{"id":"https://openalex.org/W4417503151","doi":"https://doi.org/10.3390/e28010005","title":"Efficient Privacy-Preserving Face Recognition Based on Feature Encoding and Symmetric Homomorphic Encryption","display_name":"Efficient Privacy-Preserving Face Recognition Based on Feature Encoding and Symmetric Homomorphic Encryption","publication_year":2025,"publication_date":"2025-12-19","ids":{"openalex":"https://openalex.org/W4417503151","doi":"https://doi.org/10.3390/e28010005","pmid":"https://pubmed.ncbi.nlm.nih.gov/41593912"},"language":"en","primary_location":{"id":"doi:10.3390/e28010005","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e28010005","pdf_url":"https://www.mdpi.com/1099-4300/28/1/5/pdf","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1099-4300/28/1/5/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006783691","display_name":"Limengnan Zhou","orcid":"https://orcid.org/0000-0001-7466-0907"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Limengnan Zhou","raw_affiliation_strings":["School of Electronic and Information Engineering, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101927778","display_name":"Qinghua Li","orcid":"https://orcid.org/0000-0002-1197-6952"},"institutions":[{"id":"https://openalex.org/I102345215","display_name":"Xihua University","ror":"https://ror.org/04gwtvf26","country_code":"CN","type":"education","lineage":["https://openalex.org/I102345215"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinshi Li","raw_affiliation_strings":["School of Computer and Software Engineering, Xihua University, Chengdu 610039, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Xihua University, Chengdu 610039, China","institution_ids":["https://openalex.org/I102345215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038699004","display_name":"Hui Zhu","orcid":"https://orcid.org/0000-0002-4564-9378"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhu","raw_affiliation_strings":["School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019993125","display_name":"Yanxia Zhou","orcid":"https://orcid.org/0000-0003-0393-8136"},"institutions":[{"id":"https://openalex.org/I51622183","display_name":"Shaanxi University of Science and Technology","ror":"https://ror.org/034t3zs45","country_code":"CN","type":"education","lineage":["https://openalex.org/I51622183"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanxia Zhou","raw_affiliation_strings":["School of Information Science and Technology, Xizang University, Lhasa 850000, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Xizang University, Lhasa 850000, China","institution_ids":["https://openalex.org/I51622183"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049733139","display_name":"Hanzhou Wu","orcid":"https://orcid.org/0000-0002-1599-7232"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanzhou Wu","raw_affiliation_strings":["School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China","institution_ids":["https://openalex.org/I113940042"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5006783691"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44253169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"1","first_page":"5","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.4325999915599823,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.4325999915599823,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.32170000672340393,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.05469999834895134,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7240999937057495},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5995000004768372},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.5785999894142151},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5206999778747559},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5001000165939331},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.4932999908924103},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.46880000829696655},{"id":"https://openalex.org/keywords/face-detection","display_name":"Face detection","score":0.3873000144958496},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.36649999022483826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7645000219345093},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7240999937057495},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5995000004768372},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.5785999894142151},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5206999778747559},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.4932999908924103},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.46880000829696655},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4343999922275543},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.3873000144958496},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3776000142097473},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.36649999022483826},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3626999855041504},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.3614000082015991},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3084999918937683},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2964000105857849},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C2780762811","wikidata":"https://www.wikidata.org/wiki/Q1784941","display_name":"Cosine similarity","level":3,"score":0.28439998626708984},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.28110000491142273},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2653999924659729},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.25540000200271606},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C1769480","wikidata":"https://www.wikidata.org/wiki/Q1345239","display_name":"Entropy encoding","level":3,"score":0.2531999945640564}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/e28010005","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e28010005","pdf_url":"https://www.mdpi.com/1099-4300/28/1/5/pdf","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},{"id":"pmid:41593912","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41593912","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:doaj.org/article:5592a0a302d240fb925097ef5ec786e3","is_oa":true,"landing_page_url":"https://doaj.org/article/5592a0a302d240fb925097ef5ec786e3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy, Vol 28, Iss 1, p 5 (2025)","raw_type":"article"},{"id":"pmh:oai:pubmedcentral.nih.gov:12840155","is_oa":true,"landing_page_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC12840155/","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy (Basel)","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/e28010005","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e28010005","pdf_url":"https://www.mdpi.com/1099-4300/28/1/5/pdf","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417503151.pdf","grobid_xml":"https://content.openalex.org/works/W4417503151.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W805707617","https://openalex.org/W1488338708","https://openalex.org/W1584467222","https://openalex.org/W2109426455","https://openalex.org/W2177209050","https://openalex.org/W2768174108","https://openalex.org/W2782827498","https://openalex.org/W2962993699","https://openalex.org/W2982340830","https://openalex.org/W2987547013","https://openalex.org/W3004251986","https://openalex.org/W3008990186","https://openalex.org/W3027552584","https://openalex.org/W3044222737","https://openalex.org/W3168750027","https://openalex.org/W3174306763","https://openalex.org/W3193630419","https://openalex.org/W3205312502","https://openalex.org/W3206910859","https://openalex.org/W3213024359","https://openalex.org/W3214073331","https://openalex.org/W4293198129","https://openalex.org/W4318408440","https://openalex.org/W4319303911","https://openalex.org/W4366724916","https://openalex.org/W4379116840","https://openalex.org/W4385893333","https://openalex.org/W4386075507","https://openalex.org/W4389961033","https://openalex.org/W4391021823","https://openalex.org/W4394841777","https://openalex.org/W4408750074","https://openalex.org/W4410033183"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,15,51,77,81,103,106,110,125,154],"context":[2],"of":[3,19,109],"privacy-preserving":[4,45,180],"face":[5,46,181],"recognition":[6,47],"systems,":[7],"entropy":[8,33,64,123],"plays":[9],"a":[10,44,91],"crucial":[11],"role":[12],"in":[13,34,114,124,186],"determining":[14],"efficiency":[16,68,157],"and":[17,31,57,69,128,142,147,176],"security":[18],"computational":[20,36,63],"processes.":[21],"However,":[22],"existing":[23],"schemes":[24],"often":[25],"encounter":[26],"challenges":[27],"such":[28],"as":[29],"inefficiency":[30],"high":[32],"their":[35],"models.":[37],"To":[38],"address":[39],"these":[40],"issues,":[41],"we":[42,84],"propose":[43],"method":[48,171],"based":[49],"on":[50],"Face":[52],"Feature":[53],"Coding":[54],"Method":[55],"(FFCM)":[56],"symmetric":[58,119],"homomorphic":[59,120],"encryption,":[60,121],"which":[61],"reduces":[62],"while":[65],"enhancing":[66],"system":[67,131],"ensuring":[70],"facial":[71,112,155],"privacy":[72],"protection.":[73],"Specifically,":[74],"to":[75,163],"accelerate":[76],"matching":[78],"speed":[79],"during":[80,101],"authentication":[82,156],"phase,":[83],"construct":[85],"an":[86,173],"N-ary":[87],"feature":[88],"tree":[89],"using":[90,117],"neural":[92],"network-based":[93],"FFCM,":[94],"significantly":[95],"improving":[96],"ciphertext":[97,115],"search":[98],"efficiency.":[99],"Additionally,":[100],"authentication,":[102],"server":[104],"computes":[105],"cosine":[107],"similarity":[108],"matched":[111],"features":[113],"form":[116],"lightweight":[118],"minimizing":[122],"computation":[126],"process":[127],"reducing":[129],"overall":[130],"complexity.":[132],"Security":[133],"analysis":[134],"indicates":[135],"that":[136,153],"critical":[137],"template":[138],"information":[139],"remains":[140],"secure":[141],"resilient":[143],"against":[144],"both":[145],"passive":[146],"active":[148],"attacks.":[149],"Experimental":[150],"results":[151],"demonstrate":[152],"with":[158],"FFCM":[159],"classification":[160],"is":[161],"4%":[162],"6%":[164],"higher":[165],"than":[166],"recent":[167],"state-of-the-art":[168],"solutions.":[169],"This":[170],"provides":[172],"efficient,":[174],"secure,":[175],"entropy-aware":[177],"approach":[178],"for":[179],"recognition,":[182],"offering":[183],"substantial":[184],"improvements":[185],"large-scale":[187],"applications.":[188]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-12-19T00:00:00"}
