|
[1]
|
Aparna, P. and Kishore, P. (2019) Biometric-Based Efficient Medical Image Watermarking in E-Healthcare Application. IET Image Processing, 13, 421-428. [Google Scholar] [CrossRef]
|
|
[2]
|
Kraovec, A., Baldini, G. and Pejovi, V. (2021) Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Envi-ronments. Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, August 2021, 1-7. [Google Scholar] [CrossRef]
|
|
[3]
|
Das, A.K. (2017) A Secure and Effective Bio-metric-Based User Authentication Scheme for Wireless Sensor Networks Using Smart Card and Fuzzy Extractor. Inter-national Journal of Communication Systems, 30, e2933. [Google Scholar] [CrossRef]
|
|
[4]
|
Baltana, S.F., Ruiz-Sarmiento, J.R. and Gonzalez-Jimenez, J. (2020) A Face Recognition System for Assistive Robots. APPIS 2020: 3rd International Conference on Applications of Intelligent Sys-tems, New York, January 2020, 1-6. [Google Scholar] [CrossRef]
|
|
[5]
|
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I. and Toft, T. (2009) Privacy-Preserving Face Recognition. In: Goldberg, I. and Atallah, M.J., Eds., Privacy Enhancing Technologies. PETS 2009. Lecture Notes in Computer Science, Springer, Berlin. [Google Scholar] [CrossRef]
|
|
[6]
|
Sadeghi, A.R., Schneider, T. and Wehrenberg, I. (2009) Effi-cient Privacy-Preserving Face Recognition. Proceedings of the 12th International Conference on Information Security and Cryptology, Berlin, 2-4 December 2009, 229-244. [Google Scholar] [CrossRef]
|
|
[7]
|
Osadchy, M., Pinkas, B., Jarrous, A., et al. (2010) SCiFI—A System for Secure Face Identification. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, 16-19 May 2010, 239-254. [Google Scholar] [CrossRef]
|
|
[8]
|
Huang, Y., Malka, L., Evans, D., et al. (2011) Efficient Priva-cy-Preserving Biometric Identification. Proceedings of the Network and Distributed System Security Symposium, Califor-nia, 14-19 April 2013, 319-323.
|
|
[9]
|
Blanton, M. and Gasti, P. (2011) Secure and Efficient Protocols for Iris and Fin-gerprint Identification. In: Atluri, V. and Diaz, C. Eds., Computer Security—ESORICS 2011, Springer, Berlin, 190-209. [Google Scholar] [CrossRef]
|
|
[10]
|
Wong, W., Cheung, D., Kao, B., et al. (2009) Secure kNN Computation on Encrypted Databases. Proceedings of the 2009 ACM SIGMOD International Conference on Manage-ment of Data, New York, June 2009, 139-152. [Google Scholar] [CrossRef]
|
|
[11]
|
Yuan, J. and Yu, S. (2013) Efficient Privacy-Preserving Biometric Identification in Cloud Computing. 2013 Proceedings IEEE INFOCOM, Turin, 14-19 April 2013, 2652-2660. [Google Scholar] [CrossRef]
|
|
[12]
|
Wang, Q., Hu, S., Ren, K., et al. (2015) CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, 18 November 2015, 186-205. [Google Scholar] [CrossRef]
|
|
[13]
|
Zhang, C., Zhu, L. and Chang, X. (2017) PTBI: An Efficient Privacy-Preserving Biometric Identification Based on Perturbed Term in the Cloud. Information Sciences, 409-410, 56-67. [Google Scholar] [CrossRef]
|
|
[14]
|
Zhu, L., Zhang, C., Xu, C., et al. (2018) An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing. IEEE Access, 6, 19025-19033. [Google Scholar] [CrossRef]
|
|
[15]
|
Hu, S., Li, M.H., et al. (2018) Outsourced Biometric Identi-fication with Privacy. IEEE Transactions on Information Forensics and Security, 13, 2448-2463. [Google Scholar] [CrossRef]
|
|
[16]
|
Liu, C., Hu, X., Zhang, Q., et al. (2019) An Efficient Biometric Identification in Cloud Computing with Enhanced Privacy Security. IEEE Access, 7, 105363-105375. [Google Scholar] [CrossRef]
|
|
[17]
|
Delfs, H. and Knebl, H. (2007) Introduction to Cryptography. 2nd Edition, Springer, Berlin. [Google Scholar] [CrossRef]
|
|
[18]
|
Liu, K., Giannella, C. and Kargupta, H. (2006) An Attacker’s View of Distance Preserving Maps for Privacy Preserving Data Mining. European Conference on Principles of Data Mining and Knowledge Discovery, Berlin, 18-22 September 2006, 297-308. [Google Scholar] [CrossRef]
|
|
[19]
|
Esmaeili, M.M., Ward, R.K. and Fatourechi, M. (2012) A Fast Ap-proximate Nearest Neighbor Search Algorithm in the Hamming Space. IEEE Transactions on Pattern Analysis and Ma-chine Intelligence, 34, 2481-2488. [Google Scholar] [CrossRef]
|
|
[20]
|
Gionis, A., Indyk, P., Motwani, R., et al. (1999) Similarity Search in High Dimensions via Hashing. Proceedings of the 25th International Conference on Very Large Data Bases, San Francisco, 7 September 1999, 518-529.
|