Privacy-preserving biometric verification with outsourced correlation filter computation

被引:1
|
作者
Taheri, Motahareh [1 ]
Mozaffari, Saeed [1 ]
Keshavarzi, Parviz [1 ]
机构
[1] Semnan Univ, Fac Elect & Comp Engn, Semnan, Iran
关键词
Biometric verification; Privacy preserving; Cloud computing; Outsourced computation; FACE-RECOGNITION; EFFICIENT; ENCRYPTION; SECURITY; SYSTEM; SCHEME;
D O I
10.1007/s11042-021-10648-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset.
引用
收藏
页码:21425 / 21448
页数:24
相关论文
共 50 条
  • [41] Efficient and Privacy-Preserving Query on Outsourced Spherical Data
    Zhou, Yueyue
    Xiang, Tao
    Li, Xiaoguo
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 138 - 152
  • [42] Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation
    Chen, Huajie
    Uenal, Ali Burak
    Akguen, Mete
    Pfeifer, Nico
    [J]. PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 61 - 69
  • [43] A privacy-preserving aggregate query scheme on outsourced databases
    Jiang, Ya-Jun
    Yang, Bo
    Zhang, Ming-Wu
    Chen, Xu-Ri
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (03): : 721 - 725
  • [44] Fully privacy-preserving location recommendation in outsourced environments
    Han, Lulu
    Luo, Weiqi
    Yang, Anjia
    Zheng, Yandong
    Lu, Rongxing
    Lai, Junzuo
    Cheng, Yudan
    [J]. AD HOC NETWORKS, 2023, 141
  • [45] Secure and privacy-preserving pattern matching in outsourced computing
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3444 - 3451
  • [46] Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing
    Guan, Yunguo
    Xiong, Pulei
    Zhang, Songnian
    Lu, Rongxing
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4854 - 4859
  • [47] Privacy-Preserving Outsourced Calculation on Floating Point Numbers
    Liu, Ximeng
    Deng, Robert H.
    Ding, Wenxiu
    Lu, Rongxing
    Qin, Baodong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2513 - 2527
  • [48] Privacy-Preserving Biometric Authentication: Challenges and Directions
    Pagnin, Elena
    Mitrokotsa, Aikaterini
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [49] A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation
    Zhao, Liang
    Chen, Liqun
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 253 - 260
  • [50] Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures
    Zhang, Hui
    Li, Xuejun
    Tan, Syh-Yuan
    Lee, Ming Jie
    Jin, Zhe
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 5056 - 5069