{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:37:05Z","timestamp":1706661425676},"reference-count":36,"publisher":"IOP Publishing","issue":"1","license":[{"start":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T00:00:00Z","timestamp":1706572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T00:00:00Z","timestamp":1706572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/iopscience.iop.org\/info\/page\/text-and-data-mining"}],"funder":[{"name":"Research Grants Council of Hong Kong SAR","award":["17200321"]},{"name":"AI Chip Center for Emerging Smart Systems, InnoHK funding, Hong Kong SAR"}],"content-domain":{"domain":["iopscience.iop.org"],"crossmark-restriction":false},"short-container-title":["Neuromorph. Comput. Eng."],"published-print":{"date-parts":[[2024,3,1]]},"abstract":"Abstract<\/jats:title>\n Bio-inspired neuromorphic cameras sense illumination changes on a per-pixel basis and generate spatiotemporal streaming events within microseconds in response, offering visual information with high temporal resolution over a high dynamic range. Such devices often serve in surveillance systems due to their applicability and robustness in environments with high dynamics and harsh lighting, where they can still supply clearer recordings than traditional imaging. In other words, when it comes to privacy-relevant cases, neuromorphic cameras also expose more sensitive data and pose serious security threats. Therefore, asynchronous event streams necessitate careful encryption before transmission and usage. This work discusses several potential attack scenarios and approaches event encryption from the perspective of neuromorphic noise removal, in which we inversely introduce well-crafted noise into raw events until they are obfuscated. Our evaluations show that the encrypted events can effectively protect information from attacks of low-level visual reconstruction and high-level neuromorphic reasoning, and thus feature dependable privacy-preserving competence. The proposed solution gives impetus to the security of event data and paves the way to a highly encrypted technique for privacy-protective neuromorphic imaging.<\/jats:p>","DOI":"10.1088\/2634-4386\/ad207b","type":"journal-article","created":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T22:21:02Z","timestamp":1705702862000},"page":"014002","update-policy":"http:\/\/dx.doi.org\/10.1088\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Event encryption: rethinking privacy exposure for neuromorphic imaging"],"prefix":"10.1088","volume":"4","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1423-7992","authenticated-orcid":true,"given":"Pei","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3000-1536","authenticated-orcid":true,"given":"Shuo","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6268-950X","authenticated-orcid":false,"given":"Edmund Y","family":"Lam","sequence":"additional","affiliation":[]}],"member":"266","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"key":"ncead207bbib1","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TPAMI.2020.3008413","article-title":"Event-based vision: a survey","volume":"44","author":"Gallego","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ncead207bbib2","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1109\/ISCAS.2012.6272141","article-title":"Care: a dynamic stereo vision sensor system for fall detection","author":"Belbachir","year":"2012"},{"key":"ncead207bbib3","doi-asserted-by":"publisher","first-page":"4320","DOI":"10.3390\/s21134320","article-title":"Event encryption for neuromorphic vision sensors: framework, algorithm and evaluation","volume":"21","author":"Du","year":"2021","journal-title":"Sensors"},{"key":"ncead207bbib4","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/JSSC.2007.914337","article-title":"A 128\u00d7128 120 dB 15 mus latency asynchronous temporal contrast vision sensor","volume":"43","author":"Lichtsteiner","year":"2008","journal-title":"IEEE J. Solid-State Circuits"},{"key":"ncead207bbib5","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TCSII.2018.2824899","article-title":"Front and back illuminated dynamic and active pixel vision sensors comparison","volume":"65","author":"Taverni","year":"2018","journal-title":"IEEE Trans. Circuits Syst. II"},{"key":"ncead207bbib6","doi-asserted-by":"publisher","first-page":"107\u2009247","DOI":"10.1016\/j.optlaseng.2022.107247","article-title":"Millisecond autofocusing microscopy using neuromorphic event sensing","volume":"160","author":"Ge","year":"2023","journal-title":"Opt. Lasers Eng."},{"key":"ncead207bbib7","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-031-19797-0_36","article-title":"Secrets of event-based optical flow","author":"Shiba","year":"2022"},{"key":"ncead207bbib8","doi-asserted-by":"publisher","first-page":"2206","DOI":"10.1364\/OE.444948","article-title":"Lens-free motion analysis via neuromorphic laser speckle imaging","volume":"30","author":"Ge","year":"2022","journal-title":"Opt. Express"},{"key":"ncead207bbib9","doi-asserted-by":"publisher","first-page":"p 17744","DOI":"10.1109\/CVPR52688.2022.01724","article-title":"Unifying motion deblurring and frame interpolation with events","author":"Zhang","year":"2022"},{"key":"ncead207bbib10","doi-asserted-by":"publisher","first-page":"9112","DOI":"10.1109\/TII.2022.3195063","article-title":"Understanding human reactions looking at facial microexpressions with an event camera","volume":"18","author":"Becattini","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ncead207bbib11","doi-asserted-by":"publisher","first-page":"6351","DOI":"10.1109\/CVPR.2019.00652","article-title":"EV-Gait: event-based robust gait recognition using dynamic vision sensors","author":"Wang","year":"2019"},{"key":"ncead207bbib12","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/TPAMI.2022.3152999","article-title":"Low cost and latency event camera background activity denoising","volume":"45","author":"Guo","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ncead207bbib13","doi-asserted-by":"publisher","first-page":"5632","DOI":"10.1109\/ICCV.2019.00573","article-title":"End-to-end learning of representations for asynchronous event-based data","author":"Gehrig","year":"2019"},{"key":"ncead207bbib14","first-page":"16\u2009639","article-title":"Learning to detect objects with a 1 megapixel event camera","volume":"vol 33","author":"Perot","year":"2020"},{"key":"ncead207bbib15","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","article-title":"A novel algorithm for image encryption based on mixture of chaotic maps","volume":"35","author":"Behnia","year":"2008","journal-title":"Chaos Solitons Fractals"},{"key":"ncead207bbib16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s43593-021-00010-y","article-title":"Image encryption using spatial nonlinear optics","volume":"2","author":"Hou","year":"2022","journal-title":"eLight"},{"key":"ncead207bbib17","doi-asserted-by":"publisher","first-page":"5484","DOI":"10.1038\/s41467-020-19312-9","article-title":"Reprogrammable meta-hologram for optical encryption","volume":"11","author":"Qu","year":"2020","journal-title":"Nat. Commun."},{"key":"ncead207bbib18","article-title":"Deep equilibrium models for video snapshot compressive imaging","author":"Zhao","year":"2022"},{"key":"ncead207bbib19","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/TSP.2015.2407315","article-title":"Low-complexity multiclass encryption by compressed sensing","volume":"63","author":"Cambareri","year":"2015","journal-title":"IEEE Trans. Signal Process."},{"key":"ncead207bbib20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TETC.2017.2788865","article-title":"O(n)-space spatiotemporal filter for reducing noise in neuromorphic vision sensors","volume":"9","author":"Khodamoradi","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ncead207bbib21","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/BIOROB.2016.7523452","article-title":"Evaluating noise filtering for event-based asynchronous change detection image sensors","author":"Czech","year":"2016"},{"key":"ncead207bbib22","doi-asserted-by":"publisher","first-page":"2024,","DOI":"10.3390\/app10062024","article-title":"Event density based denoising method for dynamic vision sensor","volume":"10","author":"Feng","year":"2020","journal-title":"Appl. Sci."},{"key":"ncead207bbib23","first-page":"1","article-title":"An elegant pairing function","author":"Szudzik","year":"2006"},{"key":"ncead207bbib24","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1177\/0278364917691115","article-title":"The event-camera dataset and simulator: event-based data for pose estimation, visual odometry and SLAM","volume":"36","author":"Mueggler","year":"2017","journal-title":"Int. J. Robot. Res."},{"key":"ncead207bbib25","doi-asserted-by":"publisher","first-page":"437","DOI":"10.3389\/fnins.2015.00437","article-title":"Converting static image datasets to spiking neuromorphic datasets using saccades","volume":"9","author":"Orchard","year":"2015","journal-title":"Front. Neurosci."},{"key":"ncead207bbib26","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/ICCV.2019.00058","article-title":"Graph-based object classification for neuromorphic vision sensing","author":"Bi","year":"2019"},{"key":"ncead207bbib27","article-title":"A large scale event-based detection dataset for automotive","author":"De Tournemire","year":"2020"},{"key":"ncead207bbib28","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-030-20873-8_20","article-title":"Continuous-time intensity estimation using event cameras","author":"Scheerlinck","year":"2018"},{"key":"ncead207bbib29","doi-asserted-by":"crossref","DOI":"10.5244\/C.31.16","article-title":"Real-time visual-inertial odometry for event cameras using keyframe-based nonlinear optimization","author":"Rebecq","year":"2017"},{"key":"ncead207bbib30","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TCI.2023.3281202","article-title":"Neuromorphic imaging with density-based spatiotemporal denoising","volume":"9","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Comput. Imaging"},{"key":"ncead207bbib31","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TMM.2020.2993957","article-title":"Probabilistic undirected graph based denoising method for dynamic vision sensor","volume":"23","author":"Wu","year":"2020","journal-title":"IEEE Trans. Multimedia"},{"key":"ncead207bbib32","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/ICCV48922.2021.00097","article-title":"Graph-based asynchronous event processing for rapid object recognition","author":"Li","year":"2021"},{"key":"ncead207bbib33","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/ICIP46576.2022.9897432","article-title":"Exploiting spatial sparsity for event cameras with visual transformers","author":"Wang","year":"2022"},{"key":"ncead207bbib34","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","article-title":"Microsoft COCO: common objects in context","author":"Lin","year":"2014"},{"key":"ncead207bbib35","doi-asserted-by":"publisher","first-page":"8332","DOI":"10.1109\/ICRA.2019.8793924","article-title":"Mixed frame-\/event-driven fast pedestrian detection","author":"Jiang","year":"2019"},{"key":"ncead207bbib36","doi-asserted-by":"publisher","first-page":"13\u2009884","DOI":"10.1109\/CVPR52729.2023.01334","article-title":"Recurrent vision transformers for object detection with event cameras","author":"Gehrig","year":"2023"}],"container-title":["Neuromorphic Computing and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b","content-type":"text\/html","content-version":"am","intended-application":"text-mining"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b\/pdf","content-type":"application\/pdf","content-version":"am","intended-application":"text-mining"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b\/pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b\/pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b\/pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b\/pdf","content-type":"application\/pdf","content-version":"am","intended-application":"similarity-checking"},{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b\/pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T09:29:54Z","timestamp":1706606994000},"score":1,"resource":{"primary":{"URL":"https:\/\/iopscience.iop.org\/article\/10.1088\/2634-4386\/ad207b"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,30]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1,30]]},"published-print":{"date-parts":[[2024,3,1]]}},"URL":"https:\/\/doi.org\/10.1088\/2634-4386\/ad207b","relation":{},"ISSN":["2634-4386"],"issn-type":[{"value":"2634-4386","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,30]]},"assertion":[{"value":"Event encryption: rethinking privacy exposure for neuromorphic imaging","name":"article_title","label":"Article Title"},{"value":"Neuromorphic Computing and Engineering","name":"journal_title","label":"Journal Title"},{"value":"paper","name":"article_type","label":"Article Type"},{"value":"\u00a9 2024 The Author(s). Published by IOP Publishing Ltd","name":"copyright_information","label":"Copyright Information"},{"value":"2023-06-22","name":"date_received","label":"Date Received","group":{"name":"publication_dates","label":"Publication dates"}},{"value":"2024-01-19","name":"date_accepted","label":"Date Accepted","group":{"name":"publication_dates","label":"Publication dates"}},{"value":"2024-01-30","name":"date_epub","label":"Online publication date","group":{"name":"publication_dates","label":"Publication dates"}}]}}