浏览全部资源
扫码关注微信
1. 国家知识产权局专利局,北京 100088
2. 西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
[ "李明(1977- ),男,陕西西安人,博士,国家知识产权局专利局研究员,主要研究方向为数据安全与应用安全" ]
[ "杨晓鹏(1991- ),男,河南林州人,西安电子科技大学博士生,主要研究方向为生物特征隐私保护、密码学及其应用" ]
[ "朱辉(1981- ),男,河南周口人,博士,西安电子科技大学教授、博士生导师,主要研究方向为数据安全与隐私保护、安全方案及协议设计、网络及应用安全等" ]
[ "王枫为(1993- ),男,河南周口人,西安电子科技大学博士生,主要研究方向为大数据安全与隐私保护与应用密码学" ]
[ "李祁(1994- ),男,江苏苏州人,西安电子科技大学硕士生,主要研究方向为大数据安全与隐私保护、应用密码学" ]
网络出版日期:2020-05,
纸质出版日期:2020-05-25
移动端阅览
李明, 杨晓鹏, 朱辉, 等. 高效的隐私保护在线人脸认证方案[J]. 通信学报, 2020,41(5):205-214.
Ming LI, Xiaopeng YANG, Hui ZHU, et al. Efficient and privacy-preserving online face authentication scheme[J]. Journal on communications, 2020, 41(5): 205-214.
李明, 杨晓鹏, 朱辉, 等. 高效的隐私保护在线人脸认证方案[J]. 通信学报, 2020,41(5):205-214. DOI: 10.11959/j.issn.1000-436x.2020087.
Ming LI, Xiaopeng YANG, Hui ZHU, et al. Efficient and privacy-preserving online face authentication scheme[J]. Journal on communications, 2020, 41(5): 205-214. DOI: 10.11959/j.issn.1000-436x.2020087.
在传统人脸认证系统中,用户特征模板和认证请求通常基于明文进行匹配,存在敏感数据泄露的风险。针对此问题,提出了一种基于矩阵加密的隐私保护的在线人脸认证方案。该方案中,用户的人脸特征模板注册和后续身份认证请求均通过矩阵加密后分别发送给在线认证服务器,并由在线认证服务器完成密文下两者间的相似度计算,能够在不影响认证精确度的同时,有效保护在线人脸认证过程中用户的敏感数据。安全性分析表明,通过选取不同安全参数,所提方案能够实现多安全等级,满足差异化场景中的隐私保护需求。性能分析显示,所提方案具有较低的计算开销与通信开销。仿真测试基于真实人脸数据库,其结果验证了所提方案的高效性,能够在真实环境中进行有效应用。
In traditional face authentication system
the trait template and authentication request were generally matched over plaintext
which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem
based on matrix encryption
an efficient and privacy-preserving online face authentication scheme was proposed.Specifically
the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server
and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts
which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover
performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme
which can be implemented in the real environment effectively.
SPREEUWERS L J , HENDRIKSE A J , GERRITSEN K J . Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at schiphol airport [C ] // International Conference of Biometrics Special Interest Group . Piscataway:IEEE Press , 2012 : 1 - 6 .
SAMANTHA S . Credit card with a fingerprint sensor revealed by mastercard [EB ] .(2017-04-20)[2020-03-08 ] .
RICHARD W . Face recognition tested to monitor terrorist suspects [EB ] .(2017-07-20)[2020-03-08 ] .
WU H . Alleged breach of India's biometric database could put 1.2bn users at risk [EB ] .(2018-01-11)[2020-03-08 ] .
Avast Security News Team . Biometric security platform leaves 28M records unsecured [EB ] .(2019-08-16[2020-03-08 ] .
LI Q , ZHU H , ZHANG Z , et al . Spoofing attacks on speaker verification systems based generated voice using genetic algorithm [C ] // 2019 IEEE International Conference on Communications . Piscataway:IEEE Press , 2019 : 1 - 6 .
李凤华 , 李晖 , 贾焰 , 等 . 隐私计算研究范畴及发展趋势 [J ] . 通信学报 , 2016 , 37 ( 4 ): 1 - 11 .
LI F H , LI H , JIA Y , et al . Privacy computing:concept,connotation and its research trend [J ] . Journal on Communications , 2016 , 37 ( 4 ): 1 - 11 .
BENSON B . Fingerprint not recognized:why the united states needs to protect biometric privacy [J ] . North Carolina Journal of Law &Technology , 2018 , 19 ( 4 ): 161 - 192 .
LI F H , LI H , NIU B , et al . Privacy computing:concept,computing framework,and future development trends [J ] . Engineering , 2019 , 5 ( 9 ): 1179 - 1192 .
朱辉 , 武衡 , 赵海强 , 等 . 适用于双层卫星网络的星间组网认证方案 [J ] . 通信学报 , 2019 , 40 ( 3 ): 1 - 9 .
ZHU H , WU H , ZHAO H Q , et al . Efficient authentication scheme for double-layer satellite network [J ] . Journal on Communications , 2019 , 40 ( 3 ): 1 - 9 .
ERKIN Z , FRANZ M , GUAJARDO J , et al . Privacy-preserving face recognition [C ] // International Symposium on Privacy Enhancing Technologies Symposium . Berlin:Springer , 2009 : 235 - 253 .
DAMGARD I. , GEISLER M , KRIGAARD M , et al . Efficient and secure comparison for on-line auctions [C ] // Australasian Conference on Information Security and Privacy . Berlin:Springer , 2007 : 416 - 430 .
SADEGHI A , SCHNEIDER T , WEHRENBERG I . Efficient privacy-preserving face recognition [C ] // International Conference on Information Security and Cryptology . Berlin:Springer , 2009 : 229 - 244 .
XIANG C , TANG C , CAI Y , et al . Privacy-preserving face recognition with outsourced computation [J ] . Soft Computing , 2016 , 20 ( 9 ): 3735 - 3744 .
ZHU H , WEI Q , YANG X P , et al . Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data [J ] . IEEE Transactions on Cloud Computing , 2018 :1.
YUAN J , YU S . Efficient privacy-preserving biometric identification in cloud computing [C ] // 2013 Proceedings IEEE International Conference on Computer Communications . Piscataway:IEEE Press , 2013 : 2652 - 2660 .
WANG Q , HU S , REN K , et al . CloudBI:practical privacy-preserving outsourcing of biometric identification in the cloud [C ] // European Symposium on Research in Computer Security . Berlin:Springer , 2015 : 186 - 205 .
ZHU L , ZHANG C , XU C , et al . An efficient and privacy-preserving biometric identification scheme in cloud computing [J ] . IEEE Access , 2018 ( 6 ): 19025 - 19033 .
RAHULAMATHAVAN Y , RAJARAJAN M . Hide-and-seek:face recognition in private [C ] // 2015 IEEE International Conference on Communications . Piscataway:IEEE Press , 2015 : 7102 - 7107 .
GUNASINGHE H , BERTINO E . PrivBioMTAuth:privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones [J ] . IEEE Transactions on Information Forensics & Security , 2018 , 13 ( 4 ): 1042 - 1057 .
SARIER N D , . Privacy preserving biometric identification on the bitcoin blockchain [C ] // 2018 International Symposium on Cyberspace Safety and Security . Berlin:Springer , 2018 : 254 - 269 .
TURK M A , PENTLAND A P . Face recognition using eigenfaces [C ] // Proceedings of 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition . Piscataway:IEEE Press , 1991 : 586 - 591 .
GUPTA S , SAHOO O P , GOEL A , et al . A new optimized approach to face recognition using eigenfaces [J ] . Global Journal of Computer Science and Technology , 2010 ( 10 ): 15 - 17 .
SHAN S , CAO B , GAO W , et al . Extended fisherface for face recognition from a single example image per person [C ] // 2002 IEEE International Symposium on Circuits and Systems.Proceedings . Piscataway:IEEE Press , 2002 ,( 2 ): 81 - 84 .
LIU K , GIANNELLA C , KARGUPTA H . An attacker’s view of distance preserving maps for privacy preserving data mining [C ] // European Conference on Principles of Data Mining and Knowledge Discovery . Berlin:Springer , 2006 : 297 - 308 .
CAO N , YANG Z , WANG C , et al . Privacy-preserving query over encrypted graph-structured data in cloud computing [C ] // 2011 31st International Conference on Distributed Computing Systems . Piscataway:IEEE Press , 2011 : 393 - 402 .
WONG W K , CHEUNG D W , KAO B , et al . Secure KNN computation on encrypted databases [C ] // Proceedings of the 2009 ACM SIGMOD International Conference on Management of data . New York:ACM Press , 2009 : 139 - 152 .
AT&T Laboratories Cambridge . The ORL database of faces [DB ] . AT&T Labs Research ,[2020-03-08 ] .
0
浏览量
242
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构