2018
DOI: 10.3390/computers8010003
|View full text |Cite
|
Sign up to set email alerts
|

Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System

Abstract: Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud. Due to the fact that biometric data like fingerprint and iris cannot be changed, storing them on the cloud creates vulnerability and can potentially have catastrophic consequences if these data are leaked. In the recent years, in order to preserve the privacy of the users, homomorphic encryption has been used to enable comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(25 citation statements)
references
References 25 publications
(26 reference statements)
0
25
0
Order By: Relevance
“…We introduce Swarm Learning as a decentralized learning system with access to data stored locally that can replace the current paradigm of data sharing and centralized storage while preserving data privacy in cross-institutional research in a wide spectrum of biomedical disciplines. Furthermore, SL can easily inherit developments to further preserve privacy such as functional encryption 64 , or encrypted transfer learning approaches 65 .…”
Section: Discussionmentioning
confidence: 99%
“…We introduce Swarm Learning as a decentralized learning system with access to data stored locally that can replace the current paradigm of data sharing and centralized storage while preserving data privacy in cross-institutional research in a wide spectrum of biomedical disciplines. Furthermore, SL can easily inherit developments to further preserve privacy such as functional encryption 64 , or encrypted transfer learning approaches 65 .…”
Section: Discussionmentioning
confidence: 99%
“…Several approaches have been proposed on privacy preserving DNN models, data mining, biometric recognition systems, IoT environment and wireless sensor networks by many authors. Some of these approaches include the multiple objective particle swarm optimization technique that relies on density clustering approach to hide sensitive information (CMPSO) [41], DeepZeroID based on homomorphic encryption [42], hierarchical-clustering mechanism [43], and differential privacy [17,18]. The differentially private models sometimes performed learning on clean data and use either the Laplace mechanism or an exponential mechanism to preserve privacy in the model [10].…”
Section: Review Of Existing Privacy Preserving Modelsmentioning
confidence: 99%
“…For the semi-honest model, the former protocol is secure under known-sample attack (KSA), and the latter one achieves the security under known-plaintext attack (KPA). Achieving both the requirements of data security and verifiability, Salem et al [273] proposed a privacy-preserving biometric recognition system. Based on the property of additive homomorphism, the recognition process is operated on the encrypted features.…”
Section: ) Biometric Authenticationmentioning
confidence: 99%