2022 IEEE International Joint Conference on Biometrics (IJCB) 2022
DOI: 10.1109/ijcb54206.2022.10007958
|View full text |Cite
|
Sign up to set email alerts
|

Multiplication-Free Biometric Recognition for Faster Processing under Encryption

Abstract: The cutting-edge biometric recognition systems extract distinctive feature vectors of biometric samples using deep neural networks to measure the amount of (dis-)similarity between two biometric samples. Studies have shown that personal information (e.g., health condition, ethnicity, etc.) can be inferred, and biometric samples can be reconstructed from those feature vectors, making their protection an urgent necessity. State-of-theart biometrics protection solutions are based on homomorphic encryption (HE) t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(19 citation statements)
references
References 19 publications
0
1
0
Order By: Relevance
“…Results from different biometric datasets indicate HERS is more computationally efficient than HEFT but has less accuracy in terms of verification performance. Another computationally efficient approach is the multiplication-free strategy proposed by Bassit et al [161]. The authors overcome the performance limitation from the sole use of homomorphic encryption by eliminating multiplications from the two well-known dissimilarity metrics (cosine similarity and Euclidian distance) into summations and simple lookup tables.…”
Section: Defense Mechanisms Based On Biometrics In Encrypted Domainmentioning
confidence: 99%
“…Results from different biometric datasets indicate HERS is more computationally efficient than HEFT but has less accuracy in terms of verification performance. Another computationally efficient approach is the multiplication-free strategy proposed by Bassit et al [161]. The authors overcome the performance limitation from the sole use of homomorphic encryption by eliminating multiplications from the two well-known dissimilarity metrics (cosine similarity and Euclidian distance) into summations and simple lookup tables.…”
Section: Defense Mechanisms Based On Biometrics In Encrypted Domainmentioning
confidence: 99%
“…In this paper, we extend the work conducted in [1] by improving the integration of the MFBR schemes with HE, as illustrated in Table I, where we denote by MFBRv1 [1] our initial version, and by MFBRv2 our improved one proposed in the present paper. Our solution, as in [1], is built upon the HELR framework [9] but applied to the IP and SED measures that do not require training.…”
Section: Introductionmentioning
confidence: 97%
“…In this paper, we extend the work conducted in [1] by improving the integration of the MFBR schemes with HE, as illustrated in Table I, where we denote by MFBRv1 [1] our initial version, and by MFBRv2 our improved one proposed in the present paper. Our solution, as in [1], is built upon the HELR framework [9] but applied to the IP and SED measures that do not require training. Assuming normalized feature vectors extracted from a well-trained DNN, we determine the probability density function (PDF) and cumulative distribution function (CDF) corresponding to the projection of a point on the unit d-ball upon which we generate the lookup tables (that we call MFIP and MFSED) in an equiprobable manner to reinforce their security.…”
Section: Introductionmentioning
confidence: 97%
See 2 more Smart Citations