One-way private media search on public databases: The role of signal processing

G Fanti, M Finiasz… - IEEE Signal Processing …, 2013 - ieeexplore.ieee.org
Automated media classification is becoming increasingly common in areas ranging from
mobile location recognition to surveillance systems to automated annotation. While these …

[PDF][PDF] An advanced door lock security system using palmtop recognition system

KW Nafi, TS Kar, SA Hoque - International Journal of Computer …, 2012 - academia.edu
Biometric technology is used to identify a person based on his/her physical behavioral
characteristics. One of the extensive uses of biometric technology is a fingerprint recognition …

Face authentication in encrypted domain based on correlation filters

M Taheri, S Mozaffari, P Keshavarzi - Multimedia Tools and Applications, 2018 - Springer
Privacy and security are main concerns in face authentication by cloud or semi-honest
server. To deal with this problem, a face authentication method based on correlation filters in …

A review on different biometric template protection methods

A Sarkar, BK Singh - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
Biometrics is a universally used automatic identification of persons, depending on their
behavioral and biological quality. Biometric authentication represents a significant role in the …

Anonymous subject identification and privacy information management in video surveillance

Y Luo, SS Cheung, R Lazzeretti, T Pignata… - International Journal of …, 2018 - Springer
The widespread deployment of surveillance cameras has raised serious privacy concerns,
and many privacy-enhancing schemes have been recently proposed to automatically redact …

Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

MS Kiraz, ZA Genç, S Kardas - Security and Communication …, 2015 - Wiley Online Library
Bringer et al. proposed two cryptographic protocols for the computation of Hamming
distance. Their first scheme uses oblivious transfer and provides security in the semi‐honest …

Privacy‐Preserving Fingerprint Authentication Using D‐H Key Exchange and Secret Sharing

H Wang, M Luo, Y Ding - Security and Communication …, 2021 - Wiley Online Library
Biometric based remote authentication has been widely deployed. However, there exist
security and privacy issues to be addressed since biometric data includes sensitive …

Colmade: Collaborative masking in auditable decryption for bfv-based homomorphic encryption

A Ibarrondo, H Chabanne, V Despiegel… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper proposes a novel collaborative decryption protocol for the Brakerski-Fan-
Vercauteren (BFV) homomorphic encryption scheme in a multiparty distributed setting, and …

Privacy enhanced cloud-based facial recognition

T Yang, Y Zhang, J Sun, X Wang - Neural Processing Letters, 2022 - Springer
Homomorphic encryption is a significant method to protect user privacy in cloud computing
environment. Due to the computation efficiency issue, there is still not many homomorphic …

Biological Template Protection Based on Multikey Cryptographic Decomposition Features

J Wang, H Jiang, Y Yang, R Xin - 2023 9th International …, 2023 - ieeexplore.ieee.org
As more and more privacy protection mechanisms are introduced, facial recognition is
gradually being optimized in terms of homo-morphic computing power. However, certain …