Ciphertext face recognition system based on secure inner product protocol (2024)

research-article

Free Access

  • Authors:
  • Xuelian Li School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China

    School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China

    Search about this author

    ,
  • Zhuohao Chen School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China

    School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China

    Search about this author

    ,
  • Juntao Gao School of Telecommunications Engineering, Xidian University, Xi’an, 710071, China

    School of Telecommunications Engineering, Xidian University, Xi’an, 710071, China

    Search about this author

Journal of Information Security and ApplicationsVolume 80Issue CFeb 2024https://doi.org/10.1016/j.jisa.2023.103681

Published:17 April 2024Publication History

  • 0citation
  • 0
  • Downloads

Metrics

Total Citations0Total Downloads0

Last 12 Months0

Last 6 weeks0

Journal of Information Security and Applications

Volume 80, Issue C

PreviousArticleNextArticle

Ciphertext face recognition system based on secure inner product protocol (1)

Skip Abstract Section

Abstract

Abstract

User privacy data leakage is a major weakness of current plaintext face recognition systems. This article combines Pallier hom*omorphic encryption algorithm with inner product protocol and face recognition to construct a ciphertext face recognition system based on inner product protocol. Firstly, we integrate the Pallier hom*omorphic encryption algorithm into the inner product protocol process and design a secure inner product protocol. Through simulation experiments, it can be seen that the time and communication costs of the secure inner product can be reduced to and respectively at the expense of a portion of the applicable scope, where is the vector length. Secondly, we provide specific steps for combining FaceNet face recognition algorithm with secure inner product protocol, then design a ciphertext face recognition system that does not require a trusted third party and analyze its correctness, security and time cost. Through experiments, it can be concluded that the accuracy of plaintext face recognition and ciphertext face recognition on the test set is 98.78% and 98.78%, respectively. The application of Pallier hom*omorphic encryption algorithm has not affected its recognition performance, which means that the system can provide high accuracy face recognition services while protecting user privacy.

References

  1. [1] Le Q.D., Vu T.T.C., Vo T.Q., Application of 3D face recognition in the access control system, Robotica 40 (7) (2022) 24492467, 10.1017/s0263574721001739.Google ScholarCiphertext face recognition system based on secure inner product protocol (2)Cross Ref
  2. [2] Bouras C., Michos E., An online real-time face recognition system for police purposes, in: 2022 international conference on information networking (ICOIN), 2022,10.1109/icoin53446.2022.9687212.Google ScholarCiphertext face recognition system based on secure inner product protocol (4)Cross Ref
  3. [3] Vishnuvardhan G., Ravi V., Face recognition using transfer learning on facenet: Application to banking operations, in: Studies in computational intelligence, modern approaches in machine learning and cognitive science: a walkthrough, 2021, pp. 301309, 10.1007/978-3-030-68291-0_23.Google ScholarCiphertext face recognition system based on secure inner product protocol (6)Cross Ref
  4. [4] Rivest R., Dertouzos M., On data banks and privacy hom*omorphisms, 1978.Google ScholarCiphertext face recognition system based on secure inner product protocol (8)
  5. [5] Erkin Z., Franz M., Guajardo J., Katzenbeisser S., Lagendijk I., Toft T., Privacy-preserving face recognition, in: Privacy enhancing technologies, in: Lecture notes in computer science, 2009, pp. 235253, 10.1007/978-3-642-03168-7_14.Google ScholarCiphertext face recognition system based on secure inner product protocol (9)Digital Library
  6. [6] Bouzerna N., Sirdey R., Stan O., Nguyen T.H., Wolf P., An architecture for practical confidentiality-strengthened face authentication embedding hom*omorphic cryptography, in: 2016 IEEE international conference on cloud computing technology and science (CloudCom), 2016,10.1109/cloudcom.2016.0069.Google ScholarCiphertext face recognition system based on secure inner product protocol (11)Cross Ref
  7. [7] Drozdowski P, Buchmann N, Rathgeb C, Margraf M, Busch C. On the Application of hom*omorphic Encryption to Face Identification. In: International conference on biometrics, international conference on biometrics. 2019.Google ScholarCiphertext face recognition system based on secure inner product protocol (13)
  8. [8] Barni M., Bianchi T., Catalano D., Di Raimondo M., Labati R.D., Failla P., Fiore D., Lazzeretti R., Piuri V., Piva A., Scotti F., A privacy-compliant fingerprint recognition system based on hom*omorphic encryption and fingercode templates, in: 2010 fourth IEEE international conference on biometrics: theory, applications and systems (BTAS), 2010,10.1109/btas.2010.5634527.Google ScholarCiphertext face recognition system based on secure inner product protocol (14)Cross Ref
  9. [9] Li M., Feng Q., Zhao J., Yang M., Kang L., Wu L., Minutiae matching with privacy protection based on the combination of garbled circuit and hom*omorphic encryption, Sci World J 2014 (2014) 113, 10.1155/2014/525387.Google ScholarCiphertext face recognition system based on secure inner product protocol (16)Cross Ref
  10. [10] Kim T., Oh Y., Kim H., Efficient privacy-preserving fingerprint-based authentication system using fully hom*omorphic encryption, Secur Commun Netw (2020) 111, 10.1155/2020/4195852.Google ScholarCiphertext face recognition system based on secure inner product protocol (18)Digital Library
  11. [11] Salem M., Taheri S., Yuan J.-S., Utilizing transfer learning and hom*omorphic encryption in a privacy preserving and secure biometric recognition system, Computers 8 (1) (2018) 3, 10.3390/computers8010003.Google ScholarCiphertext face recognition system based on secure inner product protocol (20)Cross Ref
  12. [12] Paillier P., Public-key cryptosystems based on composite degree residuosity classes, in: Advances in cryptology — EUROCRYPT ’99, in: Lecture notes in computer science, 2007, pp. 223238, 10.1007/3-540-48910-x_16.Google ScholarCiphertext face recognition system based on secure inner product protocol (22)Cross Ref
  13. [13] Morampudi M.K., Prasad M.V.N.K., Raju U.S.N., Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor, Appl Intell (2021) 68236836, 10.1007/s10489-021-02187-8.Google ScholarCiphertext face recognition system based on secure inner product protocol (24)Digital Library
  14. [14] Schroff F., Kalenichenko D., Philbin J., FaceNet: A unified embedding for face recognition and clustering, in: 2015 IEEE conference on computer vision and pattern recognition (CVPR), 2015,10.1109/cvpr.2015.7298682.Google ScholarCiphertext face recognition system based on secure inner product protocol (26)Cross Ref
  15. [15] Goldreich O., Foundations of cryptography: volume 2, basic applications, Cambridge University Press, USA, ISBN 0521830842, 2004.Google ScholarCiphertext face recognition system based on secure inner product protocol (28)
  16. [16] Oded G., Foundations of cryptography: Volume 2, basic applications, 2004.Google ScholarCiphertext face recognition system based on secure inner product protocol (29)
  17. [17] Taigman Y., Yang M., Ranzato M., Wolf L., DeepFace: Closing the gap to human-level performance in face verification, in: 2014 IEEE conference on computer vision and pattern recognition, 2014,10.1109/cvpr.2014.220.Google ScholarCiphertext face recognition system based on secure inner product protocol (30)Digital Library
  18. [18] Sun Y., Wang X., Tang X., Deeply learned face representations are sparse, selective, and robust, in: 2015 IEEE conference on computer vision and pattern recognition (CVPR), 2015,10.1109/cvpr.2015.7298907.Google ScholarCiphertext face recognition system based on secure inner product protocol (32)Cross Ref
  19. [19] Liu W., Wen Y., Yu Z., Li M., Raj B., Song L., SphereFace: Deep hypersphere embedding for face recognition, in: 2017 IEEE conference on computer vision and pattern recognition (CVPR), 2017,10.1109/cvpr.2017.713.Google ScholarCiphertext face recognition system based on secure inner product protocol (34)Cross Ref
  20. [20] Huang G., Mattar M., Berg T., Learned-Miller E., Labeled faces in the wild: A database forstudying face recognition in unconstrained environments, 2008.Google ScholarCiphertext face recognition system based on secure inner product protocol (36)
  21. [21] Zhang K., Zhang Z., Li Z., Qiao Y., Joint face detection and alignment using multi-task cascaded convolutional networks, IEEE Signal Process Lett (2016) 14991503, 10.1109/lsp.2016.2603342.Google ScholarCiphertext face recognition system based on secure inner product protocol (37)Cross Ref
  22. [22] Shundong L., Mengyu Z., Wenting X., Secure scalar product protocols, Chin J Electron 30 (6) (2021) 10591068, 10.1049/cje.2021.07.018.Google ScholarCiphertext face recognition system based on secure inner product protocol (39)Cross Ref
  23. [23] Luo L., Yonglong Y., Huang H., Liusheng L., Chen C., Guoliang G., Shen S., Hong H., Privacy-preserving distance measurement and its applications, 2006.Google ScholarCiphertext face recognition system based on secure inner product protocol (41)
  24. [24] Amirbekyan A, Estivill-Castro V. A new efficient privacy-preserving scalar product protocol. In: Australasian data mining conference, Australasian data mining conference. 2007.Google ScholarCiphertext face recognition system based on secure inner product protocol (42)
  25. [25] Rane S., Sun W., Vetro A., Privacy-preserving approximation of L1 distance for multimedia applications, in: 2010 IEEE international conference on multimedia and expo, 2010,10.1109/icme.2010.5583030.Google ScholarCiphertext face recognition system based on secure inner product protocol (43)Cross Ref
  26. [26] Hong Z., Yan-fei S., Feifei Y., Hongsheng H., Protocol for privacy-preserving space closest-pair of points, in: Computer engineering and applications, computer engineering and applications, 2011.Google ScholarCiphertext face recognition system based on secure inner product protocol (45)
  27. [27] Lu R., Lin X., Shen X., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency, IEEE Trans Parallel Distrib Syst 24 (3) (2013) 614624, 10.1109/tpds.2012.146.Google ScholarCiphertext face recognition system based on secure inner product protocol (46)Digital Library
  28. [28] Huang H., Gong T., Chen P., Malekian R., Chen T., Secure two-party distance computation protocol based on privacy hom*omorphism and scalar product in wireless sensor networks, Tsinghua Sci Technol 21 (4) (2016) 385396, 10.1109/tst.2016.7536716.Google ScholarCiphertext face recognition system based on secure inner product protocol (48)Cross Ref
  29. [29] Yi D., Lei Z., Liao S., Li S., Learning face representation from scratch, 2014, Cornell University - arXiv,Cornell University - arXiv.Google ScholarCiphertext face recognition system based on secure inner product protocol (50)

Cited By

View all

Ciphertext face recognition system based on secure inner product protocol (51)

    Recommendations

    • Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext

      SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud Computing

      In this paper, we present a new inner product proxy re-encryption scheme. The scheme can easily be converted into a threshold attribute-based proxy re-encryption scheme, and can be used to provide fine-grained access control in cloud storage systems. ...

      Read More

    • Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext

      Abstract

      Threshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based threshold PKEs have not been ...

      Read More

    • Automatic face analysis system based on face recognition and facial physiognomy

      ICHIT'06: Proceedings of the 1st international conference on Advances in hybrid information technology

      An automatic face analysis system is proposed which uses face recognition and facial physiognomy. It first detects human's face, extracts its features, and classifies the shape of facial features. It will analyze the person's facial physiognomy and then ...

      Read More

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    Get this Article

    • Information
    • Contributors
    • Published in

      Ciphertext face recognition system based on secure inner product protocol (52)

      Journal of Information Security and Applications Volume 80, Issue C

      Feb 2024

      321 pages

      ISSN:2214-2126

      Issue’s Table of Contents

      Elsevier Ltd

      Sponsors

        In-Cooperation

          Publisher

          Elsevier Science Inc.

          United States

          Publication History

          • Published: 17 April 2024

          Author Tags

          • Pallier hom*omorphic encryption
          • Inner product protocol
          • FaceNet face recognition algorithm

          Qualifiers

          • research-article

          Conference

          Funding Sources

          • Ciphertext face recognition system based on secure inner product protocol (53)

            Other Metrics

            View Article Metrics

          • Bibliometrics
          • Citations0
          • Article Metrics

            • Total Citations

              View Citations
            • Total Downloads

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0

            Other Metrics

            View Author Metrics

          • Cited By

            This publication has not been cited yet

          Digital Edition

          View this article in digital edition.

          View Digital Edition

          • Figures
          • Other

            Close Figure Viewer

            Browse AllReturn

            Caption

            View Issue’s Table of Contents

            Export Citations

              Ciphertext face recognition system based on secure inner product protocol (2024)
              Top Articles
              Latest Posts
              Article information

              Author: Gov. Deandrea McKenzie

              Last Updated:

              Views: 5375

              Rating: 4.6 / 5 (66 voted)

              Reviews: 89% of readers found this page helpful

              Author information

              Name: Gov. Deandrea McKenzie

              Birthday: 2001-01-17

              Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

              Phone: +813077629322

              Job: Real-Estate Executive

              Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

              Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.