Research Article
Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing
Table 1
Notations of our proposed scheme.
| Symbol | Definition |
| | A cryptographic hash function | | A symmetric key encryption/decryption function | | Large primes numbers | | User anonymity | | User’s fingerprint | | Shared key | | Public parameters provided by to at setup phase | | Secrete keys provided by to at setup phase | | Partial encryption of user’s fingerprint | | Other miscellaneous values which are used in the verification | | A random pixel selected from user’s fingerprint | | The positions of pixel | | Discrete wavelet transform |
|
|