2021
DOI: 10.1155/2021/2313389
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree

Abstract: Biometric identification services have been applied to almost all aspects of life. However, how to securely and efficiently identify an individual in a huge biometric dataset is still very challenging. For one thing, biometric data is very sensitive and should be kept secure during the process of biometric identification. On the other hand, searching a biometric template in a large dataset can be very time-consuming, especially when some privacy-preserving measures are adopted. To address this problem, we prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…In addition, the cancelation and renewal capacity depends on the RNG's power and the algorithm's complexity to generate the encryption keys within the set of allowed elements. Some authentication systems with protection based on homomorphic encryption that calculates the squared Euclidean distance in the encrypted domain were proposed for biometric traits such as fingerprint [102], iris [103], and face [104], [105]. In addition, [106] proposed an authentication system for speaker recognition that implemented cosine similarity in the encrypted domain.…”
Section: ) Homomorphic Encryptionmentioning
confidence: 99%
“…In addition, the cancelation and renewal capacity depends on the RNG's power and the algorithm's complexity to generate the encryption keys within the set of allowed elements. Some authentication systems with protection based on homomorphic encryption that calculates the squared Euclidean distance in the encrypted domain were proposed for biometric traits such as fingerprint [102], iris [103], and face [104], [105]. In addition, [106] proposed an authentication system for speaker recognition that implemented cosine similarity in the encrypted domain.…”
Section: ) Homomorphic Encryptionmentioning
confidence: 99%