Privacy-preserving biometric verification with outsourced correlation filter computation

被引:1
|
作者
Taheri, Motahareh [1 ]
Mozaffari, Saeed [1 ]
Keshavarzi, Parviz [1 ]
机构
[1] Semnan Univ, Fac Elect & Comp Engn, Semnan, Iran
关键词
Biometric verification; Privacy preserving; Cloud computing; Outsourced computation; FACE-RECOGNITION; EFFICIENT; ENCRYPTION; SECURITY; SYSTEM; SCHEME;
D O I
10.1007/s11042-021-10648-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset.
引用
收藏
页码:21425 / 21448
页数:24
相关论文
共 50 条
  • [1] Privacy-preserving biometric verification with outsourced correlation filter computation
    Motahareh Taheri
    Saeed Mozaffari
    Parviz Keshavarzi
    [J]. Multimedia Tools and Applications, 2021, 80 : 21425 - 21448
  • [2] Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
    Thompson, Brian
    Haber, Stuart
    Horne, William G.
    Sander, Tomas
    Yao, Danfeng
    [J]. PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 185 - +
  • [3] Privacy-preserving PLDA speaker verification using outsourced secure computation
    Treiber, Amos
    Nautsch, Andreas
    Kolberg, Jascha
    Schneider, Thomas
    Busch, Christoph
    [J]. SPEECH COMMUNICATION, 2019, 114 : 60 - 71
  • [4] Privacy-preserving face recognition with outsourced computation
    Xiang, Can
    Tang, Chunming
    Cai, Yunlu
    Xu, Qiuxia
    [J]. SOFT COMPUTING, 2016, 20 (09) : 3735 - 3744
  • [5] Privacy-preserving face recognition with outsourced computation
    Can Xiang
    Chunming Tang
    Yunlu Cai
    Qiuxia Xu
    [J]. Soft Computing, 2016, 20 : 3735 - 3744
  • [6] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Liu, Ximeng
    Deng, Robert H.
    Wu, Pengfei
    Yang, Yang
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [7] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Ximeng Liu
    Robert H. Deng
    Pengfei Wu
    Yang Yang
    [J]. Cybersecurity, 3
  • [8] An Efficient Privacy-Preserving Outsourced Computation over Public Data
    Liu, Ximeng
    Qin, Baodong
    Deng, Robert H.
    Li, Yingjiu
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 756 - 770
  • [9] Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database
    Yang, Haining
    Su, Ye
    Qin, Jing
    Wang, Huaxiong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1320 - 1337
  • [10] Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3671 - 3687