Loading…
Privacy-preserving biometric verification with outsourced correlation filter computation
In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting fro...
Saved in:
Published in: | Multimedia tools and applications 2021-06, Vol.80 (14), p.21425-21448 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393 |
container_end_page | 21448 |
container_issue | 14 |
container_start_page | 21425 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Taheri, Motahareh Mozaffari, Saeed Keshavarzi, Parviz |
description | In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset. |
doi_str_mv | 10.1007/s11042-021-10648-y |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2531845419</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2531845419</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIlMcPcIrE2eD1I06OqOIlVYIDSNys1HGKqzYJa6cof4_bIHHjsruanZldDSFXwG6AMX0bAJjklHGgwHJZ0PGIzEBpQbXmcJxmUTCqFYNTchbCmjHIFZcz8vGKflfZkfbogsOdb1fZ0ndbF9HbbOfQN95W0Xdt9u3jZ9YNMXQDWldntkN0m2nX-E10mKBtP8QDdEFOmmoT3OVvPyfvD_dv8ye6eHl8nt8tqBVQxlRLy5S1TikBueaiBMZznfOmFqWsJBe1Ai54nrNKLEupijrtSwGONVqKUpyT68m3x-5rcCGadfqvTScNT5aFVBL2LD6xLHYhoGtMj35b4WiAmX2CZkrQpATNIUEzJpGYRCGR25XDP-t_VD-MjXSO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2531845419</pqid></control><display><type>article</type><title>Privacy-preserving biometric verification with outsourced correlation filter computation</title><source>ABI/INFORM Global</source><source>Springer Link</source><creator>Taheri, Motahareh ; Mozaffari, Saeed ; Keshavarzi, Parviz</creator><creatorcontrib>Taheri, Motahareh ; Mozaffari, Saeed ; Keshavarzi, Parviz</creatorcontrib><description>In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-10648-y</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Biometrics ; Cloud computing ; Computer Communication Networks ; Computer Science ; Data centers ; Data Structures and Information Theory ; Datasets ; Multimedia Information Systems ; Personal computers ; Privacy ; Servers ; Special Purpose and Application-Based Systems ; Verification</subject><ispartof>Multimedia tools and applications, 2021-06, Vol.80 (14), p.21425-21448</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393</citedby><cites>FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2531845419/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2531845419?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Taheri, Motahareh</creatorcontrib><creatorcontrib>Mozaffari, Saeed</creatorcontrib><creatorcontrib>Keshavarzi, Parviz</creatorcontrib><title>Privacy-preserving biometric verification with outsourced correlation filter computation</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset.</description><subject>Biometrics</subject><subject>Cloud computing</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data centers</subject><subject>Data Structures and Information Theory</subject><subject>Datasets</subject><subject>Multimedia Information Systems</subject><subject>Personal computers</subject><subject>Privacy</subject><subject>Servers</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Verification</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9UMtOwzAQtBBIlMcPcIrE2eD1I06OqOIlVYIDSNys1HGKqzYJa6cof4_bIHHjsruanZldDSFXwG6AMX0bAJjklHGgwHJZ0PGIzEBpQbXmcJxmUTCqFYNTchbCmjHIFZcz8vGKflfZkfbogsOdb1fZ0ndbF9HbbOfQN95W0Xdt9u3jZ9YNMXQDWldntkN0m2nX-E10mKBtP8QDdEFOmmoT3OVvPyfvD_dv8ye6eHl8nt8tqBVQxlRLy5S1TikBueaiBMZznfOmFqWsJBe1Ai54nrNKLEupijrtSwGONVqKUpyT68m3x-5rcCGadfqvTScNT5aFVBL2LD6xLHYhoGtMj35b4WiAmX2CZkrQpATNIUEzJpGYRCGR25XDP-t_VD-MjXSO</recordid><startdate>20210601</startdate><enddate>20210601</enddate><creator>Taheri, Motahareh</creator><creator>Mozaffari, Saeed</creator><creator>Keshavarzi, Parviz</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20210601</creationdate><title>Privacy-preserving biometric verification with outsourced correlation filter computation</title><author>Taheri, Motahareh ; Mozaffari, Saeed ; Keshavarzi, Parviz</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Biometrics</topic><topic>Cloud computing</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data centers</topic><topic>Data Structures and Information Theory</topic><topic>Datasets</topic><topic>Multimedia Information Systems</topic><topic>Personal computers</topic><topic>Privacy</topic><topic>Servers</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Taheri, Motahareh</creatorcontrib><creatorcontrib>Mozaffari, Saeed</creatorcontrib><creatorcontrib>Keshavarzi, Parviz</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Complete database</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer science database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Taheri, Motahareh</au><au>Mozaffari, Saeed</au><au>Keshavarzi, Parviz</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy-preserving biometric verification with outsourced correlation filter computation</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-06-01</date><risdate>2021</risdate><volume>80</volume><issue>14</issue><spage>21425</spage><epage>21448</epage><pages>21425-21448</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage, capacity, and computational power, both cloud computing and data centers provide these facilities for users and enterprises. However, shifting from user-owned and user-operated system to public and untrusted access services have raised concerns over data security, either in storage or computation phases. In this work, we propose a framework for fully privacy-preserving biometric verification with outsourcing computational tasks to the commerical public cloudsl. Firstly, privacy of the data used for biometric verification is preserved by encrypting training images. Secondly, for protecting the privacy of the biometric verification model, all correlation filter computation and verification stage are performed over encrypted biometric images in server side. Finally, privacy of the biometric verification result is preserved by sending it to the client for further investigation. Our solution provides anonymous access, unlinkability, and the confidentiality of transmitted data. I will be shown that our scheme is secure in the semi-honest server and has it reaches accuracy of 93.7% on facial dataset and 92% on fingerprint dataset.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-10648-y</doi><tpages>24</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-06, Vol.80 (14), p.21425-21448 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2531845419 |
source | ABI/INFORM Global; Springer Link |
subjects | Biometrics Cloud computing Computer Communication Networks Computer Science Data centers Data Structures and Information Theory Datasets Multimedia Information Systems Personal computers Privacy Servers Special Purpose and Application-Based Systems Verification |
title | Privacy-preserving biometric verification with outsourced correlation filter computation |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A13%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy-preserving%20biometric%20verification%20with%20outsourced%20correlation%20filter%20computation&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Taheri,%20Motahareh&rft.date=2021-06-01&rft.volume=80&rft.issue=14&rft.spage=21425&rft.epage=21448&rft.pages=21425-21448&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-10648-y&rft_dat=%3Cproquest_cross%3E2531845419%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-c39c05cce5531672391026762fd394a423d51232660a3b9458d026931e0f74393%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2531845419&rft_id=info:pmid/&rfr_iscdi=true |