Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
184 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Snail: Secure Single Iteration Localization (2403.14916v2)

Published 22 Mar 2024 in cs.CR

Abstract: Localization is a computer vision task by which the position and orientation of a camera is determined from an image and environmental map. We propose a method for performing localization in a privacy preserving manner supporting two scenarios: first, when the image and map are held by a client who wishes to offload localization to untrusted third parties, and second, when the image and map are held separately by untrusting parties. Privacy preserving localization is necessary when the image and map are confidential, and offloading conserves on-device power and frees resources for other tasks. To accomplish this we integrate existing localization methods and secure multi-party computation (MPC), specifically garbled circuits, yielding proof-based security guarantees in contrast to existing obfuscation-based approaches which recent related work has shown vulnerable. We present two approaches to localization, a baseline data-oblivious adaptation of localization suitable for garbled circuits and our novel Single Iteration Localization. Our technique improves overall performance while maintaining confidentiality of the input image, map, and output pose at the expense of increased communication rounds but reduced computation and communication required per round. Single Iteration Localization is over two orders of magnitude faster than a straightforward application of garbled circuits to localization enabling real-world usage in the first robot to offload localization without revealing input images, environmental map, position, or orientation to offload servers.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (68)
  1. SLAM algorithm applied to robotics assistance for navigation in unknown environments. Journal of Neuroengineering and Rehabilitation (JNER) 7, 1 (2010), 1–16.
  2. HPatches: A benchmark and evaluation of handcrafted and learned local descriptors. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 5173–5182.
  3. Adrien Bartoli and Peter Sturm. 2004. Nonlinear estimation of the fundamental matrix with minimal parameters. IEEE Trans. Pattern Analysis and Machine Intelligence (T-PAMI) 26, 3 (2004), 426–432.
  4. Eric Brachmann and Carsten Rother. 2021. Visual camera re-localization from RGB and RGB-D images using DSAC. IEEE Trans. Pattern Analysis and Machine Intelligence (T-PAMI) (2021).
  5. G. Bradski. 2000. The OpenCV Library. Dr. Dobb’s Journal of Software Tools (2000).
  6. (Leveled) Fully Homomorphic Encryption Without Bootstrapping. In Innovations in Theoretical Computer Science Conference (ITCS). 309–325.
  7. POSEAMM: A unified framework for solving pose problems using an alternating minimization method. In IEEE Int’l Conf. Robotics and Automation (ICRA). 3493–3499.
  8. Let’s take this online: Adapting scene coordinate regression network predictions for online RGB-D camera relocalisation. In Int’l Conf. 3D Vision (3DV). 564–573.
  9. François Chaumette and Seth Hutchinson. 2006. Visual servo control. I. Basic approaches. IEEE Robotics & Automation Magazine (RA-M) 13, 4 (2006), 82–90.
  10. How Privacy-Preserving are Line Clouds? Recovering Scene Details from 3D Lines. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 15668–15678.
  11. Homomorphic Encryption for Arithmetic of Approximate Numbers. In Int’l Conference on the Theory and Applications of Cryptographic Techniques (Asiacrypt).
  12. Private Information Retrieval. Journal of the ACM (JACM) (1998).
  13. James Demmel and William Kahan. 1990. Accurate singular values of bidiagonal matrices. SIAM Journal on Scientific Computing (SISC) 11, 5 (1990), 873–912.
  14. ABY-A framework for efficient mixed-protocol secure two-party computation. In Network and Distributed System Security Symposium (NDSS).
  15. RGB-D SLAM based on extended bundle adjustment with 2D and 3D information. Sensors 16, 8 (2016), 1285.
  16. D2-net: A trainable cnn for joint description and detection of local features. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 8092–8101.
  17. Privacy-preserving image features via adversarial affine subspace embeddings. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 14267–14277.
  18. Hers: Homomorphically encrypted representation search. IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM) (2022).
  19. Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive, Paper 2012/144. https://eprint.iacr.org/2012/144.
  20. Martin A Fischler and Robert C Bolles. 1981. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24, 6 (1981), 381–395.
  21. Roger Fletcher. 1971. A modified Marquardt subroutine for non-linear least squares. (1971).
  22. Privacy preserving structure-from-motion. In European Conf. Computer Vision (ECCV). 333–350.
  23. Privacy Preserving Localization and Mapping from Uncalibrated Cameras. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 1809–1819.
  24. Google. 2019. Google Visual Positioning Service. https://blog.research.google/2019/02/using-global-localization-to-improve.html?m=1.
  25. Deep learning with limited numerical precision. In Int’l Conf. Machine learning (ICML). PMLR, 1737–1746.
  26. R. I. Hartley and A. Zisserman. 2004. Multiple View Geometry in Computer Vision (second ed.). Cambridge University Press.
  27. Vladimir Kolesnikov and Thomas Schneider. 2008. Improved garbled circuit: Free XOR gates and applications. In Int’l Colloquium on Automata, Languages and Programming (ICALP). Springer, 486–498.
  28. Hacking in darkness: Return-oriented programming against secure enclaves. In USENIX Security Symposium. 523–539.
  29. Inferring fine-grained control flow inside {{\{{SGX}}\}} enclaves with branch shadowing. In USENIX Security Symposium. 557–574.
  30. Epnp: An accurate O(n) solution to the pnp problem. Int’l J. Computer Vision (IJCV) 81, 2 (2009), 155–166.
  31. Effects of reduced precision on floating-point SVM classification accuracy. Procedia Computer Science 4 (2011), 508–517.
  32. Yehuda Lindell. 2017. Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich. 277–346 pages.
  33. A range-based secure localization algorithm for wireless sensor networks. IEEE Sensors Journal 19, 2 (2018), 785–796.
  34. David G Lowe. 2004. Distinctive image features from scale-invariant keypoints. Int’l J. Computer Vision (IJCV) 60 (2004), 91–110.
  35. Fast and globally convergent pose estimation from video images. IEEE Trans. Pattern Analysis and Machine Intelligence (T-PAMI) 22, 6 (2000), 610–622.
  36. L3-net: Towards learning based lidar localization for autonomous driving. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 6389–6398.
  37. {{\{{ppSAT}}\}}: Towards {{\{{Two-Party}}\}} Private {{\{{SAT}}\}} Solving. In USENIX Security Symposium. 2983–3000.
  38. An invitation to 3-d vision: from images to geometric models. Vol. 26.
  39. ViSP for visual servoing: a generic software platform with a wide class of robot control skills. IEEE Robotics & Automation Magazine (RA-M) 12, 4 (2005), 40–52.
  40. Meta. 2019. Facebook Live Maps. https://tech.facebook.com/reality-labs/2019/9/inside-facebook-reality-labs-research-updates-and-the-future-of-social-connection/.
  41. Microsoft. 2020. Microsoft Azure Spatial Anchors. https://azure.microsoft.com/en-us/products/spatial-anchors.
  42. Jorge Nocedal and Stephen J Wright. 1999. Numerical optimization. Springer.
  43. Edwin Olson. 2011. AprilTag: A robust and flexible visual fiducial system. In IEEE Int’l Conf. Robotics and Automation (ICRA). 3400–3407.
  44. Beresford N Parlett. 1998. The symmetric eigenvalue problem. SIAM.
  45. Mikael Persson and Klas Nordberg. 2018. Lambda twist: An accurate fast robust perspective three point (P3P) solver. In European Conf. Computer Vision (ECCV). 318–332.
  46. Revealing scenes by inverting structure from motion reconstructions. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 145–154.
  47. Francesco Pittaluga and Bingbing Zhuang. 2023. LDP-Feat: Image Features with Local Differential Privacy. arXiv:2308.11223
  48. Vins-mono: A robust and versatile monocular visual-inertial state estimator. IEEE Trans. Robotics (T-RO) 34, 4 (2018), 1004–1020.
  49. Michael O Rabin. 1981. How to Exchange Secrets with Oblivious Transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981).
  50. Understanding the limitations of cnn-based absolute camera pose regression. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 3302–3312.
  51. maplab: An open framework for research in visual-inertial mapping and localization. IEEE Robotis and Automation Letters (RA-L) 3, 3 (2018), 1418–1425.
  52. Johannes L Schonberger and Jan-Michael Frahm. 2016. Structure-from-motion revisited. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 4104–4113.
  53. A multi-view stereo benchmark with high-resolution images and multi-camera videos. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 3260–3269.
  54. Goldwasser Shafi and Micali Silvio. 1984. Probabilistic encryption. J. Comput. System Sci. 28, 2 (1984), 270–299.
  55. Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.
  56. Privacy preserving image queries for camera localization. In IEEE Int’l Conf. Computer Vision (ICCV). 1486–1496.
  57. Tomas Toft. 2009. Solving linear programs using multiparty computation. In Int’l Conference on Financial Cryptography and Data Security. 90–107.
  58. Shinji Umeyama. 1991. Least-squares estimation of transformation parameters between two point patterns. IEEE Trans. Pattern Analysis and Machine Intelligence (T-PAMI) 13, 04 (1991), 376–380.
  59. Telling Your Secrets without Page Faults: Stealthy Page {{\{{Table-Based}}\}} Attacks on Enclaved Execution. In USENIX Security Symposium. 1041–1056.
  60. Shibo Wang and Pankaj Kanwar. 2019. BFloat16: The secret to high performance on Cloud TPUs. https://cloud.google.com/blog/products/ai-machine-learning/bfloat16-the-secret-to-high-performance-on-cloud-tpus. Accessed: 2022-04-01.
  61. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.
  62. Reconstructing an image from its local descriptors. In IEEE Conf. Computer Vision and Pattern Recognition (CVPR). 337–344.
  63. A high-precision localization algorithm by improved SIFT key-points. In Int’l Congress on Image and Signal Processing (CISP). 1–6.
  64. Andrew C Yao. 1982. Protocols for secure computations. In Foundations of Computer Science. 160–164.
  65. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In Foundations of Computer Science. 162–167.
  66. zacleung. 2017. Snail model. https://www.thingiverse.com/thing:2202789/files. Accessed: 2022-03-23.
  67. Two halves make a whole. In Int’l Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt). 220–250.
  68. Zama. 2022. TFHE-rs: A Pure Rust Implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data. https://github.com/zama-ai/tfhe-rs.

Summary

We haven't generated a summary for this paper yet.