Journal on Communications ›› 2020, Vol. 41 ›› Issue (5): 205-214.doi: 10.11959/j.issn.1000-436x.2020087
• Correspondences • Previous Articles
Ming LI1,Xiaopeng YANG2(),Hui ZHU2,Fengwei WANG2,Qi LI2
Revised:
2020-03-31
Online:
2020-05-25
Published:
2020-05-30
Supported by:
CLC Number:
Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI. Efficient and privacy-preserving online face authentication scheme[J]. Journal on Communications, 2020, 41(5): 205-214.
[1] | SPREEUWERS L J , HENDRIKSE A J , GERRITSEN K J . Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at schiphol airport[C]// International Conference of Biometrics Special Interest Group. Piscataway:IEEE Press, 2012: 1-6. |
[2] | SAMANTHA S . Credit card with a fingerprint sensor revealed by mastercard[EB].(2017-04-20)[2020-03-08]. |
[3] | RICHARD W . Face recognition tested to monitor terrorist suspects[EB].(2017-07-20)[2020-03-08]. |
[4] | WU H . Alleged breach of India's biometric database could put 1.2bn users at risk[EB].(2018-01-11)[2020-03-08]. |
[5] | Avast Security News Team . Biometric security platform leaves 28M records unsecured[EB].(2019-08-16[2020-03-08]. |
[6] | LI Q , ZHU H , ZHANG Z ,et al. Spoofing attacks on speaker verification systems based generated voice using genetic algorithm[C]// 2019 IEEE International Conference on Communications. Piscataway:IEEE Press, 2019: 1-6. |
[7] | 李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11. |
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11. | |
[8] | BENSON B . Fingerprint not recognized:why the united states needs to protect biometric privacy[J]. North Carolina Journal of Law &Technology, 2018,19(4): 161-192. |
[9] | LI F H , LI H , NIU B ,et al. Privacy computing:concept,computing framework,and future development trends[J]. Engineering, 2019,5(9): 1179-1192. |
[10] | 朱辉, 武衡, 赵海强 ,等. 适用于双层卫星网络的星间组网认证方案[J]. 通信学报, 2019,40(3): 1-9. |
ZHU H , WU H , ZHAO H Q ,et al. Efficient authentication scheme for double-layer satellite network[J]. Journal on Communications, 2019,40(3): 1-9. | |
[11] | ERKIN Z , FRANZ M , GUAJARDO J ,et al. Privacy-preserving face recognition[C]// International Symposium on Privacy Enhancing Technologies Symposium. Berlin:Springer, 2009: 235-253. |
[12] | DAMGARD I. , GEISLER M , KRIGAARD M ,et al. Efficient and secure comparison for on-line auctions[C]// Australasian Conference on Information Security and Privacy. Berlin:Springer, 2007: 416-430. |
[13] | SADEGHI A , SCHNEIDER T , WEHRENBERG I . Efficient privacy-preserving face recognition[C]// International Conference on Information Security and Cryptology. Berlin:Springer, 2009: 229-244. |
[14] | XIANG C , TANG C , CAI Y ,et al. Privacy-preserving face recognition with outsourced computation[J]. Soft Computing, 2016,20(9): 3735-3744. |
[15] | ZHU H , WEI Q , YANG X P ,et al. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data[J]. IEEE Transactions on Cloud Computing, 2018:1. |
[16] | YUAN J , YU S . Efficient privacy-preserving biometric identification in cloud computing[C]// 2013 Proceedings IEEE International Conference on Computer Communications. Piscataway:IEEE Press, 2013: 2652-2660. |
[17] | WANG Q , HU S , REN K ,et al. CloudBI:practical privacy-preserving outsourcing of biometric identification in the cloud[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2015: 186-205. |
[18] | ZHU L , ZHANG C , XU C ,et al. An efficient and privacy-preserving biometric identification scheme in cloud computing[J]. IEEE Access, 2018(6): 19025-19033. |
[19] | RAHULAMATHAVAN Y , RAJARAJAN M . Hide-and-seek:face recognition in private[C]// 2015 IEEE International Conference on Communications. Piscataway:IEEE Press, 2015: 7102-7107. |
[20] | GUNASINGHE H , BERTINO E . PrivBioMTAuth:privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones[J]. IEEE Transactions on Information Forensics & Security, 2018,13(4): 1042-1057. |
[21] | SARIER N D , . Privacy preserving biometric identification on the bitcoin blockchain[C]// 2018 International Symposium on Cyberspace Safety and Security. Berlin:Springer, 2018: 254-269. |
[22] | TURK M A , PENTLAND A P . Face recognition using eigenfaces[C]// Proceedings of 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 1991: 586-591. |
[23] | GUPTA S , SAHOO O P , GOEL A ,et al. A new optimized approach to face recognition using eigenfaces[J]. Global Journal of Computer Science and Technology, 2010(10): 15-17. |
[24] | SHAN S , CAO B , GAO W ,et al. Extended fisherface for face recognition from a single example image per person[C]// 2002 IEEE International Symposium on Circuits and Systems.Proceedings. Piscataway:IEEE Press, 2002,(2): 81-84. |
[25] | LIU K , GIANNELLA C , KARGUPTA H . An attacker’s view of distance preserving maps for privacy preserving data mining[C]// European Conference on Principles of Data Mining and Knowledge Discovery. Berlin:Springer, 2006: 297-308. |
[26] | CAO N , YANG Z , WANG C ,et al. Privacy-preserving query over encrypted graph-structured data in cloud computing[C]// 2011 31st International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2011: 393-402. |
[27] | WONG W K , CHEUNG D W , KAO B ,et al. Secure KNN computation on encrypted databases[C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. New York:ACM Press, 2009: 139-152. |
[28] | AT&T Laboratories Cambridge. The ORL database of faces[DB]. AT&T Labs Research,[2020-03-08]. |
[1] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[2] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[3] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[4] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[5] | Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG. Privacy-preserving attribute ticket scheme based on mobile terminal with smart card [J]. Journal on Communications, 2022, 43(10): 26-41. |
[6] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[7] | Jiaqi WANG,Ning LU,Qingfeng CHENG,Zhaoxia WU,Wenbo SHI. Privacy-preserving multi-attribute reverse spectrum auction scheme [J]. Journal on Communications, 2020, 41(9): 77-91. |
[8] | Yousheng ZHOU,Chang TAN,Fei TANG. Multi-dimensional secure query scheme for fog-enhanced IIoT [J]. Journal on Communications, 2020, 41(8): 175-186. |
[9] | Jiayin LI,Wenzhong GUO,Xiaoyan LI,Ximeng LIU. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. |
[10] | Xinyu WANG,Ben NIU,Fenghua LI,Kun HE. Risk assessing and privacy-preserving scheme for privacy leakage in APP [J]. Journal on Communications, 2019, 40(5): 13-23. |
[11] | Xiangyu WANG,Jianfeng MA,Yinbin MIAO. Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user [J]. Journal on Communications, 2019, 40(2): 31-39. |
[12] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[13] | Xixi YAN,Yuan LIU,Zichen LI,Yongli TANG,Qing YE. Privacy-preserving attribute-based encryption scheme on ideal lattices [J]. Journal on Communications, 2018, 39(3): 128-135. |
[14] | Jiale ZHANG,Yanchao ZHAO,Bing CHEN,Feng HU,Kun ZHU. Survey on data security and privacy-preserving for the research of edge computing [J]. Journal on Communications, 2018, 39(3): 1-21. |
[15] | Xia FENG,Yawei LIU. Dynamic Mix-zone scheme with joint-entropy based metric for privacy-perserving in IoV [J]. Journal on Communications, 2018, 39(3): 76-85. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|