Cryptography – Video cryptography – Video electric signal modification
Reexamination Certificate
2004-12-06
2009-08-18
Zand, Kambiz (Department: 2434)
Cryptography
Video cryptography
Video electric signal modification
C380S210000, C382S100000
Reexamination Certificate
active
07577252
ABSTRACT:
A method processes an input image securely. An input image I is acquired in a client. A set of m random images, H1, . . . , Hm, and a coefficient vector, a=[a1, . . . , am], are generated such that the input image I is I=Σi=1mαiHj. The set of the random images is transferred to a server including a weak classifier. In the server, a set of m convolved random images H′ are determined, such that {H1′=π1(H1*y}i,1m, where * is a convolution operator and π1is a first random pixel permutation. The set of convolved images is transferred to the client. In the client, a set of m permuted images I′ is determined, such that I′=π2(Σi=1mαiH1′), where π2is a second random pixel permutation. The set of permuted image is transferred to the server. In the server, a test image Ī such that Ī=αƒ(I′) is determined and a true signal is returned to the client if there exists a pixel q in the test image such that Ī(q)>0, otherwise return a false signal is returned to the client to indicate whether or not the input image contains an object.
REFERENCES:
patent: 7058697 (2006-06-01), Rhoads
patent: 7212630 (2007-05-01), Javidi
patent: 7319755 (2008-01-01), Struyk
Y.C. Chang and C.J. Lu, “Oblivious Polynomial Evaluation and Oblivious Neural Learning,” In Advances in Cryptology, Asiacrypt '01, Lecture Notes in Computer Science vol. 2248, pp. 369-384, 2001.
C. Clifton, M. Kantarciougly, J. Vaidya, X. Lin, and M. Zhu, “Tools for Privacy Preserving Distributed Data Mining,” In SIGKDD Explorations, 4(2) :28-34, 2002.
D. Koller, M. Turitzin, M. Levoy, M. Tarini, G. Croccia, P. Cignoni, and R. Scopingno, “Protected Interactive 3D Graphics Via Remote Rendering,” In SIGGRAPH 2004.
Y. Lindell and B. Pinkas, “Privacy Preserving Data Mining,” In Advances in Cryptology—Crypto 2000, LNCS 1880, 2000.
M. Naor and B. Pinkas, “Oblivious Polynomial Evaluation,” In Proceedings of the 31stSymposium on Theory of Computer Science (STOC), Atlanta, GA, pp. 245-254, May 1-4, 1999.
S. Romdhani, P. Torr, B. Scholkopf, and A. Blake, “Computationally Efficient Face Detection,” In International Conference on Computer Vision, Vancouver, 2001.
C. Stauffer and E. Grimson, “Learning Patterns of Activity Using Real-Time Tracking,” PAMI, 22(8) :747-757, 2000.
P. Viola and M. Jones, “Rapid Object Detection Using a Boosted Cascade of Simple Features,” In IEEE Conference on Computer Vision and Pattern Recognition, Hawaii, 2001.
W. Du and M. Atalla, “Privacy-preserving cooperative scientific computations,” In 14thIEEE Computer Security Foundations Workshop, pp. 273-282, Nova Scotia, Canada, Jun. 11-13, 2001.
I. Damgard “Committed schemes and zero-knowledge protocols”, 1999, XP002381007.
M. Elad “The computer vision workshop,” Mar. 18, 2002.
Avidan Shmuel
Butman Ayelet
Butman Moshe
Brinkman Dirk
Mitsubishi Electric Research Laboratories Inc.
Tabor Amare
Vinokur Gene
Zand Kambiz
LandOfFree
Method for secure object detection in images does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for secure object detection in images, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for secure object detection in images will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4058660