Identification Using Encrypted Biometrics

  • Mohammad Haghighat
  • Saman Zonouz
  • Mohamed Abdel-Mottaleb
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8048)


Biometric identification is a challenging subject among computer vision scientists. The idea of substituting biometrics for passwords has become more attractive after powerful identification algorithms have emerged. However, in this regard, the confidentiality of the biometric data becomes of a serious concern. Biometric data needs to be securely stored and processed to guarantee that the user privacy and confidentiality is preserved. In this paper, a method for biometric identification using encrypted biometrics is presented, where a method of search over encrypted data is applied to manage the identification. Our experiments of facial identification demonstrate the effective performance of the system with a proven zero information leakage.


face recognition encrypted biometrics search over encrypted data 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Baudat, G., Anouar, F.: Generalized discriminant analysis using a kernel approach. Neural Computation 12(10), 2385–2404 (2000)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Bringer, J., Chabanne, H., Kindarji, B.: Error-tolerant searchable encryption. In: IEEE International Conference on Communications, ICC 2009, pp. 1–6 (2009)Google Scholar
  4. 4.
    Daugman, J.G.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 1148–1161 (1993)CrossRefGoogle Scholar
  5. 5.
    Haghighat, M.B.A., Namjoo, E.: Evaluating the informativity of features in dimensionality reduction methods. In: 2011 5th International Conference on Application of Information and Communication Technologies, AICT, pp. 1–5 (October 2011)Google Scholar
  6. 6.
    Jain, A., Hong, L., Pankanti, S.: Biometric identification. Communications of the ACM 43(2), 90–98 (2000)CrossRefGoogle Scholar
  7. 7.
    Jain, A., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Transactions on Information Forensics and Security 1(2), 125–143 (2006)CrossRefGoogle Scholar
  8. 8.
    Liu, C., Wechsler, H.: Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition. IEEE Transactions on Image Processing 11, 467–476 (2002)CrossRefGoogle Scholar
  9. 9.
    Meshgini, S., Aghagolzadeh, A., Seyedarabi, H.: Face recognition using gabor-based direct linear discriminant analysis and support vector machine. Computers & Electrical Engineering 39(3), 727–745 (2013)CrossRefGoogle Scholar
  10. 10.
    Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(10), 1090–1104 (2000)CrossRefGoogle Scholar
  11. 11.
    Shen, L.L., Bai, L., Fairhurst, M.: Gabor wavelets and general discriminant analysis for face identification and verification. Image and Vision Computing 25(5), 553–563 (2007)CrossRefGoogle Scholar
  12. 12.
    Viola, P., Jones, M.J.: Robust real-time face detection. International Journal of Computer Vision 57(2), 137–154 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Mohammad Haghighat
    • 1
  • Saman Zonouz
    • 1
  • Mohamed Abdel-Mottaleb
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of MiamiUSA

Personalised recommendations