Journal on Communications ›› 2018, Vol. 39 ›› Issue (2): 122-134.doi: 10.11959/j.issn.1000-436x.2018031
• Papers • Previous Articles Next Articles
Shan JIA1,2,Zhengquan XU1,2,Chuanbo HU1,2,Hao WANG1,2
Revised:
2018-01-13
Online:
2018-02-01
Published:
2018-03-28
Supported by:
CLC Number:
Shan JIA,Zhengquan XU,Chuanbo HU,Hao WANG. Fingerprint template protection by adopting random projection based on re-encryption[J]. Journal on Communications, 2018, 39(2): 122-134.
[1] | CAVOUKIAN A , STOIANOV A . Biometric encryption[M]. Boston,USA: Springer US, 2011: 90-98. |
[2] | NAGAR A . Biometric template security[M]. Switzerland: Springer International Publishing, 2012. |
[3] | SANDHYA M , PRASAD M V N K . Biometric template protection:a systematic literature review of approaches and modalities[M]// Biometric Security and Privacy. Springer International Publishing, 2017: 323-370. |
[4] | SANDHYA M , PRASAD M V N K , CHILLARIGE R R . Generating cancellable fingerprint templates based on Delaunay triangle feature set construction[J]. IET Biometrics, 2016,5(2): 131-139. |
[5] | CAVOUKIAN A , SNIJDER M , STOIANOV A ,et al. Privacy and biometrics for authentication purposes:a discussion of untraceable biometrics and biometric encryption[M]// Ethics and Policy of Biometrics. Springer Berlin Heidelberg, 2010: 14-22. |
[6] | BOULGOURIS N V , PLATANIOTIS K N MICHELI-TZANAKOU E . Biometric encryption:the new breed of untraceable biometrics[M]. Biometrics:Theory,Methods,and Applications.John Wiley & Sons,Inc. 2009: 655-718. |
[7] | ACHLIOPTAS D , . Database-friendly random projections[C]// The 12th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Data Base Systems. 2001: 274-281. |
[8] | NGO D C L , TEOH A B J , GOH A . Biometric hash:high-confidence face recognition[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(6): 771-775. |
[9] | JIN Z , GOI B M , TEOH A ,et al. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template[J]. Security and Communication Networks, 2014,7(11): 1691-1701. |
[10] | TEOH A B J , YUANG C T . Cancelable biometrics realization with multispace random projections[J]. IEEE Transactions on Systems,Man,and Cybernetics,Part B (Cybernetics), 2007,37(5): 1096-1106. |
[11] | WANG Y , PLATANIOTIS K N . An analysis of random projection for changeable and privacy-preserving biometric verification[J]. IEEE Transactions on Systems,Man,and Cybernetics,Part B (Cybernetics), 2010,40(5): 1280-1293. |
[12] | KHAN S H , AKBAR M A , SHAHZAD F ,et al. Secure biometric template generation for multi-factor authentication[J]. Pattern Recognition, 2015,48(2): 458-472. |
[13] | YANG B , HARTUNG D , SIMOENS K ,et al. Dynamic random projection for biometric template protection[C]// 2010 Fourth IEEE International Conference on Biometrics:Theory Applications and Systems (BTAS). IEEE, 2010: 1-7. |
[14] | ANZAKU E T , SOHN H , RO Y M . Multi-factor authentication using fingerprints and user-specific random projection[C]// 2010 12th International Asia-Pacific Web Conference (APWEB). 2010: 415-418. |
[15] | PATEL V M , RATHA N K , CHELLAPPA R . Cancelable biometrics:a review[J]. IEEE Signal Processing Magazine, 2015,32(5): 54-65. |
[16] | 张宁, 臧亚丽, 田捷 . 生物特征与密码技术的融合—一种新的安全身份认证方案[J]. 密码学报, 2015,2(2): 159-176. |
ZHANG N , ZANG Y L , TIAN J . The integration of biometrics and cryptography-a new solution for secure identity authentication[J]. Journal of Cryptologic Research, 2015,2(2): 159-176. | |
[17] | DASGUPTA S , GUPTA A . An elementary proof of the Johnson-Lindenstrauss lemma[J]. International Computer Science Institute,Technical Report, 1999,22(1): 1-5. |
[18] | FRANKL P , MAEHARA H . The Johnson-Lindenstrauss lemma and the sphericity of some graphs[J]. Journal of Combinatorial Theory,Series B, 1988,44(3): 355-362. |
[19] | JASSIM S,AL-ASSAM H , SELLAHEWA H . Improving performance and security of biometrics using efficient and stable random projection techniques[C]// 6th International Symposium on Image and Signal Processing and Analysis. 2009: 556-561. |
[20] | ARRIAGA R I , VEMPALA S . An algorithmic theory of learning:Robust concepts and random projection[C]// 40th Annual Symposium on Foundations of Computer Science. 1999: 616-623. |
[21] | BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[J]. Advances in CryptologyEUROCRYPT'98, 1998: 127-144. |
[22] | AHMED M , HOSSAIN M A . Cloud computing and security issues in the cloud[J]. International Journal of Network Security & Its Applications, 2014,6(1): 25. |
[23] | LIU S , HU S , WENG J ,et al. A novel asymmetric three-party based authentication scheme in wearable devices environment[J]. Journal of Network and Computer Applications, 2016,60: 144-154. |
[24] | PIRKER M , SLAMANIG D . A framework for privacy-preserving mobile payment on security enhanced arm TrustZone platforms[C]// 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications (TrustCom). 2012: 1155-1160. |
[25] | 周阿转, 俞一彪 . 采用特征空间随机映射的鲁棒性语音识别[J]. 计算机应用, 2012,32(07): 2070-2073. |
ZHOU A Z , YU Y B . Robust speech recognition by adopting random projection in feature space[J]. Journal of Computer Applications, 2012,32(07): 2070-2073. | |
[26] | ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(1): 1-30. |
[27] | XU Z , XIONG L , XU Y . On the provably secure CEW based on orthogonal decomposition[J]. Signal Processing:Image Communication, 2014,29(5): 607-617. |
[28] | MAIO D , MALTONI D , CAPPELLI R ,et al. FVC2000:fingerprint verification competition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(3): 402-412. |
[29] | JAIN A K , PRABHAKAR S , HONG L ,et al. Filterbank-based fingerprint matching[J]. IEEE transactions on Image Processing, 2000,9(5): 846-859. |
[30] | 张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348. |
ZHANG Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348. |
[1] | Ruiqi LI, Chunfu JIA, Yafei WANG. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application [J]. Journal on Communications, 2021, 42(3): 11-22. |
[2] | Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG. Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain [J]. Journal on Communications, 2021, 42(12): 236-246. |
[3] | Shufen NIU,Wenke LIU,Lixia CHEN,Caifen WANG,Xiaoni DU. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain [J]. Journal on Communications, 2020, 41(8): 204-214. |
[4] | Hongqiang YAN,Linjie WANG. Research of authentication techniques for the Internet of things [J]. Journal on Communications, 2020, 41(7): 213-222. |
[5] | Xin TANG,Linna ZHOU,Weijie SHAN,Dan LIU. Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack [J]. Journal on Communications, 2020, 41(6): 98-111. |
[6] | Yingying LI,Jianfeng MA,Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing [J]. Journal on Communications, 2020, 41(4): 14-26. |
[7] | XUE Kaiping,ZHOU Huancheng,MENG Wei,LI Shaohua. Secure authentication enhancement scheme for seamless handover and roaming in space information network [J]. Journal on Communications, 2019, 40(6): 138-147. |
[8] | FENG Chaosheng,LUO Wangping,QIN Zhiguang,YUAN Ding,ZOU Liping. Attribute-based proxy re-encryption scheme with multiple features [J]. Journal on Communications, 2019, 40(6): 177-189. |
[9] | Mang SU,Yan YU,Bin WU,Anmin FU. Research on the programming language for proxy re-encryption [J]. Journal on Communications, 2018, 39(6): 89-97. |
[10] | Mang SU,Guozhen SHI,Anmin FU,Yan YU,Wei JIN. Proxy re-encryption based multi-factor access control scheme in cloud [J]. Journal on Communications, 2018, 39(2): 96-104. |
[11] | En ZHANG,Yaoyao PEI,Jiao DU. RLWE-based ciphertext-policy attribute proxy re-encryption [J]. Journal on Communications, 2018, 39(11): 129-137. |
[12] | Ju-yan LI,Chun-guang MA,Qian ZHAO. Resplittable threshold multi-broker proxy re-encryption scheme from lattices [J]. Journal on Communications, 2017, 38(5): 157-164. |
[13] | En-tao LUO,Guo-jun WANG,Shu-hong CHEN,Khan-butt PINIAL. Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks [J]. Journal on Communications, 2017, 38(10): 81-93. |
[14] | Wei GUO,Xue-guang ZHOU,Cheng-qin QU,Fang LUO,Xiang-jun JI. Naval fleet across-domain communication scheme based on CP-ABE [J]. Journal on Communications, 2015, 36(Z1): 250-258. |
[15] | . Multi-element based on proxy re-encryption scheme for mobile cloud computing [J]. Journal on Communications, 2015, 36(11): 73-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|