Have a personal or library account? Click to login

A review of privacy-preserving human and human activity recognition

By:
Open Access
|May 2020

Figures & Tables

Figure 1:

A machine learning process (Osia et al., 2018).
A machine learning process (Osia et al., 2018).

Figure 2:

Privacy issues during the machine learning process in Figure 1.
Privacy issues during the machine learning process in Figure 1.

Figure 3:

An inference attack model against collaborative learning (Melis et al., 2018).
An inference attack model against collaborative learning (Melis et al., 2018).

Figure 4:

Object detection (Ren et al., 2016).
Object detection (Ren et al., 2016).

Figure 5:

Sensor-based human activity recognition (Hu et al., 2019).
Sensor-based human activity recognition (Hu et al., 2019).

Figure 6:

Homomorphic encryption (El-Yahyaoui and Ech-Cherif El Kettani, 2019).
Homomorphic encryption (El-Yahyaoui and Ech-Cherif El Kettani, 2019).

Figure 7:

Sensitive areas are encrypted in the image (Chattopadhyay and Boult, 2007).
Sensitive areas are encrypted in the image (Chattopadhyay and Boult, 2007).

Figure 8:

Anonymized images: different modified pictures of the same person (Ren et al., 2018).
Anonymized images: different modified pictures of the same person (Ren et al., 2018).

Figure 9:

A cartooning image (Winkler et al., 2014).
A cartooning image (Winkler et al., 2014).

Figure 10:

A user privacy protection in image-based localization (Speciale et al., 2019).
A user privacy protection in image-based localization (Speciale et al., 2019).

Figure 11:

Central computing versus edge computing.
Central computing versus edge computing.

Figure 12:

Differential privacy (Wood et al., 2018).
Differential privacy (Wood et al., 2018).

Figure 13:

The private-feature extraction framework (Osia et al., 2020).
The private-feature extraction framework (Osia et al., 2020).

Figure 14:

Collective protection of all sensitive information at once (Zhang et al., 2019).
Collective protection of all sensitive information at once (Zhang et al., 2019).

Figure 15:

Model extraction attack (Wang and Gong, 2018).
Model extraction attack (Wang and Gong, 2018).

Human activity recognition_

ResearchObjectRecognition methodsDataApplication domainPrivacy issue
Iwasawa et al. (2017) You et al. (2012) Human activityDeep learningSensor data from smart wearable devicesDaily activity investigationTraining data privacyUser data privacy
Chen et al. (2018) Hu et al. (2019) Zhang et al. (2019) Physical activities such as walking and runningDeep learningTime series sensor data from smart wearable devicesDaily activity investigationUser data privacy
Phan et al. (2016) Human activityDeep learningPhysical activities, biomarkers, biometric measuresHealth social networkTraining data privacy

Privacy concerns in vision-based machine learning_

ResearchApplication domainPrivacy concerns
Chattopadhyay and Boult (2007) Intelligent surveillance systemConflict between the purpose of intelligent surveillance systems and the privacy of individuals
Wu et al. (2018) Smart camera applicationPrivate information leakage during device-captured visual data upload to centralized cloud for analysis
Gomathisankaran et al. (2013) Medical image analysis on the CloudPrivate information leakage of medical data transmitted in the network and processed in the cloud
Shokri et al. (2017) ‘Machine learning as a service’ provided by Google and AmazonInformation leakage about training datasets
Speciale et al. (2019) Augmented/Mixed reality (AR/MR) and autonomous robotic systemConfidential information disclosure about captured 3D scene

Privacy-preserving approaches_

ResearchPrivacy issuePrivacy-preserving approachProtected object
Garcia and Jacobs (2010) Fontaine and Galand (2007) Gomathisankaran et al. (2013) Chattopadhyay and Boult (2007) Private information leakage (Public dataset privacy) (User data privacy)CryptographyPrivate information (medical image, lifestyle, financial information, face, private location, biometric information, disease information), Human activity (daily life activity, movement)
Butler et al. (2015) Dai et al. (2015) Ryoo et al. (2017) Ren et al. (2018) Winkler et al. (2014) Speciale et al. (2019) Private information leakage (Public dataset privacy)(User data privacy)Anonymized videos
Garcia Lopez et al. (2015) Private information leakage from database (Public dataset privacy)(User data privacy)Local processing
Liu (2019) Bun and Steinke (2016) Information leakage from large-scale database (Public dataset privacy)Differential privacy
Bian et al. (2020) Information leakage in visual recognition(Public dataset privacy)(Training data privacy)Secure inference by homomorphic encryptionSecret sharingHomomorphic convolution
Iwasawa et al. (2017) Ajakan et al. (2015) Edwards and Storkey (2016) Malekzadeh et al. (2018, 2019) Osia et al. (2020) Information disclosure by unintentional discriminating of user information during deep learning (Training data privacy)Adversarial training
Zhang et al. (2019) Adversarial training which is effective on particular sensitive attributes (Training data privacy)Image style transformation
Phan et al. (2016) Abadi et al. (2016) Papernot et al. (2017) Information leakage during deep learning (Training data privacy)Differential privacy
Tramèr et al. (2016) Wang and Gong (2018) Juuti et al. (2019) Kariyappa and Kariyappa (2019) Information leakage during deep learning (Model privacy)Analyze attacker’s queries, Defense against attacks

Human recognition_

ResearchObjectRecognition methodsDataApplication domainPrivacy issue
Chattopadhyay and Boult (2007) Wu et al. (2018) Facial Network, Ren et al. (2016) Human, objectDeep learningImage, videoVideo surveillancePublic dataset privacyUser data privacy
Song and Shmatikov (2020) Nelus and Martin (2019) Human faceDeep learningImageBinary gender classificationModel privacy
Haris et al. (2014) Gajjar et al. (2017) Nike, Malinowski (2010)Human locationDeep learningSensor dataLocation-based services, mobile heath applicationsPublic dataset privacyUser data privacy
Gomathisankaran et al. (2013) Wang et al. (2014) Ertin et al. (2011) Human disease, human healthDeep learningClinical records, imageMedical carePublic dataset privacyUser data privacy
Language: English
Page range: 1 - 13
Submitted on: Mar 30, 2020
Published on: May 25, 2020
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2020 Im Y. Jung, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.