Abstract
A problem with biometric information is that it is more sensitive to external leakage, because it is information that cannot be changed immediately compared to general authentication methods. Regarding facial information, a case in which authentication was permitted by facial information output by a 3D printer was found. Therefore, a method for minimizing the leakage of biometric information to the outside is required. In this paper, different levels of identification information according to the authority of the user are provided by the de-identification of metadata and face information in stages. For face information and metadata, the level of de-identification is determined and achieved according to the risk level of the de-identified subject. Then, we propose a mechanism to minimize the leakage path by preventing reckless data access by classifying access rights to unidentified data according to four roles. The proposed mechanism provides only differentially de-identified data according to the authority of the accessor, and the required time to perform the de-identification of one image was, on average, 3.6 ms for 300 datapoints, 3.5 ms for 500 datapoints, and 3.47 ms for 1000 datapoints. This confirmed that the required execution time was shortened in proportion to the increase in the size of the dataset. The results for the metadata were similar, and it was confirmed that it took 4.3 ms for 300 cases, 3.78 ms for 500 cases, and 3.5 ms for 1000 cases.
Funder
National Research Foundation of Korea
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference36 articles.
1. The effect of coronavirus disease-19 (COVID-19) risk perception on behavioural intention towards ‘untact’ tourism in South Korea during the first wave of the pandemic (March 2020)
2. Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment;Donghyeok;Pers. Ubiquitous Comput.,2017
3. Inter-Authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment;Namje;Int. Inf. Inst. Inf.,2015
4. First Do No Harm With COVID-19: Corona Collateral Damage Syndrome
5. A Secure Almanac Synchronization Method for Open IoT Maritime Cloud Environment;Donghyeok;J. Korean Inst. Inf. Technol.,2017
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献