메뉴 건너뛰기




Volumn 20, Issue 9, 2016, Pages 3735-3744

Privacy-preserving face recognition with outsourced computation

Author keywords

Face recognition; Outsourced computation; Privacy preserving

Indexed keywords

BIOMETRICS; COSTS; CRYPTOGRAPHY; DATA PRIVACY; DATABASE SYSTEMS; OUTSOURCING; PATTERN RECOGNITION; SOCIAL NETWORKING (ONLINE);

EID: 84936803501     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-015-1759-5     Document Type: Article
Times cited : (63)

References (39)
  • 1
    • 84864063536 scopus 로고    scopus 로고
    • Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems (NIPS’06)
    • Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems (NIPS’06), pp 57–64
    • (2006) pp 57–64
    • Avidan, S.1    Butman, M.2
  • 2
    • 77952879647 scopus 로고    scopus 로고
    • Human face recognition using fuzzy multilayer perceptron
    • Bhattacharjee D, Basu DK, Nasipuri M, Kundu M (2010) Human face recognition using fuzzy multilayer perceptron. Soft Comput 14(6):559–570
    • (2010) Soft Comput , vol.14 , Issue.6 , pp. 559-570
    • Bhattacharjee, D.1    Basu, D.K.2    Nasipuri, M.3    Kundu, M.4
  • 3
    • 84862982369 scopus 로고    scopus 로고
    • Secure outsourced computation of Iris matching
    • Blanton M, Aliasgari M (2012) Secure outsourced computation of Iris matching. J Comput Security 20(2):259–305
    • (2012) J Comput Security , vol.20 , Issue.2 , pp. 259-305
    • Blanton, M.1    Aliasgari, M.2
  • 4
    • 14844335721 scopus 로고    scopus 로고
    • Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and communications security
    • Boyen X (2004) Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and communications security, pp 82–91
    • (2004) pp 82–91
    • Boyen, X.1
  • 7
    • 84906242615 scopus 로고    scopus 로고
    • New algorithms for secure outsourcing of modular exponentiations
    • Chen XF, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 9(25):2386–2396
    • (2014) IEEE Trans Parallel Distrib Syst , vol.9 , Issue.25 , pp. 2386-2396
    • Chen, X.F.1    Li, J.2    Ma, J.3    Tang, Q.4    Lou, W.5
  • 8
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier’s probabilistic public-key system
    • Damgard IB, Jurik MJ (2001) A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Public-Key Cryptography (PKC’01), vol LNCS 1992, pp 119–136
    • (2001) Public-Key Cryptography (PKC’01), vol LNCS , vol.1992 , pp. 119-136
    • Damgard, I.B.1    Jurik, M.J.2
  • 9
    • 70449575839 scopus 로고    scopus 로고
    • Homomorphic encryption and secure comparison
    • Damgard I, Geisler M, Kroigard M (2008) Homomorphic encryption and secure comparison. J Appl Cryptol 1(1):22–31
    • (2008) J Appl Cryptol , vol.1 , Issue.1 , pp. 22-31
    • Damgard, I.1    Geisler, M.2    Kroigard, M.3
  • 12
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97–139
    • (2008) SIAM J Comput , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt, vol LNCS 3027, pp 523–540
    • (2004) Advances in cryptology-Eurocrypt, vol LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 14
    • 33845535268 scopus 로고    scopus 로고
    • Scrambling for video surveillance with privacy. In: Computer vision and pattern recognition workshop, New York
    • Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: Computer vision and pattern recognition workshop, New York, pp 160–160
    • (2006) pp 160–160
    • Dufaux, F.1    Ebrahimi, T.2
  • 16
    • 84888842651 scopus 로고    scopus 로고
    • Interconnecting federated clouds by using publish-subscribe service
    • Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903
    • (2013) Clust Comput , vol.16 , Issue.4 , pp. 887-903
    • Esposito, C.1    Ficco, M.2    Palmieri, F.3    Castiglione, A.4
  • 17
    • 84978670345 scopus 로고    scopus 로고
    • Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput, Theory Evid Game Theory (99)
    • Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput, Theory Evid Game Theory (99). doi:10.1109/TC.2015.2389952
    • (2015) doi:10.1109/TC.2015.2389952
    • Esposito, C.1    Ficco, M.2    Palmieri, F.3    Castiglione, A.4
  • 18
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257
    • (2006) Des Codes Cryptogr , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 19
    • 79952365404 scopus 로고    scopus 로고
    • Protection of Biometric Information. In: Security with Noisy Data
    • Kevenaar T (2007) Protection of Biometric Information. In: Security with Noisy Data, pp 169–193
    • (2007) pp 169–193
    • Kevenaar, T.1
  • 24
    • 84981694814 scopus 로고    scopus 로고
    • A proof of Yao’s protocol for secure two-party computation. In: Cryptology ePrint Archive
    • Lindell Y, Pinkas B (2004) A proof of Yao’s protocol for secure two-party computation. In: Cryptology ePrint Archive, Report 2004/175
    • (2004) Report 2004/175
    • Lindell, Y.1    Pinkas, B.2
  • 25
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio and Video Based Biometric Person Authentication
    • Linnartz J, Tuyls P (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio and Video Based Biometric Person Authentication, pp 393–402
    • (2003) pp 393–402
    • Linnartz, J.1    Tuyls, P.2
  • 26
    • 84944515126 scopus 로고    scopus 로고
    • Dual-kernel based 2D linear discriminant analysis for face recognition
    • Liu XZ, Ye HW (2014) Dual-kernel based 2D linear discriminant analysis for face recognition. J Ambient Intell Hum Comput (4). doi:10.1007/s12652-014-0230-2
    • (2014) J Ambient Intell Hum Comput (4)
    • Liu, X.Z.1    Ye, H.W.2
  • 29
    • 14644429006 scopus 로고    scopus 로고
    • Preserving privacy by de-identifying face images
    • Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232–243
    • (2005) IEEE Trans Knowl Data Eng , vol.17 , Issue.2 , pp. 232-243
    • Newton, E.M.1    Sweeney, L.2    Malin, B.3
  • 30
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT’99, vol LNCS 1592, pp 223–238
    • (1999) In Advances in Cryptology-EUROCRYPT’99, vol LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 31
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
    • (2001) IBM Syst J , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 35
    • 0026384289 scopus 로고
    • Face recognition using eigenfaces. In: Proceedings of the IEEE Computer vision and pattern recognition (CVPR’91)
    • Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Proceedings of the IEEE Computer vision and pattern recognition (CVPR’91), pp 586–591
    • (1991) pp 586–591
    • Turk, M.A.1    Pentland, A.P.2
  • 38
    • 0022882770 scopus 로고
    • How to generate and exchange secrets. In: Foundations of Computer Science, 1986, 27th Annual Symposium
    • Yao AC (1986) How to generate and exchange secrets. In: Foundations of Computer Science, 1986, 27th Annual Symposium, pp 162–167
    • (1986) pp 162–167
    • Yao, A.C.1
  • 39
    • 69949171179 scopus 로고    scopus 로고
    • Privacy protecting visual processing for secure video surveillance. In: Proceedings of the International Conference on Image Processing (ICIP’08)
    • Yu X, Chinomi K, Koshimizu T, Nitta N, Ito Y, Babaguchi N (2008) Privacy protecting visual processing for secure video surveillance. In: Proceedings of the International Conference on Image Processing (ICIP’08), pp 1672–1675
    • (2008) pp 1672–1675
    • Yu, X.1    Chinomi, K.2    Koshimizu, T.3    Nitta, N.4    Ito, Y.5    Babaguchi, N.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.