Privacy-preserving biometric verification with outsourced correlation filter computation

被引:1
|
作者
Taheri, Motahareh [1 ]
Mozaffari, Saeed [1 ]
Keshavarzi, Parviz [1 ]
机构
[1] Semnan Univ, Fac Elect & Comp Engn, Semnan, Iran
关键词
Biometric verification; Privacy preserving; Cloud computing; Outsourced computation; FACE-RECOGNITION; EFFICIENT; ENCRYPTION; SECURITY; SYSTEM; SCHEME;
D O I
10.1007/s11042-021-10648-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset.
引用
收藏
页码:21425 / 21448
页数:24
相关论文
共 50 条
  • [11] Privacy-Preserving Biometric Identification Using Secure Multiparty Computation
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 42 - 52
  • [12] Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    He, Kai
    Deng, Robert H.
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4929 - 4943
  • [13] An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification
    Wang, Yongjin
    Plataniotis, Konstantinos N.
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (05): : 1280 - 1293
  • [14] A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification
    Wong, Kok-Seng
    Kim, Myung-Ho
    [J]. 2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 120 - 125
  • [15] A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
    Qin, Zhen
    Sun, Jianfei
    Wahaballa, Abubaker
    Zheng, Wentao
    Xiong, Hu
    Qin, Zhiguang
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 54 : 55 - 60
  • [16] A Privacy-Preserving Join on Outsourced Database
    Ma, Sha
    Yang, Bo
    Li, Kangshun
    Xia, Feng
    [J]. INFORMATION SECURITY, 2011, 7001 : 278 - 292
  • [17] An Efficient Privacy-Preserving Outsourced Geofencing Service Using Bloom Filter
    Bosch, Christoph
    [J]. 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2018,
  • [18] Privacy-Preserving Outsourced Media Search
    Weng, Li
    Amsaleg, Laurent
    Furon, Teddy
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (10) : 2738 - 2751
  • [19] Privacy-Preserving Outsourced Similarity Search
    Kozak, Stepan
    Novak, David
    Zezula, Pavel
    [J]. JOURNAL OF DATABASE MANAGEMENT, 2014, 25 (03) : 48 - 71
  • [20] Privacy-preserving inpainting for outsourced image
    Cao, Fang
    Sun, Jiayi
    Luo, Xiangyang
    Qin, Chuan
    Chang, Ching-Chun
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (11)