CSS, which may be outsourced with all encrypted video files in step (2) the index construction algorithm.
(6-2) upon receiving the pedestrian re-recognition result
Figure BDA0002033568360000136
Thereafter, AU first from the set
Figure BDA0002033568360000137
In the random selection of subsets
Figure BDA0002033568360000138
Wherein { li}1≤i≤tIndicating the selected encrypted video is
Figure BDA0002033568360000139
And t is less than or equal to q. AU then challenges the information li}1≤i≤tTo the CSS.
(6-3), when obtaining challenge request from AU, CSS is based on challenge information { l }i}1≤i≤tTwo Merkle hash numbers were constructed to respond as shown in figure 4. In which MAC sets are assumed
Figure BDA00020335683600001310
Is a subset of the ciphertext video
Figure BDA00020335683600001311
A set of corresponding MACs. First, a Merkle hash tree MT is constructed, in which a hash function h is calledT:{0,1}*→{0,1}κTo compute the hash values of all leaf nodes (with the MAC value of the corresponding ciphertext video as input). For the intermediate node, the CSS may be obtained by hashing the hash value of the merged two immediate children of the CSSThe hash value of the node. If there is only one child node, the hash value of the parent node may be calculated by hashing only the hash value of the child node. In a similar manner, CSS may calculate a hash value of Merkle hash tree MT root node
Figure BDA00020335683600001312
And sent to the AU. In addition to the hash tree MT, the CSS constructs a second hash tree CT, which is similar to the hash tree MT except that the leaf nodes of the hash tree CT are directly encoded in ciphertext video subsets
Figure BDA00020335683600001313
As an input. Also, a hash value of a root node is finally generated
Figure BDA00020335683600001314
And sent to the AU.
(6-4) upon receipt
Figure BDA00020335683600001315
And
Figure BDA00020335683600001316
then, two hash trees MT 'and CT' are correspondingly constructed by AU, and the hash values of the root nodes are respectively calculated
Figure BDA0002033568360000141
And
Figure BDA0002033568360000142
wherein the input MAC set of leaf nodes of the hash tree MT
Figure BDA0002033568360000143
Need to be calculated by AU itself, i.e. by MAC method
Figure BDA0002033568360000144
The resulting set is the MAC value of
Figure BDA0002033568360000145
Where the key K involving the MAC is provided by the respective CO in a shared form. As for
Figure BDA0002033568360000146
Construction process of
Figure BDA0002033568360000147
The same applies.
(6-5) AU passage analysis
Figure BDA0002033568360000148
And corresponding
Figure BDA0002033568360000149
The relationship between the pedestrian and the pedestrian is used for judging whether the re-identification result of the pedestrian is correct or not. If it is not
Figure BDA00020335683600001410
The identification result can be judged to be correct; if it is used
Figure BDA00020335683600001411
It can be determined that the returned recognition result is tampered by the third party; if it is not
Figure BDA00020335683600001412
And is
Figure BDA00020335683600001413
It is confirmed that the recognition result is falsified by the CSS.
The invention is characterized in that:
the method has two aspects of characteristics: the method comprises the steps of cooperatively considering two links of monitoring video data security and pedestrian re-identification, researching privacy protection and subsequent similarity measurement calculation of video data and pedestrian feature content, and solving the contradiction between the video data security and the outsourced pedestrian re-identification task; and secondly, the verification problem of the correctness of the identification result is converted into the judgment of the hash value of the root node of the hash tree, and two services of data integrity verification and source tampering judgment can be provided.
The above are preferred embodiments of the present invention, and all changes made according to the technical scheme of the present invention that produce functional effects do not exceed the scope of the technical scheme of the present invention belong to the protection scope of the present invention.

Claims (5)

1. A privacy-protecting verifiable outsourced monitoring video pedestrian re-identification method is characterized by comprising the following steps:
step S1, firstly, extracting effective pedestrian feature vectors from a plaintext monitoring video by a content owner by using a convolutional neural network CNN and a kernel function-based supervision hash KSH, and constructing corresponding feature indexes; then, a content owner divides the feature index into n shares by adopting a secret sharing method based on a CRT and sends the n shares to a cloud data server, and in the process, all encrypted monitoring videos and corresponding identification numbers thereof are outsourced to a cloud storage server;
step S2, the cloud storage server responds to the identification request of the content owner, provides storage service for the content owner, provides identification calculation and returns a monitoring video; in the step, the authorized user submits challenge information to the cloud storage server, and the cloud storage server is responsible for responding to the task of initiating the verification of the correctness of the matching result of the authorized user;
step S3, the cloud data server uses a part of the data storage space to store the shares submitted by the content owner; in addition, the cloud data server performs analog-to-digital addition operation on the shares and sends the calculated result to the cloud storage server;
step S4, the authorized user divides the inquired feature index into different parts and sends the different parts to the corresponding cloud data server at random, and after the returned result is obtained, the authorized user decrypts the index through the secret key to recover the plaintext video; in addition, the authorized user submits the initiated challenge information to the cloud storage server to verify the correctness of the returned data;
in step S4, the specific implementation process that the authorized user submits the initiated challenge information to the cloud storage server to verify the correctness of the returned data is as follows:
(6-1) adopting an MAC method to set the ID number as IDi,i∈[1,m]Encrypted video file ciGenerating the value of MAC with key k of MAC
Figure FDA0003576809950000011
Wherein MAC (-) is a secure MAC scheme; accordingly, more than one will be generated
Figure FDA0003576809950000012
As a MAC set of elements
Figure FDA0003576809950000013
Namely, it is
Figure FDA0003576809950000014
Thereafter, MAC aggregation
Figure FDA0003576809950000015
Outsourcing to a cloud storage server;
(6-2) upon receiving the pedestrian re-recognition result
Figure FDA0003576809950000016
Thereafter, the authorized user first selects from the collection
Figure FDA0003576809950000017
In the random selection of subsets
Figure FDA0003576809950000018
Wherein { li}1≤i≤tIndicating the selected encrypted video is
Figure FDA0003576809950000019
Q is less than or equal to t; the authorized user then challenges the information li}1≤i≤tSending the data to a cloud storage server;
(6-3), when obtaining the challenge request from the authorized user, the cloud storage server based on the challenge information { li}1≤i≤tConstructing two Merkle hash trees for response; in which MAC sets are assumed
Figure FDA00035768099500000110
Is a subset of the ciphertext video
Figure FDA00035768099500000111
A set of corresponding MACs; first, a Merkle hash tree MT is constructed, in which a hash function h is calledT:{0,1}*→{0,1}κTo calculate the hash values of all leaf nodes; for the intermediate node, the cloud storage server obtains the hash value of the node by hashing the hash value obtained by combining the two direct child nodes of the intermediate node; if there is only one child node, calculating the hash value of the parent node only by hashing the hash value of the child node; in a similar manner, the cloud storage server may compute a hash value of the MT root node of the Merkle hash tree
Figure FDA0003576809950000021
And sending to an authorized user; in addition to the hash tree MT, the cloud storage server constructs a second hash tree CT, which is similar to the hash tree MT, except that the leaf nodes of the hash tree CT are directly encoded in the ciphertext video subset
Figure FDA0003576809950000022
As an input; also, a hash value of a root node is finally generated
Figure FDA0003576809950000023
And sending to an authorized user;
(6-4) upon reception
Figure FDA0003576809950000024
And
Figure FDA0003576809950000025
later, the authorized user correspondingly constructs two hayesThe Highenki MT 'and CT' respectively calculate the hash value of the root node
Figure FDA0003576809950000026
And
Figure FDA0003576809950000027
wherein the input MAC set of leaf nodes of the hash tree MT
Figure FDA0003576809950000028
Need to be calculated by an authorized user, i.e. by the MAC method
Figure FDA0003576809950000029
The generated set is the MAC value of
Figure FDA00035768099500000210
Wherein the key K involving the MAC is provided by the corresponding content owner in a shared manner; as for
Figure FDA00035768099500000211
Construction process of
Figure FDA00035768099500000212
The same as the above;
(6-5) authorized user through analysis
Figure FDA00035768099500000213
And corresponding
Figure FDA00035768099500000214
Judging whether the re-identification result of the pedestrian is correct or not according to the relationship; if it is used
Figure FDA00035768099500000215
Judging that the identification result is correct; if it is not
Figure FDA00035768099500000216
It can be determined that the returned recognition result is tampered by the third party; if it is not
Figure FDA00035768099500000217
And is
Figure FDA00035768099500000218
The recognition result is confirmed to be tampered by the cloud storage server.
2. The privacy-preserving verifiable outsourced surveillance video pedestrian re-identification method of claim 1, wherein in step S1, a clear surveillance video is provided
Figure FDA00035768099500000219
Encrypt the corresponding ciphertext set as
Figure FDA00035768099500000220
Effective pedestrian feature vector
Figure FDA00035768099500000221
Extracted from the pedestrian image, the pedestrian image is a monitoring video from the plaintext
Figure FDA00035768099500000222
The acquired key frame.
3. The privacy-preserving verifiable outsourced surveillance video pedestrian re-identification method according to claim 2, wherein in step S1, the specific implementation process of splitting the feature index into n shares by the content owner using the CRT-based secret sharing method and sending the n shares to the cloud data server is as follows:
step S11, the content owner fills in z zeros
Figure FDA00035768099500000223
Therefore, the temperature of the molten metal is controlled,
Figure FDA00035768099500000224
will extend to d + z, denoted as
Figure FDA00035768099500000225
After step S12, the content owner randomly scrambles the feature vectors
Figure FDA00035768099500000226
Will replace the position of all elements of
Figure FDA00035768099500000227
Is converted into
Figure FDA00035768099500000228
Step S13, obtaining
Figure FDA0003576809950000031
When the content owner randomly selects a positive odd-number to replace 1 and a positive even-number to replace 0, where the range of selecting odd or even is set to [1, Γ],
Figure FDA0003576809950000032
1/0 in different positions of (a) correspond to different odd/even numbers, all feature vectors are substituted according to an alternative rule
Figure FDA0003576809950000033
Is modified into
Figure FDA0003576809950000034
Step S14, the content owner continues to modify
Figure FDA0003576809950000035
The value of the element; here, the telescoping technique is used for further protection
Figure FDA0003576809950000036
Is not leaked, and the scale modification is performed by the following method
u′=u·s+ε (4)
Wherein u is
Figure FDA0003576809950000037
The value of the middle element, s is a scale factor and takes the value as a positive number, epsilon is random noise, the values are uniformly distributed, namely epsilon-U (0, gamma), and gamma is less than or equal to s; here, s is disclosed and allowed to follow
Figure FDA0003576809950000038
Elements are different and epsilon is private to the content owner; finally, each pedestrian image piIs modified to
Figure FDA0003576809950000039
Then, the content owner gets
Figure FDA00035768099500000310
As a pedestrian image piCharacteristic index of (1)iI.e. by
Figure FDA00035768099500000311
Step S15, after the characteristic preprocessing of the above steps, the content owner will IiShare in n
π(Ii)={Ii,1,Ii,2,…,Ii,n} (6)
Ii,j=Ii mod mj (7)
Where π (·) can be expressed as a splitting function based on a modulo operation, i.e., mod mjIn which the number of elements is set { mj}1≤j≤nKnown to cloud data servers and cloud storage servers;
let IiThe w-th component of (A) is Ii(w) then their corresponding share is
π(Ii(w))={Ii,1(w),Ii,2(w),…,Ii,n(w)} (8)
Wherein the content of the first and second substances,
Ii,j(w)=Ii(w)mod mj (9)
step S16, finally, the content owner encrypts all the encrypted video files
Figure FDA00035768099500000312
And ID ═ ID1,…,idmUploading the data to a cloud storage server; in addition, each IiN shares of i ≦ 1 ≦ l are sent to the corresponding cloud data servers; these collections of sharing and cloud data servers
Figure FDA0003576809950000041
The mapping relationship between the two is as follows:
Figure FDA0003576809950000042
4. the privacy-preserving verifiable outsourced surveillance video pedestrian re-identification method according to claim 3, wherein in the step S4, the specific implementation process of splitting the queried feature index into different parts by the authorized user and randomly sending them to the corresponding cloud data server is as follows:
feature index T for authorized user to queryQSplitting the part into n parts, and satisfying the following formula:
π(TQ)={TQ,1,TQ,2,…,TQ,n} (11)
and
π(TQ(w))={TQ,1(w),TQ,2(w),…,TQ,n(w)} (12)
TQ,j(w)=TQ(w)mod mj
wherein, TQ,j(w) is TQThe jth part of the w-th element of (1)
The user is then authorized to select from { T }Q,j}1≤j≤nAnd randomly selecting k shares and respectively and randomly sending the shares to k cloud data servers in the n cloud data servers.
5. The privacy-preserving verifiable outsourced surveillance video pedestrian re-identification method of claim 4, wherein in step S4, after the authorized user splits the queried feature index into different parts and sends them to the corresponding cloud data server at random, the cloud data server and the cloud storage server perform the following steps:
the cloud data server performs and calculates processes:
feature index T for a given queryQAnd a pedestrian image piIndex I ofi(1. ltoreq. i. ltoreq.l), d-th activated by an authorized userjCloud data server on module mjThe addition operation is performed, the sum of which is expressed as
Figure FDA0003576809950000043
Namely, it is
Figure FDA0003576809950000044
Wherein g represents the dimension of the feature index and is equal to d + z;
in calculating an arbitrary
Figure FDA0003576809950000045
Then, djThe cloud data server sends the intermediate value
Figure FDA0003576809950000046
Submitting to a cloud storage server;
the cloud storage server executes a similarity calculation process:
when k intermediate results of k cloud data servers are obtained
Figure FDA0003576809950000051
The cloud storage server will perform the following steps:
1) the cloud storage server firstly adopts a CRT method to reconstruct TQAnd each IiOriginal sum vector of
Figure FDA0003576809950000052
The cloud storage server then reduces the sum vector by the scaling factor s used in the feature pre-processing stage
Figure FDA0003576809950000053
Suppose that
Figure FDA0003576809950000054
Is { t }1,t2,…,tgAfter expansion, the
Figure FDA0003576809950000055
Specifically calculated by the following formula:
Figure FDA0003576809950000056
cloud storage server based on
Figure FDA0003576809950000057
Then Q and can be calculated
Figure FDA0003576809950000058
Hamming distance therebetween;
2) the cloud storage server performs ascending sequencing on all Hamming distances and returns the most relevant encrypted video set
Figure FDA0003576809950000059
And its corresponding identification set ID ═ ID'1,…,id′qGiving the authorized user.
CN201910317372.XA 2019-04-19 2019-04-19 Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection Active CN110059630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910317372.XA CN110059630B (en) 2019-04-19 2019-04-19 Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910317372.XA CN110059630B (en) 2019-04-19 2019-04-19 Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection

Publications (2)

Publication Number Publication Date
CN110059630A CN110059630A (en) 2019-07-26
CN110059630B true CN110059630B (en) 2022-06-14

Family

ID=67319767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910317372.XA Active CN110059630B (en) 2019-04-19 2019-04-19 Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection

Country Status (1)

Country Link
CN (1) CN110059630B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291411B (en) * 2020-02-13 2022-12-23 福州大学 Safe video anomaly detection system and method based on convolutional neural network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN106980641A (en) * 2017-02-09 2017-07-25 上海交通大学 The quick picture retrieval system of unsupervised Hash and method based on convolutional neural networks
CN108768951A (en) * 2018-05-03 2018-11-06 上海海事大学 The data encryption of protection file privacy and search method under a kind of cloud environment
CN109104440A (en) * 2018-10-22 2018-12-28 青岛大学 The cloud storage big data integrity verification method of internet of things oriented mobile terminal device
CN109145829A (en) * 2018-08-24 2019-01-04 中共中央办公厅电子科技学院 A kind of safe and efficient face identification method based on deep learning and homomorphic cryptography

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN106980641A (en) * 2017-02-09 2017-07-25 上海交通大学 The quick picture retrieval system of unsupervised Hash and method based on convolutional neural networks
CN108768951A (en) * 2018-05-03 2018-11-06 上海海事大学 The data encryption of protection file privacy and search method under a kind of cloud environment
CN109145829A (en) * 2018-08-24 2019-01-04 中共中央办公厅电子科技学院 A kind of safe and efficient face identification method based on deep learning and homomorphic cryptography
CN109104440A (en) * 2018-10-22 2018-12-28 青岛大学 The cloud storage big data integrity verification method of internet of things oriented mobile terminal device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Person Re-Identification over Encrypted Outsourced Surveillance Videos;Cheng, Hang et al.;《IEEE Transactions on Dependable and Secure Computing》;20190620;第18卷(第3期);全文 *
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data;Fu, Zhangjie et al.;《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》;20170412;第12卷(第8期);全文 *
协同监控系统中视觉隐私保护技术研究;罗永松;《中国优秀硕士学位论文全文数据库 信息科技辑》;20190215(第2期);全文 *
基于SGX的人脸识别隐私保护方案的设计与实现;孙思;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20190115(第1期);全文 *

Also Published As

Publication number Publication date
CN110059630A (en) 2019-07-26

Similar Documents

Publication Publication Date Title
Zhang et al. PIC: Enable large-scale privacy preserving content-based image search on cloud
Yuan et al. Efficient privacy-preserving biometric identification in cloud computing
US10635824B1 (en) Methods and apparatus for private set membership using aggregation for reduced communications
CN106803784A (en) The multi-user based on lattice is fuzzy in secure multimedia cloud storage can search for encryption method
CN110413652B (en) Big data privacy retrieval method based on edge calculation
Li et al. Secure and verifiable multikey image search in cloud-assisted edge computing
CN113094747A (en) Image searching method, block chain, cloud server and image searching device
CN110674941B (en) Data encryption transmission method and system based on neural network
Yiu et al. Outsourcing search services on private spatial data
US20230306131A1 (en) Systems and methods for tracking propagation of sensitive data
CN115037556B (en) Authorized sharing method for encrypted data in smart city system
CN111339539A (en) Efficient encrypted image retrieval method under multi-user environment
Khazbak et al. TargetFinder: A privacy preserving system for locating targets through IoT cameras
Siddiqui et al. Secure data provenance in IoT network using bloom filters
Suganya et al. Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
CN110059630B (en) Verifiable outsourced monitoring video pedestrian re-identification method with privacy protection
CN107609425B (en) Safe Top-k query method and device for double-layer sensor network
Li et al. BEIR: A blockchain-based encrypted image retrieval scheme
Lv et al. A review of big data security and privacy protection technology
Yang et al. Mu-teir: Traceable encrypted image retrieval in the multi-user setting
Dawar Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks
CN110619229A (en) Data encryption transmission method and system based on neural network splitting
Li et al. Efficient and traceable data sharing for the Internet of Things in smart cities
Fan et al. Cloud-based lightweight RFID healthcare privacy protection protocol
Agarwala et al. Client side secure image deduplication using DICE protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant