2007
DOI: 10.1007/978-3-540-74549-5_60
|View full text |Cite
|
Sign up to set email alerts
|

“3D Face”: Biometric Template Protection for 3D Face Recognition

Abstract: In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection system based on the helper data system (HDS). The experimental results performed on the FRGC v2.0 database demonstrate that the performance of the protected system is of the same order as the performance of the unprotected system. The protected system has a performance of a FAR ≈ 0.19% and a FRR ≈ 16% with a security level of 35 bits.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(64 citation statements)
references
References 9 publications
0
64
0
Order By: Relevance
“…A more detailed description of the HDS is provided in Section 2.3.1. An abstract overview of the HDS scheme as used in [33][34][35] is portrayed in Figure 1.5 and consists of two main parts: (i) Bit Extraction and (ii) Bit Protection part. In the enrolment phase, first a real-valued feature vector is extracted from each acquired enrolment sample by the Feature Extraction module.…”
Section: Helper Data System (Hds)mentioning
confidence: 99%
See 4 more Smart Citations
“…A more detailed description of the HDS is provided in Section 2.3.1. An abstract overview of the HDS scheme as used in [33][34][35] is portrayed in Figure 1.5 and consists of two main parts: (i) Bit Extraction and (ii) Bit Protection part. In the enrolment phase, first a real-valued feature vector is extracted from each acquired enrolment sample by the Feature Extraction module.…”
Section: Helper Data System (Hds)mentioning
confidence: 99%
“…bits with a smaller bit-error probability [33][34][35][42][43][44][45]. We limit the scope of our analysis to the simple binarization scheme, the reliable component selection (RCS) scheme [33][34][35], and the DROBA scheme [42].…”
Section: Bit Extraction Part (Ad 1 )mentioning
confidence: 99%
See 3 more Smart Citations