2019
DOI: 10.1016/j.sigpro.2018.09.013
|View full text |Cite
|
Sign up to set email alerts
|

Deep Secure Quantization: On secure biometric hashing against similarity-based attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 14 publications
0
25
1
Order By: Relevance
“…The evaluation of the resistance to similarity-based attacks of the biometric LPN commitments was performed according to [14], which considers that protected templates are secure only if the mutual information between the normalized distances of the impostor data in the protected and unprotected domains is very small. In [14], mutual information is assumed to be upper bounded by the variance of the distribution of the impostor protected distances. The results obtained are shown in Fig.…”
Section: Security Analysis Of the Protected Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…The evaluation of the resistance to similarity-based attacks of the biometric LPN commitments was performed according to [14], which considers that protected templates are secure only if the mutual information between the normalized distances of the impostor data in the protected and unprotected domains is very small. In [14], mutual information is assumed to be upper bounded by the variance of the distribution of the impostor protected distances. The results obtained are shown in Fig.…”
Section: Security Analysis Of the Protected Approachmentioning
confidence: 99%
“…In the other side, most of cancelable biometric schemes apply similarity-preserving transformations, also called Locality Sensitive Hashing, in order to preserve in the protected domain the accuracy performance obtained in the unprotected domain [14] [15]. The problem is that this similarity or distance-preserving property (distances between unprotected samples are nearly the same as the distances between protected samples) can be exploited by similaritybased attacks that break these schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The deep neural network is also employed in the biometric protection. To address the advent of similarity-based attacks (SA), Deep Secure Quantization (DSQ) based on neural network implementations is used to protect iris feature [31]. Deen Dayal Mohan presented a significant bit based representation for creating secure face templates with negligible degradation in the performance [32].…”
Section: Related Workmentioning
confidence: 99%
“…More recently, the proposal of Aness and Chen used discriminative binary feature learning and quantization [67], and Yuliana, Wirawan, and Suwadi [68] combined pre-processing with multi-level quantization. Furthermore, Chen, Wo, Xie, Wu, and Han improved quantization techniques against leakage and similarity-based attacks [69].…”
mentioning
confidence: 99%