• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Cheng, Hang (Cheng, Hang.) [1] | Wang, Huaxiong (Wang, Huaxiong.) [2] | Liu, Ximeng (Liu, Ximeng.) [3] | Fang, Yan (Fang, Yan.) [4] | Wang, Meiqing (Wang, Meiqing.) [5] | Zhang, Xiaojun (Zhang, Xiaojun.) [6]

Indexed by:

EI

Abstract:

Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs have posed a great challenge for the resource-constrained users. In recent years, the cloud storage services have made a large volume of video data outsourcing become possible. However, person Re-ID over outsourced surveillance videos could lead to a security threat, i.e., the privacy leakage of the innocent person in these videos. Therefore, we propose an efFicient privAcy-preseRving peRson Re-ID Scheme (FARRIS) over outsourced surveillance videos, which can ensure the privacy of the detected person while providing the person Re-ID service. Specifically, FARRIS exploits the convolutional neural network (CNN) and kernels based supervised hashing (KSH) to extract the efficient person Re-ID feature. Then, we design a secret sharing based Hamming distance computation protocol to allow cloud servers to calculate similarities among obfuscated feature indexes. Furthermore, a dual Merkle hash trees based verification is proposed, which permits users to validate the correctness of the matching results. The extensive experimental results and security analysis demonstrate that FARRIS can work efficiently, without compromising the privacy of the involved person. © 2004-2012 IEEE.

Keyword:

Cameras Convolutional neural networks Cryptography Data privacy Data structures Digital storage Forestry Hamming distance Monitoring Rhenium compounds Security systems Servers Space surveillance Storage as a service (STaaS)

Community:

  • [ 1 ] [Cheng, Hang]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian; 350108, China
  • [ 2 ] [Cheng, Hang]State Key Laboratory of Cryptology, P.O. Box 5159, Beijing; 100878, China
  • [ 3 ] [Cheng, Hang]School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore; 639798, Singapore
  • [ 4 ] [Wang, Huaxiong]School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore; 639798, Singapore
  • [ 5 ] [Liu, Ximeng]Key Lab of Information Security of Network Systems, College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian; 350108, China
  • [ 6 ] [Fang, Yan]College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou; 350002, China
  • [ 7 ] [Wang, Meiqing]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian; 350108, China
  • [ 8 ] [Zhang, Xiaojun]School of Computer Science, Southwest Petroleum University, Chengdu; 610500, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2021

Issue: 3

Volume: 18

Page: 1456-1473

6 . 7 9 1

JCR@2021

7 . 0 0 0

JCR@2023

ESI HC Threshold:106

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 24

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:429/10378701
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1