Secure binary embeddings for privacy preserving nearest neighbors
P Boufounos, S Rane - 2011 IEEE international Workshop on …, 2011 - ieeexplore.ieee.org
2011 IEEE international Workshop on information Forensics and security, 2011•ieeexplore.ieee.org
We present a novel method to securely determine whether two signals are similar to each
other, and apply it to approximate nearest neighbor clustering. The proposed method relies
on a locality sensitive hashing scheme based on a secure binary embedding, computed
using quantized random projections. Hashes extracted from the signals preserve information
about the distance between the signals, provided this distance is small enough. If the
distance between the signals is larger than a threshold, then no information about the …
other, and apply it to approximate nearest neighbor clustering. The proposed method relies
on a locality sensitive hashing scheme based on a secure binary embedding, computed
using quantized random projections. Hashes extracted from the signals preserve information
about the distance between the signals, provided this distance is small enough. If the
distance between the signals is larger than a threshold, then no information about the …
We present a novel method to securely determine whether two signals are similar to each other, and apply it to approximate nearest neighbor clustering. The proposed method relies on a locality sensitive hashing scheme based on a secure binary embedding, computed using quantized random projections. Hashes extracted from the signals preserve information about the distance between the signals, provided this distance is small enough. If the distance between the signals is larger than a threshold, then no information about the distance is revealed. Theoretical and experimental justification is provided for this property. Further, when the randomized embedding parameters are unknown, then the mutual information between the hashes of any two signals decays to zero exponentially fast as a function of the ℓ 2 distance between the signals. Taking advantage of this property, we suggest that these binary hashes can be used to perform privacy-preserving nearest neighbor search with significantly lower complexity compared to protocols which use the actual signals.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果