{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T05:16:41Z","timestamp":1766639801651,"version":"3.48.0"},"reference-count":42,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T00:00:00Z","timestamp":1766102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"2024 Xizang Autonomous Region Central Guided Local Science and Technology Development Fund Project","award":["XZ202401YD0015"],"award-info":[{"award-number":["XZ202401YD0015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In the context of privacy-preserving face recognition systems, entropy plays a crucial role in determining the efficiency and security of computational processes. However, existing schemes often encounter challenges such as inefficiency and high entropy in their computational models. To address these issues, we propose a privacy-preserving face recognition method based on the Face Feature Coding Method (FFCM) and symmetric homomorphic encryption, which reduces computational entropy while enhancing system efficiency and ensuring facial privacy protection. Specifically, to accelerate the matching speed during the authentication phase, we construct an N-ary feature tree using a neural network-based FFCM, significantly improving ciphertext search efficiency. Additionally, during authentication, the server computes the cosine similarity of the matched facial features in ciphertext form using lightweight symmetric homomorphic encryption, minimizing entropy in the computation process and reducing overall system complexity. Security analysis indicates that critical template information remains secure and resilient against both passive and active attacks. Experimental results demonstrate that the facial authentication efficiency with FFCM classification is 4% to 6% higher than recent state-of-the-art solutions. This method provides an efficient, secure, and entropy-aware approach for privacy-preserving face recognition, offering substantial improvements in large-scale applications.<\/jats:p>","DOI":"10.3390\/e28010005","type":"journal-article","created":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T14:27:16Z","timestamp":1766154436000},"page":"5","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Privacy-Preserving Face Recognition Based on Feature Encoding and Symmetric Homomorphic Encryption"],"prefix":"10.3390","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7466-0907","authenticated-orcid":false,"given":"Limengnan","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China"}]},{"given":"Qinshi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Software Engineering, Xihua University, Chengdu 610039, China"}]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China"}]},{"given":"Yanxia","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Xizang University, Lhasa 850000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1599-7232","authenticated-orcid":false,"given":"Hanzhou","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, H., Jin, S., Zhang, W., Hu, J., Wang, Y., Sun, P., Yuan, W., Liu, K., and Ren, K. (2023, January 17\u201324). Privacy-preserving adversarial facial features. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Vancouver, BC, Canada.","DOI":"10.1109\/CVPR52729.2023.00794"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MSP.2015.2427849","article-title":"Biometric template protection: Bridging the performance gap between theory and practice","volume":"32","author":"Nandakumar","year":"2015","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Yuan, L., Liang, K., Pu, X., Zhang, Y., Leng, J., Wu, T., Wang, N., and Gao, X. (2023). Invertible image obfuscation for facial privacy protection via secure flow. IEEE Transactions on Circuits and Systems for Video Technology, IEEE.","DOI":"10.1109\/TCSVT.2023.3344809"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4930","DOI":"10.1109\/TIFS.2024.3388976","article-title":"PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation","volume":"19","author":"Yuan","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3632","DOI":"10.1109\/TIFS.2023.3282384","article-title":"Privacy-enhancing face obfuscation guided by semantic-aware attribution maps","volume":"18","author":"Li","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_6","unstructured":"Shan, S., Wenger, E., Zhang, J., Li, H., Zheng, H., and Zhao, B.Y. (2020, January 12\u201314). Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Virtual."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Kimbrough, T., Tian, P., Liao, W., and Yu, W. (2023, January 23\u201325). Performance of GAN-Based Denoising and Restoration Techniques for Adversarial Face Images. Proceedings of the 2023 IEEE\/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA), Orlando, FL, USA.","DOI":"10.1109\/SERA57763.2023.10197680"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1109\/TDSC.2023.3269012","article-title":"ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction","volume":"21","author":"Wang","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Maximov, M., Elezi, I., and Leal-Taix\u00e9, L. (2020, January 13\u201319). Ciagan: Conditional identity anonymization generative adversarial networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00549"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wang, M., Hua, G., Li, S., and Feng, G. (2024). A Key-Driven Framework for Identity-Preserving Face Anonymization. arXiv.","DOI":"10.14722\/ndss.2025.230729"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Yuan, Z., You, Z., Li, S., Qian, Z., Zhang, X., and Kot, A. (2022, January 10\u201314). On generating identifiable virtual faces. Proceedings of the 30th ACM International Conference on Multimedia, New York, NY, USA.","DOI":"10.1145\/3503161.3548110"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/TIFS.2020.2969513","article-title":"Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients","volume":"15","author":"Im","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2632","DOI":"10.1109\/TSC.2023.3242285","article-title":"Efficient Privacy-Preserving Face Identification Protocol","volume":"16","author":"Huang","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6972","DOI":"10.1109\/TII.2022.3199944","article-title":"Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption With Keyword Search","volume":"19","author":"Kolberg","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.1109\/TDSC.2021.3083970","article-title":"PRIVFACE: Fast privacy-preserving face authentication with revocable and reusable biometric credentials","volume":"19","author":"Lei","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_16","unstructured":"Lei, J., Pei, Q., Liu, X., and Sun, W. (2018, January 15\u201317). A practical privacy-preserving face authentication scheme with revocability and reusability. Proceedings of the Algorithms and Architectures for Parallel Processing: 18th International Conference, ICA3PP 2018, Guangzhou, China. Proceedings, Part IV 18."},{"key":"ref_17","first-page":"496","article-title":"The uu-net: Reversible face de-identification for visual surveillance video footage","volume":"32","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Chen, J.W., Chen, L.J., Yu, C.M., and Lu, C.S. (2021, January 20\u201325). Perceptual indistinguishability-net (pi-net): Facial image obfuscation with manipulable semantics. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.00641"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hukkel\u00e5s, H., Mester, R., and Lindseth, F. (2019). Deepprivacy: A generative adversarial network for face anonymization. International Symposium on Visual Computing, Springer.","DOI":"10.1007\/978-3-030-33720-9_44"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.neucom.2021.06.061","article-title":"Unnoticeable synthetic face replacement for image privacy protection","volume":"457","author":"Kuang","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kuang, Z., Liu, H., Yu, J., Tian, A., Wang, L., Fan, J., and Babaguchi, N. (2021, January 20\u201324). Effective de-identification generative adversarial network for face anonymization. Proceedings of the 29th ACM International Conference on Multimedia, Virtual.","DOI":"10.1145\/3474085.3475464"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Dietlmeier, J., Hu, F., Ryan, F., O\u2019Connor, N.E., and McGuinness, K. (2022, January 3\u20138). Improving person re-identification with temporal constraints. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, Waikoloa, HI, USA.","DOI":"10.1109\/WACVW54805.2022.00060"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1109\/TIFS.2024.3356233","article-title":"Securereid: Privacy-preserving anonymization for person re-identification","volume":"19","author":"Ye","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., and Toft, T. (2009, January 5\u20137). Privacy-preserving face recognition. Proceedings of the Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA. Proceedings 9."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R., Schneider, T., and Wehrenberg, I. (2009). Efficient privacy-preserving face recognition. International Conference on Information Security and Cryptology, Springer.","DOI":"10.1007\/978-3-642-14423-3_16"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3735","DOI":"10.1007\/s00500-015-1759-5","article-title":"Privacy-preserving face recognition with outsourced computation","volume":"20","author":"Xiang","year":"2016","journal-title":"Soft Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"136056","DOI":"10.1109\/ACCESS.2020.3011112","article-title":"A privacy-preserving learning framework for face recognition in edge and cloud networks","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","first-page":"8871987","article-title":"Face Image Publication Based on Differential Privacy","volume":"2021","author":"Liu","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2008). Differential privacy: A survey of results. International Conference on Theory and Applications of Models of Computation, Springer.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref_30","unstructured":"Mao, Y., Yi, S., Li, Q., Feng, J., Xu, F., and Zhong, S. (2018, January 10). A privacy-preserving deep learning approach for face recognition with edge computing. Proceedings of the USENIX Workshop Hot Topics Edge Comput. (HotEdge \u201918), Boston, MA, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.neucom.2019.07.039","article-title":"Privacy-preserving lightweight face recognition","volume":"363","author":"Li","year":"2019","journal-title":"Neurocomputing"},{"key":"ref_32","first-page":"31","article-title":"Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy","volume":"17","author":"Liu","year":"2021","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/s42452-025-06987-2","article-title":"Ensuring privacy in face recognition: A survey on data generation, inference and storage","volume":"7","author":"Sun","year":"2025","journal-title":"Discov. Appl. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2967","DOI":"10.1007\/s12652-023-04543-7","article-title":"PriFace: A privacy-preserving face recognition framework under untrusted server","volume":"14","author":"Zhao","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1460","DOI":"10.1109\/TIFS.2018.2790916","article-title":"Cryptanalysis of a symmetric fully homomorphic encryption scheme","volume":"13","author":"Wang","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"5220","DOI":"10.1109\/JIOT.2020.2977253","article-title":"Achieving O (log3n) communication-efficient privacy-preserving range query in fog-based IoT","volume":"7","author":"Mahdikhani","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Cozza, F., Guarino, A., Isernia, F., Malandrino, D., Rapuano, A., Schiavone, R., and Zaccagnino, R. (2020). Hybrid and lightweight detection of third party tracking: Design, implementation, and evaluation. Computer Networks, Elsevier BV.","DOI":"10.1016\/j.comnet.2019.106993"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"108614","DOI":"10.1016\/j.comnet.2021.108614","article-title":"An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information","volume":"202","author":"Guarino","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_39","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"Iacr Cryptol. Eprint Arch."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2633600","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","volume":"6","author":"Brakerski","year":"2014","journal-title":"ACM Trans. Comput. Theory (TOCT)"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Cheon, J., Kim, A., Kim, M., and Song, Y. (2017). Homomorphic encryption for arithmetic of approximate numbers. International Conference on the Theory and Application of Cryptology and Information Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref_42","unstructured":"Serengil, S., and Ozpinar, A. (2025). CipherFace: A Fully Homomorphic Encryption-Driven Framework for Secure Cloud-Based Facial Recognition. arXiv."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/28\/1\/5\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T05:15:30Z","timestamp":1766639730000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/28\/1\/5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,19]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["e28010005"],"URL":"https:\/\/doi.org\/10.3390\/e28010005","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2025,12,19]]}}}