Method for secure object detection in images

Cryptography – Video cryptography – Video electric signal modification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S210000, C382S100000

Reexamination Certificate

active

07577252

ABSTRACT:
A method processes an input image securely. An input image I is acquired in a client. A set of m random images, H1, . . . , Hm, and a coefficient vector, a=[a1, . . . , am], are generated such that the input image I is I=Σi=1mαiHj. The set of the random images is transferred to a server including a weak classifier. In the server, a set of m convolved random images H′ are determined, such that {H1′=π1(H1*y}i,1m, where * is a convolution operator and π1is a first random pixel permutation. The set of convolved images is transferred to the client. In the client, a set of m permuted images I′ is determined, such that I′=π2(Σi=1mαiH1′), where π2is a second random pixel permutation. The set of permuted image is transferred to the server. In the server, a test image Ī such that Ī=αƒ(I′) is determined and a true signal is returned to the client if there exists a pixel q in the test image such that Ī(q)>0, otherwise return a false signal is returned to the client to indicate whether or not the input image contains an object.

REFERENCES:
patent: 7058697 (2006-06-01), Rhoads
patent: 7212630 (2007-05-01), Javidi
patent: 7319755 (2008-01-01), Struyk
Y.C. Chang and C.J. Lu, “Oblivious Polynomial Evaluation and Oblivious Neural Learning,” In Advances in Cryptology, Asiacrypt '01, Lecture Notes in Computer Science vol. 2248, pp. 369-384, 2001.
C. Clifton, M. Kantarciougly, J. Vaidya, X. Lin, and M. Zhu, “Tools for Privacy Preserving Distributed Data Mining,” In SIGKDD Explorations, 4(2) :28-34, 2002.
D. Koller, M. Turitzin, M. Levoy, M. Tarini, G. Croccia, P. Cignoni, and R. Scopingno, “Protected Interactive 3D Graphics Via Remote Rendering,” In SIGGRAPH 2004.
Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” In Advances in Cryptology—Crypto 2000, LNCS 1880, 2000.
M. Naor and B. Pinkas, “Oblivious Polynomial Evaluation,” In Proceedings of the 31stSymposium on Theory of Computer Science (STOC), Atlanta, GA, pp. 245-254, May 1-4, 1999.
S. Romdhani, P. Torr, B. Scholkopf, and A. Blake, “Computationally Efficient Face Detection,” In International Conference on Computer Vision, Vancouver, 2001.
C. Stauffer and E. Grimson, “Learning Patterns of Activity Using Real-Time Tracking,” PAMI, 22(8) :747-757, 2000.
P. Viola and M. Jones, “Rapid Object Detection Using a Boosted Cascade of Simple Features,” In IEEE Conference on Computer Vision and Pattern Recognition, Hawaii, 2001.
W. Du and M. Atalla, “Privacy-preserving cooperative scientific computations,” In 14thIEEE Computer Security Foundations Workshop, pp. 273-282, Nova Scotia, Canada, Jun. 11-13, 2001.
I. Damgard “Committed schemes and zero-knowledge protocols”, 1999, XP002381007.
M. Elad “The computer vision workshop,” Mar. 18, 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for secure object detection in images does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for secure object detection in images, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for secure object detection in images will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4058660

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.