An image classification method that considers privacy-preservation

被引:6
|
作者
Liu, Chongwen [1 ,2 ]
Shang, Zhaowei [1 ,2 ]
Tang, Yuan Yan [3 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 630044, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China
[3] Univ Macau, Fac Sci & Technol, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Image classification; Privacy-preservation; Ensemble system; REPRESENTATION; COMBINATION; EXTRACTION; SCENE;
D O I
10.1016/j.neucom.2016.04.056
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using images that are dispersed in a network can improve image classification performance; however, it is easy to leak the image holders' privacy. In this paper, we present a novel method that considers both image classification performance and the image holders' privacy-preservation. Our method contains four stages; the feature extraction stage follows the Bag-of-Features (BoF) framework, but it introduces significantly novel stages in the training, classification and ensemble stages. In the training stage, we split the image classification into many one-vs.-one classification problems; a set of binary classifiers as weak learners are learned on a local machine, to classify each image in an autonomous system. In the classification stage, a local machine sends features of unlabeled images to each image autonomous system, and then, each image autonomous system and local machine finish a prediction task under their own trained model. Afterward, the image autonomous systems send their prediction labels back to the local system. In the ensemble stage, we gather all of the prediction labels from the image autonomous systems and design an ensemble system to ensemble them into final classification results. This ensemble system must consider both the efficiency of the different trained models in each image autonomous system and the efficiency of the trained model on each class in the one-vs.-one classification problems. During the whole process, only the features of unlabeled images and prediction labels are transmitted in the network, which largely reduces the risk of privacy leakage. We conducted experiments on the network environment, to prove that our method has preferable performance. Our first experiment demonstrates that the performance of our method achieves state-of-the-art performance on four public dataset benchmarks, which shows that our method has competitive performance. The second experiment shows that our method achieves state-of-the-art performance with even fewer training samples, which means that there is less communication overhead and better privacy-preservation. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:80 / 98
页数:19
相关论文
共 50 条
  • [21] A deep decentralized privacy-preservation framework for online social networks
    Frimpong, Samuel Akwasi
    Han, Mu
    Effah, Emmanuel Kwame
    Adjei, Joseph Kwame
    Hanson, Isaac
    Brown, Percy
    [J]. Blockchain: Research and Applications, 2024, 5 (04):
  • [22] GANs Based Density Distribution Privacy-Preservation on Mobility Data
    Yin, Dan
    Yang, Qing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [23] An incremental privacy-preservation algorithm for the (k, e)-Anonymous model
    Srisungsittisunti, Bowonsak
    Natwichai, Juggapong
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 : 126 - 141
  • [24] Research on Patient Privacy-preservation for Wireless Health Monitoring System
    Huang, Qi-ming
    Yang, Xing
    [J]. MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 938 - 942
  • [25] Time-aware distributed service recommendation with privacy-preservation
    Qi, Lianyong
    Wang, Ruili
    Hu, Chunhua
    Li, Shancang
    He, Qiang
    Xu, Xiaolong
    [J]. INFORMATION SCIENCES, 2019, 480 : 354 - 364
  • [26] A dual privacy-preservation scheme for cloud-based eHealth systems
    Wang, Xiaoliang
    Bai, Liang
    Yang, Qing
    Wang, Liu
    Jiang, Frank
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 132 - 138
  • [27] A distributed approach to privacy-preservation and integrity assurance of smart metering data
    Wagh, Gaurav
    Mishra, Sumita
    [J]. PROCEEDINGS OF THE 2023 THE 14TH ACM INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS, E-ENERGY 2023, 2023, : 60 - 65
  • [28] A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Chen, Yan
    Wang, Jian
    Ren, Yong
    [J]. COMPUTER, 2016, 49 (02) : 54 - 62
  • [29] Framework for Renewable Energy Scenario Generation Considering Data Privacy-preservation
    Li, Hongyu
    Dong, Xiaochong
    Wang, Xinying
    Pu, Tianjiao
    Sun, Yingyun
    [J]. Dianwang Jishu/Power System Technology, 2023, 47 (09): : 3690 - 3697
  • [30] Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing
    Ahmad, Waqas
    Wang, Shengling
    Ullah, Ata
    Sheharyar
    Mahmood, Zahid
    [J]. IEEE ACCESS, 2018, 6 : 46363 - 46381