research-article Free Access
- Authors:
- Xuelian Li School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China
School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China
Search about this author
- Zhuohao Chen School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China
School of Mathematics and Statistics, Xidian University, Xi’an, 710071, China
Search about this author
- Juntao Gao School of Telecommunications Engineering, Xidian University, Xi’an, 710071, China
School of Telecommunications Engineering, Xidian University, Xi’an, 710071, China
Search about this author
Journal of Information Security and ApplicationsVolume 80Issue CFeb 2024https://doi.org/10.1016/j.jisa.2023.103681
Published:17 April 2024Publication History
- 0citation
- 0
- Downloads
Metrics
Total Citations0Total Downloads0Last 12 Months0
Last 6 weeks0
- Get Citation Alerts
New Citation Alert added!
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
Manage my Alerts
New Citation Alert!
Please log in to your account
See AlsoCipher — Explained, Definition and Examples | Metaverse PostEvasive Tactics: Taidoor | Mandiant | Google Cloud BlogRed Hat JBoss Enterprise Application Platform 7.4 brings new developer and operations capabilities | Red Hat DeveloperHow to apply AI effectively for Transport Layer Security (TLS) - HogoNext - Publisher Site
Journal of Information Security and Applications
Volume 80, Issue C
PreviousArticleNextArticle
Abstract
Abstract
User privacy data leakage is a major weakness of current plaintext face recognition systems. This article combines Pallier hom*omorphic encryption algorithm with inner product protocol and face recognition to construct a ciphertext face recognition system based on inner product protocol. Firstly, we integrate the Pallier hom*omorphic encryption algorithm into the inner product protocol process and design a secure inner product protocol. Through simulation experiments, it can be seen that the time and communication costs of the secure inner product can be reduced to and respectively at the expense of a portion of the applicable scope, where is the vector length. Secondly, we provide specific steps for combining FaceNet face recognition algorithm with secure inner product protocol, then design a ciphertext face recognition system that does not require a trusted third party and analyze its correctness, security and time cost. Through experiments, it can be concluded that the accuracy of plaintext face recognition and ciphertext face recognition on the test set is 98.78% and 98.78%, respectively. The application of Pallier hom*omorphic encryption algorithm has not affected its recognition performance, which means that the system can provide high accuracy face recognition services while protecting user privacy.
References
- [1] Le Q.D., Vu T.T.C., Vo T.Q., Application of 3D face recognition in the access control system, Robotica 40 (7) (2022) 2449–2467, 10.1017/s0263574721001739.Google ScholarCross Ref
- [2] Bouras C., Michos E.,
An online real-time face recognition system for police purposes , in: 2022 international conference on information networking (ICOIN), 2022,10.1109/icoin53446.2022.9687212.Google ScholarCross Ref - [3] Vishnuvardhan G., Ravi V.,
Face recognition using transfer learning on facenet: Application to banking operations , in: Studies in computational intelligence, modern approaches in machine learning and cognitive science: a walkthrough, 2021, pp. 301–309, 10.1007/978-3-030-68291-0_23.Google ScholarCross Ref - [4] Rivest R., Dertouzos M., On data banks and privacy hom*omorphisms, 1978.Google Scholar
- [5] Erkin Z., Franz M., Guajardo J., Katzenbeisser S., Lagendijk I., Toft T.,
Privacy-preserving face recognition , in: Privacy enhancing technologies, in:Lecture notes in computer science , 2009, pp. 235–253, 10.1007/978-3-642-03168-7_14.Google ScholarDigital Library - [6] Bouzerna N., Sirdey R., Stan O., Nguyen T.H., Wolf P.,
An architecture for practical confidentiality-strengthened face authentication embedding hom*omorphic cryptography , in: 2016 IEEE international conference on cloud computing technology and science (CloudCom), 2016,10.1109/cloudcom.2016.0069.Google ScholarCross Ref - [7] Drozdowski P, Buchmann N, Rathgeb C, Margraf M, Busch C. On the Application of hom*omorphic Encryption to Face Identification. In: International conference on biometrics, international conference on biometrics. 2019.Google Scholar
- [8] Barni M., Bianchi T., Catalano D., Di Raimondo M., Labati R.D., Failla P., Fiore D., Lazzeretti R., Piuri V., Piva A., Scotti F.,
A privacy-compliant fingerprint recognition system based on hom*omorphic encryption and fingercode templates , in: 2010 fourth IEEE international conference on biometrics: theory, applications and systems (BTAS), 2010,10.1109/btas.2010.5634527.Google ScholarCross Ref - [9] Li M., Feng Q., Zhao J., Yang M., Kang L., Wu L., Minutiae matching with privacy protection based on the combination of garbled circuit and hom*omorphic encryption, Sci World J 2014 (2014) 1–13, 10.1155/2014/525387.Google ScholarCross Ref
- [10] Kim T., Oh Y., Kim H., Efficient privacy-preserving fingerprint-based authentication system using fully hom*omorphic encryption, Secur Commun Netw (2020) 1–11, 10.1155/2020/4195852.Google ScholarDigital Library
- [11] Salem M., Taheri S., Yuan J.-S., Utilizing transfer learning and hom*omorphic encryption in a privacy preserving and secure biometric recognition system, Computers 8 (1) (2018) 3, 10.3390/computers8010003.Google ScholarCross Ref
- [12] Paillier P.,
Public-key cryptosystems based on composite degree residuosity classes , in: Advances in cryptology — EUROCRYPT ’99, in:Lecture notes in computer science , 2007, pp. 223–238, 10.1007/3-540-48910-x_16.Google ScholarCross Ref - [13] Morampudi M.K., Prasad M.V.N.K., Raju U.S.N., Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor, Appl Intell (2021) 6823–6836, 10.1007/s10489-021-02187-8.Google ScholarDigital Library
- [14] Schroff F., Kalenichenko D., Philbin J.,
FaceNet: A unified embedding for face recognition and clustering , in: 2015 IEEE conference on computer vision and pattern recognition (CVPR), 2015,10.1109/cvpr.2015.7298682.Google ScholarCross Ref - [15] Goldreich O., Foundations of cryptography: volume 2, basic applications, Cambridge University Press, USA, ISBN 0521830842, 2004.Google Scholar
- [16] Oded G., Foundations of cryptography: Volume 2, basic applications, 2004.Google Scholar
- [17] Taigman Y., Yang M., Ranzato M., Wolf L.,
DeepFace: Closing the gap to human-level performance in face verification , in: 2014 IEEE conference on computer vision and pattern recognition, 2014,10.1109/cvpr.2014.220.Google ScholarDigital Library - [18] Sun Y., Wang X., Tang X.,
Deeply learned face representations are sparse, selective, and robust , in: 2015 IEEE conference on computer vision and pattern recognition (CVPR), 2015,10.1109/cvpr.2015.7298907.Google ScholarCross Ref - [19] Liu W., Wen Y., Yu Z., Li M., Raj B., Song L.,
SphereFace: Deep hypersphere embedding for face recognition , in: 2017 IEEE conference on computer vision and pattern recognition (CVPR), 2017,10.1109/cvpr.2017.713.Google ScholarCross Ref - [20] Huang G., Mattar M., Berg T., Learned-Miller E., Labeled faces in the wild: A database forstudying face recognition in unconstrained environments, 2008.Google Scholar
- [21] Zhang K., Zhang Z., Li Z., Qiao Y., Joint face detection and alignment using multi-task cascaded convolutional networks, IEEE Signal Process Lett (2016) 1499–1503, 10.1109/lsp.2016.2603342.Google ScholarCross Ref
- [22] Shundong L., Mengyu Z., Wenting X., Secure scalar product protocols, Chin J Electron 30 (6) (2021) 1059–1068, 10.1049/cje.2021.07.018.Google ScholarCross Ref
- [23] Luo L., Yonglong Y., Huang H., Liusheng L., Chen C., Guoliang G., Shen S., Hong H., Privacy-preserving distance measurement and its applications, 2006.Google Scholar
- [24] Amirbekyan A, Estivill-Castro V. A new efficient privacy-preserving scalar product protocol. In: Australasian data mining conference, Australasian data mining conference. 2007.Google Scholar
- [25] Rane S., Sun W., Vetro A.,
Privacy-preserving approximation of L1 distance for multimedia applications , in: 2010 IEEE international conference on multimedia and expo, 2010,10.1109/icme.2010.5583030.Google ScholarCross Ref - [26] Hong Z., Yan-fei S., Feifei Y., Hongsheng H.,
Protocol for privacy-preserving space closest-pair of points , in: Computer engineering and applications, computer engineering and applications, 2011.Google Scholar - [27] Lu R., Lin X., Shen X., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency, IEEE Trans Parallel Distrib Syst 24 (3) (2013) 614–624, 10.1109/tpds.2012.146.Google ScholarDigital Library
- [28] Huang H., Gong T., Chen P., Malekian R., Chen T., Secure two-party distance computation protocol based on privacy hom*omorphism and scalar product in wireless sensor networks, Tsinghua Sci Technol 21 (4) (2016) 385–396, 10.1109/tst.2016.7536716.Google ScholarCross Ref
- [29] Yi D., Lei Z., Liao S., Li S., Learning face representation from scratch, 2014, Cornell University - arXiv,Cornell University - arXiv.Google Scholar
Cited By
View all
Recommendations
- Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext
SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud Computing
In this paper, we present a new inner product proxy re-encryption scheme. The scheme can easily be converted into a threshold attribute-based proxy re-encryption scheme, and can be used to provide fine-grained access control in cloud storage systems. ...
Read More
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
Abstract
Threshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based threshold PKEs have not been ...
Read More
- Automatic face analysis system based on face recognition and facial physiognomy
ICHIT'06: Proceedings of the 1st international conference on Advances in hybrid information technology
An automatic face analysis system is proposed which uses face recognition and facial physiognomy. It first detects human's face, extracts its features, and classifies the shape of facial features. It will analyze the person's facial physiognomy and then ...
Read More
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in
Full Access
Get this Article
- Information
- Contributors
Published in
Journal of Information Security and Applications Volume 80, Issue C
Feb 2024
321 pages
ISSN:2214-2126
Issue’s Table of Contents
Elsevier Ltd
Sponsors
In-Cooperation
Publisher
Elsevier Science Inc.
United States
Publication History
- Published: 17 April 2024
Author Tags
- Pallier hom*omorphic encryption
- Inner product protocol
- FaceNet face recognition algorithm
Qualifiers
- research-article
Conference
Funding Sources
Other Metrics
View Article Metrics
- Bibliometrics
- Citations0
Article Metrics
- View Citations
Total Citations
Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
View Author Metrics
Cited By
This publication has not been cited yet
Digital Edition
View this article in digital edition.
View Digital Edition
- Figures
- Other
Close Figure Viewer
Browse AllReturn
Caption
View Issue’s Table of Contents