[1] |
SPREEUWERS L J , HENDRIKSE A J , GERRITSEN K J . Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at schiphol airport[C]// International Conference of Biometrics Special Interest Group. Piscataway:IEEE Press, 2012: 1-6.
|
[2] |
SAMANTHA S . Credit card with a fingerprint sensor revealed by mastercard[EB].(2017-04-20)[2020-03-08].
|
[3] |
RICHARD W . Face recognition tested to monitor terrorist suspects[EB].(2017-07-20)[2020-03-08].
|
[4] |
WU H . Alleged breach of India's biometric database could put 1.2bn users at risk[EB].(2018-01-11)[2020-03-08].
|
[5] |
Avast Security News Team . Biometric security platform leaves 28M records unsecured[EB].(2019-08-16[2020-03-08].
|
[6] |
LI Q , ZHU H , ZHANG Z ,et al. Spoofing attacks on speaker verification systems based generated voice using genetic algorithm[C]// 2019 IEEE International Conference on Communications. Piscataway:IEEE Press, 2019: 1-6.
|
[7] |
李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11.
|
|
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11.
|
[8] |
BENSON B . Fingerprint not recognized:why the united states needs to protect biometric privacy[J]. North Carolina Journal of Law &Technology, 2018,19(4): 161-192.
|
[9] |
LI F H , LI H , NIU B ,et al. Privacy computing:concept,computing framework,and future development trends[J]. Engineering, 2019,5(9): 1179-1192.
|
[10] |
朱辉, 武衡, 赵海强 ,等. 适用于双层卫星网络的星间组网认证方案[J]. 通信学报, 2019,40(3): 1-9.
|
|
ZHU H , WU H , ZHAO H Q ,et al. Efficient authentication scheme for double-layer satellite network[J]. Journal on Communications, 2019,40(3): 1-9.
|
[11] |
ERKIN Z , FRANZ M , GUAJARDO J ,et al. Privacy-preserving face recognition[C]// International Symposium on Privacy Enhancing Technologies Symposium. Berlin:Springer, 2009: 235-253.
|
[12] |
DAMGARD I. , GEISLER M , KRIGAARD M ,et al. Efficient and secure comparison for on-line auctions[C]// Australasian Conference on Information Security and Privacy. Berlin:Springer, 2007: 416-430.
|
[13] |
SADEGHI A , SCHNEIDER T , WEHRENBERG I . Efficient privacy-preserving face recognition[C]// International Conference on Information Security and Cryptology. Berlin:Springer, 2009: 229-244.
|
[14] |
XIANG C , TANG C , CAI Y ,et al. Privacy-preserving face recognition with outsourced computation[J]. Soft Computing, 2016,20(9): 3735-3744.
|
[15] |
ZHU H , WEI Q , YANG X P ,et al. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data[J]. IEEE Transactions on Cloud Computing, 2018:1.
|
[16] |
YUAN J , YU S . Efficient privacy-preserving biometric identification in cloud computing[C]// 2013 Proceedings IEEE International Conference on Computer Communications. Piscataway:IEEE Press, 2013: 2652-2660.
|
[17] |
WANG Q , HU S , REN K ,et al. CloudBI:practical privacy-preserving outsourcing of biometric identification in the cloud[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2015: 186-205.
|
[18] |
ZHU L , ZHANG C , XU C ,et al. An efficient and privacy-preserving biometric identification scheme in cloud computing[J]. IEEE Access, 2018(6): 19025-19033.
|
[19] |
RAHULAMATHAVAN Y , RAJARAJAN M . Hide-and-seek:face recognition in private[C]// 2015 IEEE International Conference on Communications. Piscataway:IEEE Press, 2015: 7102-7107.
|
[20] |
GUNASINGHE H , BERTINO E . PrivBioMTAuth:privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones[J]. IEEE Transactions on Information Forensics & Security, 2018,13(4): 1042-1057.
|
[21] |
SARIER N D , . Privacy preserving biometric identification on the bitcoin blockchain[C]// 2018 International Symposium on Cyberspace Safety and Security. Berlin:Springer, 2018: 254-269.
|
[22] |
TURK M A , PENTLAND A P . Face recognition using eigenfaces[C]// Proceedings of 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 1991: 586-591.
|
[23] |
GUPTA S , SAHOO O P , GOEL A ,et al. A new optimized approach to face recognition using eigenfaces[J]. Global Journal of Computer Science and Technology, 2010(10): 15-17.
|
[24] |
SHAN S , CAO B , GAO W ,et al. Extended fisherface for face recognition from a single example image per person[C]// 2002 IEEE International Symposium on Circuits and Systems.Proceedings. Piscataway:IEEE Press, 2002,(2): 81-84.
|
[25] |
LIU K , GIANNELLA C , KARGUPTA H . An attacker’s view of distance preserving maps for privacy preserving data mining[C]// European Conference on Principles of Data Mining and Knowledge Discovery. Berlin:Springer, 2006: 297-308.
|
[26] |
CAO N , YANG Z , WANG C ,et al. Privacy-preserving query over encrypted graph-structured data in cloud computing[C]// 2011 31st International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2011: 393-402.
|
[27] |
WONG W K , CHEUNG D W , KAO B ,et al. Secure KNN computation on encrypted databases[C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. New York:ACM Press, 2009: 139-152.
|
[28] |
AT&T Laboratories Cambridge. The ORL database of faces[DB]. AT&T Labs Research,[2020-03-08].
|