skip to main content
10.1145/3277570.3277589acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceccConference Proceedingsconference-collections
research-article

Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing

Published: 15 November 2018 Publication History

Abstract

In the past two decades ambient intelligence (AmI) has been a focus of research in different fields and from different points of view. It can be defined as an electronic environment consisting of devices capable of recognising people presence and responding in a certain way. The security and privacy in these kind of environments is still a challenge. With employing biometrics for person recognition in ambient intelligence, the devices could distinguish between different people in a non-intrusive way. With this, the privacy issue occurring in ambient intelligence is even more pronounced when combined with biometric recognition. This paper shows a privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing.

References

[1]
Andrea F Abate, Maria De Marsico, Daniel Riccio, and Genny Tortora. 2011. MUBAI: multiagent biometrics for ambient intelligence. Journal of Ambient Intelligence and Humanized Computing 2, 2 (2011), 81--89.
[2]
Andrea F Abate, Fabio Narducci, and Stefano Ricciardi. 2015. Biometrics empowered ambient intelligence environment. Atti della Accademia Peloritana dei Pericolanti-Classe di Scienze Fisiche, Matematiche e Naturali 93, 2 (2015), 4.
[3]
Giovanni Acampora, Vincenzo Loia, Michele Nappi, and Stefano Ricciardi. 2005. Ambient intelligence framework for context aware adaptive applications. In Computer Architecture for Machine Perception, 2005. CAMP 2005. Proceedings. Seventh International Workshop on. IEEE, 327--332.
[4]
Juan Carlos Augusto and Paul McCullagh. 2007. Ambient intelligence: Concepts and applications. Computer Science and Information Systems 4, 1 (2007), 1--27.
[5]
Privacy Rights Clearinghouse. 2003. RFID position statement of consumer privacy and civil liberties organizations. Privacy Rights Clearinghouse (2003).
[6]
Robert T Collins, Ralph Gross, and Jianbo Shi. 2002. Silhouette-based human identification from body shape and gait. In Automatic Face and Gesture Recognition, 2002. Proceedings. Fifth IEEE International Conference on. IEEE, 366--371.
[7]
Diane J Cook, Juan C Augusto, and Vikramaditya R Jakkula. 2009. Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5, 4 (2009), 277--298.
[8]
Ashok Kumar das and Adrijit Goswami. 2015. A robust anonymus biometric-based remote user authentication scheme using smart cards. Journal of King Saud University-Computer and Information Sciences (2015).
[9]
Parwinder Kaur Dhillon and Sheetal Kalra. 2017. A lightweight biometrics based remote user authetication scheme for IoT services. Journal of Information Security and Applications (2017).
[10]
Parwinder Kaur Dhillon and Sheetal Kalra. 2017. Secure multi{U+2010}factor remote user authentication scheme for Internet of Things environments. International Journal of Communication Systems (2017).
[11]
Wen Fang, Hai-Miao Hu, Zihao Hu, Shengcai Liao, and Bo Li. 2017. Perceptual hash-based feature description for person re-identification. Neurocomputing (2017).
[12]
Elisabetta Farella, Sile O'Modhrain, Luca Benini, and Bruno Riccó. 2006. Gesture signature for ambient intelligence applications: a feasibility study. In International Conference on Pervasive Computing. Springer, 288--304.
[13]
Brackman Geert, Adriaan Barri, Fodor Gabor, Ann Dooms, Barbarien Joeri, Peter Schelkens, Boho Andras, and Weng Li. 2012. Reduced Reference Quality Assessment based on Watermarking and Perceptual Hashing. In Workshop on Video Processing and Quality Metrics for Consumer Electronics.
[14]
H. Gunasinghe and Bertino E. 2014. Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. Network and System Security, Lecture Notes in Computer Science (2014).
[15]
Justin AT Halls. 2006. Ultra low resolution thermal imaging for kitchen hazard detection: A technology feasibility study. In Smart Homes and Beyond: ICOST 2006: 4th International Conference on Smart Homes and Health Telematics, Vol. 19. IOS Press, 231.
[16]
Mar Lopez, Juanita Pedraza, Javier Carbo, and Jose M. Molina. 2014. The awareness of Privacy issues in Ambient Intelligence. Advances in Distributed Computing And Artificial Intelligence Journal (2014).
[17]
Goreti Marreiros, Ricardo Santos, Paulo Novais, José Machado, Carlos Ramos, José Neves, and José Bula-Cruz. 2007. Argumentation-based decision making in ambient intelligence environments. In Portuguese Conference on Artificial Intelligence. Springer, 309--322.
[18]
Goreti Marreiros, Ricardo Santos, Carlos Ramos, José Neves, Paulo Novais, José Manuel Machado, and José Bulas Cruz. 2007. Ambient intelligence in emotion based ubiquitous decision making. In International Joint Conference on Artificial Intelligence (IJCAI 2007)-2nd Workshop on Artificial Intelligence Techniques for Ambient Intelligence (AITAmI'07), Hyderabad, India.
[19]
Vishal Monga and Brian L. Evans. 2006. Perceptual image hashing via feature points: Performance evaluation and tradeoffs. IEEE Transactions on image processing 15, 11 (2006).
[20]
M Pat Murray. 1967. Gait as a total pattern of movement: Including a bibliography on gait. American Journal of Physical Medicine & Rehabilitation 46, 1 (1967), 290--333.
[21]
Arambam Neelima and Kh Manglem Singh. 2014. A short survey on perceptual hash functions. ADBU Journal of Engineering technology 1 (2014).
[22]
RW Picard. 2007. Toward Machines with Emotional Intelligence, Chapter in The science of emotional intelligence: Knowns and unknowns. (2007).
[23]
Rosalind W Picard. 2000. Toward computers that recognize and respond to user emotion. IBM systems journal 39, 3.4 (2000), 705--719.
[24]
Fariba Sadri. 2011. Ambient intelligence: A survey. ACM Computing Surveys (CSUR) 43, 4 (2011), 36.
[25]
Jens Segers. 2018. Perceptual image hashes. webpage. (July 2018).
[26]
Massimo Tistarelli and Ben Schouten. 2011. Biometrics in ambient intelligence. Journal of Ambient Intelligence and Humanized Computing 2, 2 (2011), 113--126.
[27]
Igor Tomičić, Petra Grd, and Miroslav Bača. 2018. A review of soft biometrics for IoT. In MIPRO 2018 Proceedings. 1285--1290.
[28]
T. T. Verlekar and P. L. Correia. 2016. Walking direction identification using perceptual hashing. In 2016 4th International Conference on Biometrics and Forensics (IWBF). 1--6.
[29]
Yongwei Wang, Hamid Palangi, Z. Jane Wang, and Haoqiah Wang. 2017. RevHash-Net: Perceptually De-Hashing real-valued image hashes for similarity retrieval. Signal processing: Image communication (2017).
[30]
Mark Weiser. 1991. The computer for the twenty-first century (pp. 94--100). Scientific American, September Issue (1991).
[31]
Mark Weiser. 1993. Some computer science issues in ubiquitous computing. Commun. ACM 36, 7 (1993), 75--84.
[32]
Li Weng and Bart Preneel. 2011. A secure perceptual hash algorithm for image content authentication. In CMS 2011. IFIP, 108--121.
[33]
David Wright. 2005. The dark side of ambient intelligence. info 7, 6 (2005), 33--51.
[34]
David Wright, Serge Gutwirth, Michael Friedewald, Elena Vildjiounaite, and Yves Punie. 2008. Safeguards in a world of ambient intelligence. Vol. 1. Springer Science & Business Media.
[35]
Christoph Zauner, Martin Steinebach, and Eckehard Hermann. 2011. Rihamark: Perceptual image hash benchmarking. Media Watermarking, Security and Forensics III (2011).

Cited By

View all

Index Terms

  1. Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018
    November 2018
    109 pages
    ISBN:9781450365154
    DOI:10.1145/3277570
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Maribor

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 November 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ambient intelligence
    2. biometric
    3. perceptual hash
    4. privacy

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CECC 2018
    CECC 2018: Central European Cybersecurity Conference 2018
    November 15 - 16, 2018
    Ljubljana, Slovenia

    Acceptance Rates

    CECC 2018 Paper Acceptance Rate 19 of 30 submissions, 63%;
    Overall Acceptance Rate 38 of 65 submissions, 58%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media