{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:43:02Z","timestamp":1775047382138,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud. Due to the fact that biometric data like fingerprint and iris cannot be changed, storing them on the cloud creates vulnerability and can potentially have catastrophic consequences if these data are leaked. In the recent years, in order to preserve the privacy of the users, homomorphic encryption has been used to enable computation on the encrypted data and to eliminate the need for decryption. This work presents DeepZeroID: a privacy-preserving cloud-based and multiple-party biometric verification system that uses homomorphic encryption. Via transfer learning, training on sensitive biometric data is eliminated and one pre-trained deep neural network is used as feature extractor. By developing an exhaustive search algorithm, this feature extractor is applied on the tasks of biometric verification and liveness detection. By eliminating the need for training on and decrypting the sensitive biometric data, this system preserves privacy, requires zero knowledge of the sensitive data distribution, and is highly scalable. Our experimental results show that DeepZeroID can deliver 95.47% F1 score in the verification of combined iris and fingerprint feature vectors with zero true positives and with a 100% accuracy in liveness detection.<\/jats:p>","DOI":"10.3390\/computers8010003","type":"journal-article","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T07:22:30Z","timestamp":1546240950000},"page":"3","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Utilizing Transfer Learning and Homomorphic Encryption in a Privacy Preserving and Secure Biometric Recognition System"],"prefix":"10.3390","volume":"8","author":[{"given":"Milad","family":"Salem","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816-2362, USA"}]},{"given":"Shayan","family":"Taheri","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816-2362, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2548-8327","authenticated-orcid":false,"given":"Jiann-Shiun","family":"Yuan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816-2362, USA"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"ref_1","unstructured":"Gentry, C., and Boneh, D. (2009). A Fully Homomorphic Encryption Scheme, Stanford University."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Akram, T., Sharif, M., Javed, M.Y., Muhammad, N., and Yasmin, M. (2018). An implementation of optimized framework for action classification using multilayers neural network on selected fused features. Pattern Anal. Appl., Available online: https:\/\/doi.org\/10.1007\/s10044-018-0688-1.","DOI":"10.1007\/s10044-018-0688-1"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1750025","DOI":"10.1142\/S0218348X17500256","article-title":"A Review on State-of-the-Art Face Recognition Approaches","volume":"25","author":"Mahmood","year":"2017","journal-title":"Fractals"},{"key":"ref_4","first-page":"371","article-title":"Privacy Preserving Vector Quantization Based Speaker Recognition System","volume":"158","author":"Ene","year":"2017","journal-title":"Proc. Rom. Acad. Ser. A"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bommagani, A.S., Valenti, M.C., and Ross, A. (2014, January 6\u20138). A Framework for Secure Cloud-Empowered Mobile Biometrics. Proceedings of the 2014 IEEE Military Communications Conference, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2014.47"},{"key":"ref_6","unstructured":"Toli, C.-A., Aly, A., and Preneel, B. (2018, November 30). Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers. Available online: https:\/\/www.semanticscholar.org\/paper\/Privacy-Preserving-Multibiometric-Authentication-in-Toli-Aly\/d37472309ba3a28b66646e92d239ffedb85f2abb."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/TIFS.2014.2365998","article-title":"A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval","volume":"10","author":"Weng","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Talreja, V., Valenti, M.C., and Nasrabadi, N.M. (2017, January 14\u201316). Multibiometric secure system based on deep learning. Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, QC, Canada.","DOI":"10.1109\/GlobalSIP.2017.8308652"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3050","DOI":"10.1109\/TIFS.2018.2838540","article-title":"PassBio: Privacy-Preserving User-Centric Biometric Authentication","volume":"13","author":"Zhou","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Toli, C.-A., and Preneel, B. (2018, January 22\u201324). Privacy-preserving Biometric Authentication Model for e-Finance Applications. Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, Portugal.","DOI":"10.5220\/0006611303530360"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Toli, C.-A., Aly, A., and Preneel, B. (2016). A Privacy-Preserving Model for Biometric Fusion. International Conference on Cryptology and Network Security, Springer.","DOI":"10.1007\/978-3-319-48965-0_54"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Abidin, A. (2017). On Privacy-Preserving Biometric Authentication. International Conference on Information Security and Cryptology, Springer.","DOI":"10.1007\/978-3-319-54705-3_11"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Taheri, S., and Yuan, J.-S. (2018). A Cross-Layer Biometric Recognition System for Mobile IoT Devices. Electronics, 7.","DOI":"10.3390\/electronics7020026"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., and Toft, T. (2009). Privacy-Preserving Face Recognition. International Symposium on Privacy Enhancing Technologies Symposium, Springer.","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"ref_15","unstructured":"Huang, Y., Malka, L., Evans, D., and Katz, J. (2018, November 30). Efficient Privacy-Preserving Biometric Identification. Available online: http:\/\/mightbeevil.com\/secure-biometrics\/ndss-talk.pdf."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Osadchy, M., Pinkas, B., Jarrous, A., and Moskovich, B. (2010, January 16\u201319). SCiFI\u2014A System for Secure Face Identification. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Berkeley\/Oakland, CA, USA.","DOI":"10.1109\/SP.2010.39"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Yuan, J., and Yu, S. (2013, January 14\u201319). Efficient privacy-preserving biometric identification in cloud computing. Proceedings of the 2013 Proceedings IEEE INFOCOM, Turin, Italy.","DOI":"10.1109\/INFCOM.2013.6567073"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.1109\/TKDE.2018.2819673","article-title":"Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training","volume":"30","author":"Wang","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"15457","DOI":"10.1109\/ACCESS.2018.2803129","article-title":"A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems","volume":"6","author":"Niu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"19025","DOI":"10.1109\/ACCESS.2018.2819166","article-title":"An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing","volume":"6","author":"Zhu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"16532","DOI":"10.1109\/ACCESS.2017.2737544","article-title":"A Secure Face-Verification Scheme Based on Homomorphic Encryption and Deep Neural Networks","volume":"5","author":"Ma","year":"2017","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Razavian, A.S., Azizpour, H., Sullivan, J., and Carlsson, S. (2014, January 24\u201327). CNN Features off-the-shelf: An Astounding Baseline for Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Columbus, OH, USA.","DOI":"10.1109\/CVPRW.2014.131"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"18848","DOI":"10.1109\/ACCESS.2017.2784352","article-title":"Iris Recognition with off-the-Shelf CNN Features: A Deep Learning Perspective","volume":"6","author":"Nguyen","year":"2018","journal-title":"IEEE Access"},{"key":"ref_24","unstructured":"Penn, G.M., P\u00f6tzelsberger, G., Rohde, M., and Uhl, A. (2014, January 10\u201312). Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching. Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_25","unstructured":"(2018, December 04). Biometrics Ideal Test. Available online: http:\/\/biometrics.idealtest.org\/dbDetailForUser.do?id=7."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Popa, D., and Simion, E. (July, January 29). Enhancing security by combining biometrics and cryptography. Proceedings of the 2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Targoviste, Romania.","DOI":"10.1109\/ECAI.2017.8166461"},{"key":"ref_27","unstructured":"Tams, B. (arXiv, 2013). Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems, arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.cose.2006.12.008","article-title":"Biometric attack vectors and defences","volume":"26","author":"Roberts","year":"2007","journal-title":"Comput. Secur."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Liu, K., Dolan-Gavitt, B., and Garg, S. (arXiv, 2018). Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks, arXiv.","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref_30","unstructured":"Chen, B., Carvalho, W., Baracaldo, N., Ludwig, H., Edwards, B., Lee, T., Molloy, I., and Srivastava, B. (arXiv, 2018). Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering, arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Wang, B., Yao, Y., Shan, S., Li, H., Viswanath, B., Zheng, H., and Zhao, B.Y. (2018, November 30). Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. Available online: https:\/\/people.cs.vt.edu\/vbimal\/publications\/backdoor-sp19.pdf.","DOI":"10.1109\/SP.2019.00031"},{"key":"ref_32","unstructured":"Xiao, H., Xiao, H., and Eckert, C. (2012, January 27\u201331). Adversarial label flips attack on support vector machines. Proceedings of the 20th European Conference on Artificial Intelligence, Montpellier, France."},{"key":"ref_33","unstructured":"Biggio, B., Nelson, B., and Laskov, P. (2011, January 13\u201315). Support Vector Machines Under Adversarial Label Noise. Proceedings of the Asian Conference on Machine Learning, Taoyuan, Taiwan."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Biggio, B., Corona, I., Nelson, B., Rubinstein, B.I., Maiorca, D., Fumera, G., Giacinto, G., and Roli, F. (2014). Security Evaluation of Support Vector Machines in Adversarial Environments. Support Vector Machines Applications, Springer International Publishing.","DOI":"10.1007\/978-3-319-02300-7_4"},{"key":"ref_35","unstructured":"Samangouei, P., Kabkab, M., and Chellappa, R. (arXiv, 2018). Defense-GAN: Protecting Classifiers against Adversarial Attacks Using Generative Models, arXiv."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/8\/1\/3\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:36:33Z","timestamp":1760196993000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/8\/1\/3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,3]]}},"alternative-id":["computers8010003"],"URL":"https:\/\/doi.org\/10.3390\/computers8010003","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,29]]}}}