2016
DOI: 10.1007/978-3-319-31301-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In these schemes, the biometric identification scheme is considered to be a two-party system, where the data owner takes charge of biometric dataset management and template matching. Most of these schemes are designed based on the secure computation protocol [18][19][20] and homomorphic encryption [9,21,22] techniques. Although the privacy-preserving is achieved in these schemes, the data owner is required to be equipped with powerful computing ability and remarkable storage capacity in these schemes, which can hardly be satisfied in most application scenarios and thus makes these schemes unpractical.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In these schemes, the biometric identification scheme is considered to be a two-party system, where the data owner takes charge of biometric dataset management and template matching. Most of these schemes are designed based on the secure computation protocol [18][19][20] and homomorphic encryption [9,21,22] techniques. Although the privacy-preserving is achieved in these schemes, the data owner is required to be equipped with powerful computing ability and remarkable storage capacity in these schemes, which can hardly be satisfied in most application scenarios and thus makes these schemes unpractical.…”
Section: Related Workmentioning
confidence: 99%
“…To solve this problem, researchers have proposed many schemes [6][7][8][9][10][11][12][13] to achieve privacy-preserving biometric recognition. Unfortunately, most of these schemes [6][7][8][9][10] work in a basic way, which means that they just traverse the whole dataset to get the identification result, and no optimization tactics are taken to accelerate the searching process. Consequently, a huge computing burden is brought to the cloud when it handles too many identification requests simultaneously, which makes these schemes inefficient and unpractical.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from this, another drawback of the scheme lies in the low-accuracy of the recognition result. Higo et al [279] introduced an enhanced scheme for homomorphic fingerprint authentication computations, which takes advantage of the information of fingerprint minutiae (i.e., feature points in the fingerprints). Suppose two fingerprint minutiae are denoted as ((x 1 , y 1 ), t 1 ) and ((x 2 , y 2 ), t 2 ), where the former pair in the tuple is the location of one minutia and the latter is its direction.…”
Section: ) Biometric Authenticationmentioning
confidence: 99%