Secure facial recognition in the encrypted domain using a local ternary pattern approach

Khan, F.A. and Bouridane, A. and Boussakta, S. and Jiang, R. and Almaadeed, S. (2021) Secure facial recognition in the encrypted domain using a local ternary pattern approach. Journal of Information Security and Applications, 59. ISSN 2214-2126

[img]
Text (FIT_2020_Paper_Final)
FIT_2020_Paper_Final.pdf - Accepted Version
Restricted to Repository staff only until 23 March 2022.
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (1MB)

Abstract

Automatic facial recognition is fast becoming a reliable method for identifying individuals. Due to its reliability and unobtrusive nature facial recognition has been widely deployed in law enforcement and civilian application. Recent implementations of facial recognition systems on public cloud computing infrastructures have raised strong concerns regarding an individual's privacy. In this paper, we propose and implement a novel approach for facial recognition in the encrypted domain. This allows for facial recognition to be performed without revealing the actual image unnecessarily as the features stay encrypted at all times. Our proposed system exploits the homomorphic properties of the Paillier cryptosystem and performs Euclidean distance calculations using encrypted data. We propose to represent the images using a radial Local Ternary Pattern approach where a higher than proposed radius is used to extract the image features. Our proposed system has been evaluated using two publicly available datasets and has also been compared against the previously used eigenface approach in the encrypted domain and the obtained results justify the feasibility of the proposed system. © 2021 Elsevier Ltd

Item Type:
Journal Article
Journal or Publication Title:
Journal of Information Security and Applications
Additional Information:
This is the author’s version of a work that was accepted for publication in Journal of Information Security and Applications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Journal of Information Security and Applications, 59, 2021 DOI: 10.1016/j.jisa.2021.102810
Subjects:
ID Code:
153983
Deposited By:
Deposited On:
19 Apr 2021 14:40
Refereed?:
Yes
Published?:
Published
Last Modified:
16 Jun 2021 09:10