An image classification method that considers privacy-preservation

被引:6
|
作者
Liu, Chongwen [1 ,2 ]
Shang, Zhaowei [1 ,2 ]
Tang, Yuan Yan [3 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 630044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China
[3] Univ Macau, Fac Sci & Technol, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Image classification; Privacy-preservation; Ensemble system; REPRESENTATION; COMBINATION; EXTRACTION; SCENE;
D O I
10.1016/j.neucom.2016.04.056
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using images that are dispersed in a network can improve image classification performance; however, it is easy to leak the image holders' privacy. In this paper, we present a novel method that considers both image classification performance and the image holders' privacy-preservation. Our method contains four stages; the feature extraction stage follows the Bag-of-Features (BoF) framework, but it introduces significantly novel stages in the training, classification and ensemble stages. In the training stage, we split the image classification into many one-vs.-one classification problems; a set of binary classifiers as weak learners are learned on a local machine, to classify each image in an autonomous system. In the classification stage, a local machine sends features of unlabeled images to each image autonomous system, and then, each image autonomous system and local machine finish a prediction task under their own trained model. Afterward, the image autonomous systems send their prediction labels back to the local system. In the ensemble stage, we gather all of the prediction labels from the image autonomous systems and design an ensemble system to ensemble them into final classification results. This ensemble system must consider both the efficiency of the different trained models in each image autonomous system and the efficiency of the trained model on each class in the one-vs.-one classification problems. During the whole process, only the features of unlabeled images and prediction labels are transmitted in the network, which largely reduces the risk of privacy leakage. We conducted experiments on the network environment, to prove that our method has preferable performance. Our first experiment demonstrates that the performance of our method achieves state-of-the-art performance on four public dataset benchmarks, which shows that our method has competitive performance. The second experiment shows that our method achieves state-of-the-art performance with even fewer training samples, which means that there is less communication overhead and better privacy-preservation. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:80 / 98
页数:19
相关论文
共 50 条
  • [1] Privacy-Preservation for Gradient Descent Methods
    Wan, Li
    Han, Shuguo
    Ng, Wee Keong
    Lee, Vincent C. S.
    [J]. KDD-2007 PROCEEDINGS OF THE THIRTEENTH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2007, : 775 - +
  • [2] LSH-based Collaborative Recommendation Method with Privacy-Preservation
    Xu, Jiangmin
    Li, Xuansong
    Wang, Hao
    Dai, Hong-Ning
    Meng, Shunmei
    [J]. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 566 - 573
  • [3] Releasing the SVM Classifier with Privacy-Preservation
    Lin, Keng-Pei
    Chen, Ming-Syan
    [J]. ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, : 899 - 904
  • [4] Enabling Privacy-Preservation in Decentralized Optimization
    Zhang, Chunlei
    Wang, Yongqiang
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (02): : 679 - 689
  • [5] Blockchain privacy-preservation in Intelligent Transportation Systems
    Hirtan, Liviu-Adrian
    Dobre, Ciprian
    [J]. 2018 21ST IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2018), 2018, : 177 - 184
  • [6] Homomorphic Encryption Based Privacy-Preservation for IoMT
    Salim, Mikail Mohammed
    Kim, Inyeung
    Doniyor, Umarov
    Lee, Changhoon
    Park, Jong Hyuk
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (18):
  • [7] Groupchain: A Blockchain Model with Privacy-preservation and Supervision
    Li, Chunpei
    Wang, Li-e
    Xu, Qingting
    Li, Dongchen
    Liu, Peng
    Li, Xianxian
    [J]. HP3C 2020: PROCEEDINGS OF THE 2020 4TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS, 2020, : 42 - 49
  • [8] Biometrics and Privacy-Preservation: How Do They Evolve?
    Quang Nhat Tran
    Turnbull, Benjamin P.
    Hu, Jiankun
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 179 - 191
  • [9] Privacy-Preservation in the Integration and Querying of Multidimensional Data Models
    Kwakye, Michael Mireku
    Barker, Ken
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [10] Privacy-Preservation in Online Distributed Dual Averaging Optimization
    Wang, Wei
    Li, Dequan
    Wu, Xiongjun
    [J]. PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 5709 - 5714