Identification using encrypted biometrics

Mohammad Haghighat, Saman Zonouz, Mohamed Abdel-Mottaleb

Research output: Chapter in Book/Report/Conference proceedingConference contribution

99 Scopus citations

Abstract

Biometric identification is a challenging subject among computer vision scientists. The idea of substituting biometrics for passwords has become more attractive after powerful identification algorithms have emerged. However, in this regard, the confidentiality of the biometric data becomes of a serious concern. Biometric data needs to be securely stored and processed to guarantee that the user privacy and confidentiality is preserved. In this paper, a method for biometric identification using encrypted biometrics is presented, where a method of search over encrypted data is applied to manage the identification. Our experiments of facial identification demonstrate the effective performance of the system with a proven zero information leakage.

Original languageEnglish (US)
Title of host publicationComputer Analysis of Images and Patterns - 15th International Conference, CAIP 2013, Proceedings
Pages440-448
Number of pages9
EditionPART 2
DOIs
StatePublished - 2013
Externally publishedYes
Event15th International Conference on Computer Analysis of Images and Patterns, CAIP 2013 - York, United Kingdom
Duration: Aug 27 2013Aug 29 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume8048 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International Conference on Computer Analysis of Images and Patterns, CAIP 2013
Country/TerritoryUnited Kingdom
CityYork
Period8/27/138/29/13

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Keywords

  • encrypted biometrics
  • face recognition
  • search over encrypted data

Fingerprint

Dive into the research topics of 'Identification using encrypted biometrics'. Together they form a unique fingerprint.

Cite this