Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal

被引:3
|
作者
Qin, Ying [1 ]
Zhang, Bob [1 ,2 ]
机构
[1] Univ Macau, Dept Comp & Informat Sci, PAMI Res Grp, Taipa, Macau, Peoples R China
[2] Univ Macau, Inst Collaborat Innovat, Ctr Artificial Intelligence & Robot, Taipa, Macau, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 14期
基金
中国国家自然科学基金;
关键词
privacy-preserving biometrics; cryptography; Arnold transform; ElGamal algorithm; digital signature; KEY DISTRIBUTION; CRYPTOGRAPHY;
D O I
10.3390/app13148117
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The scientific study of privacy-preserving biometrics, represented by the palmprint, face, and iris, has grown tremendously. That being said, there has not been much attention paid to the proper preservation, transmission, and authentication of biometric images used in everyday applications. In this paper, we propose a new complete model for encrypting and decrypting biometric images, including their signing and authentication, using a nested algorithm of 3D Arnold Transform. In addition, the ElGamal Encryption Algorithm for the encryption part and the ElGamal Digital Signature for the signature part are applied. The model is mainly based on the Arnold Transform and Public-Key Cryptosystem, which are convenient for key transfer and fully functional. Here, the model succeeds in encrypting and securing the authentication process for privacy-preserving biometric images. Various tests have been carried out to demonstrate the feasibility and security of the proposed model and have been compared with existing encryption methods to achieve better results. Moreover, the proposed model can also be extended to the storage, transmission, and authentication of biometric data for daily use.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] GaitPrivacyON: Privacy-preserving mobile gait biometrics using unsupervised learning
    Delgado-Santos, Paula
    Tolosana, Ruben
    Guest, Richard
    Vera-Rodriguez, Ruben
    Deravi, Farzin
    Morales, Aythami
    PATTERN RECOGNITION LETTERS, 2022, 161 : 30 - 37
  • [22] Heal the Privacy: Functional Encryption and Privacy-Preserving Analytics
    Bakas, Alexandros
    Michalas, Antonis
    2022 IEEE 21ST MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON 2022), 2022, : 120 - 125
  • [23] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [24] Fraud detection through data sharing using privacy-preserving record linkage, digital signature (EdDSA), and the MinHash technique: Detect fraud using privacy preserving record links
    Thomas, Satish
    Sluss, James
    JOURNAL OF ENGINEERING-JOE, 2023, 2023 (12):
  • [25] Threshold Signature for Privacy-Preserving Blockchain
    Ricci, Sara
    Dzurenda, Petr
    Casanova-Marques, Raul
    Cika, Petr
    BUSINESS PROCESS MANAGEMENT: BLOCKCHAIN, ROBOTIC PROCESS AUTOMATION, AND CENTRAL AND EASTERN EUROPE FORUM, 2022, 459 : 100 - 115
  • [26] Privacy-preserving encryption scheme using DNA parentage test
    Gritti, Clementine
    Susilo, Willy
    Plantard, Thomas
    Khin Than Win
    THEORETICAL COMPUTER SCIENCE, 2015, 580 : 1 - 13
  • [27] Privacy-preserving spam filtering using homomorphic and functional encryption
    Nguyen, Tham
    Karunanayake, Naveen
    Wang, Sicong
    Seneviratne, Suranga
    Hu, Peizhao
    COMPUTER COMMUNICATIONS, 2023, 197 : 230 - 241
  • [28] Distributed Privacy-Preserving Fusion Estimation Using Homomorphic Encryption
    Xinhao Yan
    Siqin Zhuo
    Yancheng Wu
    Bo Chen
    Journal of Beijing Institute of Technology, 2022, 31 (06) : 551 - 558
  • [29] Privacy-preserving using homomorphic encryption in Mobile IoT systems
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shan Cang
    Min, Geyong
    Zhao, Zhiwei
    Bashir, Ali Kashif
    COMPUTER COMMUNICATIONS, 2021, 165 : 105 - 111
  • [30] Privacy-preserving using homomorphic encryption in Mobile IoT systems
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shan Cang
    Min, Geyong
    Zhao, Zhiwei
    Bashir, Ali Kashif
    Li, Shan Cang (s.c.li@uestc.edu.cn), 1600, Elsevier B.V. (165): : 105 - 111