2022
DOI: 10.1038/s41467-022-32168-5
|View full text |Cite
|
Sign up to set email alerts
|

Secure human action recognition by encrypted neural network inference

Abstract: Advanced computer vision technology can provide near real-time home monitoring to support “aging in place” by detecting falls and symptoms related to seizures and stroke. Affordable webcams, together with cloud computing services (to run machine learning algorithms), can potentially bring significant social benefits. However, it has not been deployed in practice because of privacy concerns. In this paper, we propose a strategy that uses homomorphic encryption to resolve this dilemma, which guarantees informati… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 44 publications
0
14
0
Order By: Relevance
“…Most of the existing works (i.e., [21], [33]- [38]) investigate the training of NNs on encrypted data rely on homomorphic encryption (HE). An example of HE implementation is the CKKS scheme [39], which can support approximate computation with floating-point numbers.…”
Section: B Neural Network (Nn) For Training Encrypted Datamentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the existing works (i.e., [21], [33]- [38]) investigate the training of NNs on encrypted data rely on homomorphic encryption (HE). An example of HE implementation is the CKKS scheme [39], which can support approximate computation with floating-point numbers.…”
Section: B Neural Network (Nn) For Training Encrypted Datamentioning
confidence: 99%
“…To make the machine learning model compatible with the HE scheme, the authors in [35] redesign the conventional NNs to be HE-compatible by replacing nonlinear activation functions with low-degree polynomials that only include addition and multiplication calculations. However, all the works in [21], [33]- [38] considered outsourcing the training task to a single central server (e.g., the CS), which limits the capacity to handle a massive amount of data in largescale FL systems.…”
Section: B Neural Network (Nn) For Training Encrypted Datamentioning
confidence: 99%
“…Taking the United States as an example, it already has a complete security infrastructure, security assessment criteria, certified encryption standards and related regulations, and has formed a sound information security industry chain [5]. Literature [6] pointed out that "Cloud Security Alliance" is a non-profit, non-profit organization, its task is to solve the security problems existing in the cloud computing network, propose solutions, and improve the security index of cloud computing. After the Cloud Security Alliance was established in the United States, cloud computing providers such as Microsoft and Google have joined the alliance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As a result, it has widespread applications in fields such as autonomous driving, remote sensing, and security surveillance systems. [10][11][12][13] However, despite the notable advantages of polarization imaging mentioned above, it still faces some limitations in further miniaturizing the sensor footprint and the implementation of image enhancement. For instance, achieving the recognition of band information of imaged objects and implementing image enhancement based on polarization imaging remains challenging, requiring the use of spectrometers or other components, [14] thereby increasing the complexity of the image processing system and hindering the trend of miniaturization.…”
Section: Introductionmentioning
confidence: 99%