Abstract | ||
---|---|---|
Biometric identification typically scans a large-scale database of biometric records for finding a close enough match of an individual. This paper investigates how to outsource this computationally expensive scanning while protecting the privacy of both the database and the computation. Exploiting the inherent structures of biometric data and the properties of identification operations, we first p... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TIFS.2018.2819128 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Databases,Servers,Encryption,Computational modeling,Bioinformatics,Protocols | Data mining,Homomorphic encryption,Data set,Pattern recognition,Computer science,Server,Outsourcing,Shuffling,Artificial intelligence,Biometrics,Biometric data,Computation | Journal |
Volume | Issue | ISSN |
13 | 10 | 1556-6013 |
Citations | PageRank | References |
3 | 0.37 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shengshan Hu | 1 | 11 | 1.83 |
Minghui Li | 2 | 18 | 4.67 |
Qian Wang | 3 | 3091 | 152.46 |
Sherman S. M. Chow | 4 | 1870 | 98.03 |
Du Minxin | 5 | 29 | 2.15 |