Biometric Security Through Visual Encryption for Fog Edge Computing

Wadood Abdul, Zulfiqar Ali, Sanaa Ghouzali, Budour Alfawaz, Ghulam Muhammad, M. Shamim Hossain

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate.

LanguageEnglish
Pages5531-5538
Number of pages8
JournalIEEE Access
Volume5
DOIs
Publication statusPublished - 12 Apr 2017

Fingerprint

Fog
Watermarking
Biometrics
Cryptography

Keywords

  • cloud
  • Edge
  • image
  • security
  • visual cryptography
  • zero-watermarking

Cite this

Abdul, W., Ali, Z., Ghouzali, S., Alfawaz, B., Muhammad, G., & Hossain, M. S. (2017). Biometric Security Through Visual Encryption for Fog Edge Computing. IEEE Access, 5, 5531-5538. https://doi.org/10.1109/ACCESS.2017.2693438
Abdul, Wadood ; Ali, Zulfiqar ; Ghouzali, Sanaa ; Alfawaz, Budour ; Muhammad, Ghulam ; Hossain, M. Shamim. / Biometric Security Through Visual Encryption for Fog Edge Computing. In: IEEE Access. 2017 ; Vol. 5. pp. 5531-5538.
@article{f04820d709844f20a6cd5a72dbe01093,
title = "Biometric Security Through Visual Encryption for Fog Edge Computing",
abstract = "Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate.",
keywords = "cloud, Edge, image, security, visual cryptography, zero-watermarking",
author = "Wadood Abdul and Zulfiqar Ali and Sanaa Ghouzali and Budour Alfawaz and Ghulam Muhammad and Hossain, {M. Shamim}",
year = "2017",
month = "4",
day = "12",
doi = "10.1109/ACCESS.2017.2693438",
language = "English",
volume = "5",
pages = "5531--5538",
journal = "IEEE Access",
issn = "2169-3536",

}

Abdul, W, Ali, Z, Ghouzali, S, Alfawaz, B, Muhammad, G & Hossain, MS 2017, 'Biometric Security Through Visual Encryption for Fog Edge Computing', IEEE Access, vol. 5, pp. 5531-5538. https://doi.org/10.1109/ACCESS.2017.2693438

Biometric Security Through Visual Encryption for Fog Edge Computing. / Abdul, Wadood; Ali, Zulfiqar; Ghouzali, Sanaa; Alfawaz, Budour; Muhammad, Ghulam; Hossain, M. Shamim.

In: IEEE Access, Vol. 5, 12.04.2017, p. 5531-5538.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Biometric Security Through Visual Encryption for Fog Edge Computing

AU - Abdul, Wadood

AU - Ali, Zulfiqar

AU - Ghouzali, Sanaa

AU - Alfawaz, Budour

AU - Muhammad, Ghulam

AU - Hossain, M. Shamim

PY - 2017/4/12

Y1 - 2017/4/12

N2 - Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate.

AB - Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate.

KW - cloud

KW - Edge

KW - image

KW - security

KW - visual cryptography

KW - zero-watermarking

UR - http://www.scopus.com/inward/record.url?scp=85028027043&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2017.2693438

DO - 10.1109/ACCESS.2017.2693438

M3 - Article

VL - 5

SP - 5531

EP - 5538

JO - IEEE Access

T2 - IEEE Access

JF - IEEE Access

SN - 2169-3536

ER -