2021
DOI: 10.1155/2021/2313389
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree

Abstract: Biometric identification services have been applied to almost all aspects of life. However, how to securely and efficiently identify an individual in a huge biometric dataset is still very challenging. For one thing, biometric data is very sensitive and should be kept secure during the process of biometric identification. On the other hand, searching a biometric template in a large dataset can be very time-consuming, especially when some privacy-preserving measures are adopted. To address this problem, we prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…In addition, the cancelation and renewal capacity depends on the RNG's power and the algorithm's complexity to generate the encryption keys within the set of allowed elements. Some authentication systems with protection based on homomorphic encryption that calculates the squared Euclidean distance in the encrypted domain were proposed for biometric traits such as fingerprint [102], iris [103], and face [104], [105]. In addition, [106] proposed an authentication system for speaker recognition that implemented cosine similarity in the encrypted domain.…”
Section: ) Homomorphic Encryptionmentioning
confidence: 99%
“…In addition, the cancelation and renewal capacity depends on the RNG's power and the algorithm's complexity to generate the encryption keys within the set of allowed elements. Some authentication systems with protection based on homomorphic encryption that calculates the squared Euclidean distance in the encrypted domain were proposed for biometric traits such as fingerprint [102], iris [103], and face [104], [105]. In addition, [106] proposed an authentication system for speaker recognition that implemented cosine similarity in the encrypted domain.…”
Section: ) Homomorphic Encryptionmentioning
confidence: 99%
“…The system showed a faster response time when compared to a non-clustered system, indicating that parallel Iris Recognition Approach for Preserving Privacy in Cloud Computing processing in a cloud-based environment is crucial for efficient template matching. C. Hahn et al [14] stated that the primary cause of security vulnerabilities is inadequate randomness in the encryption of biometric databases. This weakness can manifest in the form of ciphertext-only attacks and known plaintext attacks, where the attacker can observe, access, or collude with cloud providers and users to obtain sensitive information.…”
Section: Recognition Of Individuals Using Encrypted Biometric Featuresmentioning
confidence: 99%