Current Directions in Biomedical Engineering (Sep 2023)

An approach to privacy-aware image analysis on edge devices using CNNs

  • Bendig Fabian,
  • Naroska Edwin,
  • Weberskirch Marcus

DOI
https://doi.org/10.1515/cdbme-2023-1066
Journal volume & issue
Vol. 9, no. 1
pp. 262 – 265

Abstract

Read online

This paper presents our approach to a privacy preserving person detection algorithm on edge computing devices. It utilizes a commonly used neural network architecture (VGG16) to encode an image by passing it through a fixed number of layers of the network on the edge device. The resulting feature vector can then be transmitted over the network to a more powerful computer (e.g. in the cloud) to be passed through the remaining layers of VGG16. As a result, the transmitted feature vector is only an abstract representation of the image. However, our research has shown that it is in fact possible to reconstruct most images by their respecting feature vectors if a potential attacker can tap into the network transmission by using a decoder network. Our approach to mitigate that risk is to preprocess the transmitted feature vector randomly by different manipulation methods. We used methods like mean filter or random null value insertion to manipulate the feature vector before it gets transmitted and show that those methods are able to counter the reconstruction capabilities of a decoder network while still preserving the capabilities of the original VGG16 network. The actual VGG16 network was used for object detection.We used the faces in the wild dataset and utilized two different approaches to confirm our approach. First, we used the VGGFace-Network on the decoded images and tried to let it identify people from the former mentioned dataset. The second approach used a group of 26 participants who had to match the decoder image to one of five images. In our experiments, we found different combinations of manipulation and number of layers on the edge device to preserve the detection capability of VGG16 (e.g. object detection) while preventing VGGFace and the participating group from identifying the shown people.

Keywords