Research Article

Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing

Table 1

Notations of our proposed scheme.

SymbolDefinition

A cryptographic hash function
A symmetric key encryption/decryption function
Large primes numbers
User anonymity
User’s fingerprint
Shared key
Public parameters provided by to at setup phase
Secrete keys provided by to at setup phase
Partial encryption of user’s fingerprint
Other miscellaneous values which are used in the verification
A random pixel selected from user’s fingerprint
The positions of pixel
Discrete wavelet transform