Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05)
DOI: 10.1109/autoid.2005.24
|View full text |Cite
|
Sign up to set email alerts
|

Face Recognition with Renewable and Privacy Preserving Binary Templates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
146
0

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 120 publications
(148 citation statements)
references
References 11 publications
0
146
0
Order By: Relevance
“…Kuan et al [6] presented a method for extracting cryptographic keys from dynamic handwritten signatures. A similar approach 4 for face templates was presented by Kevenaar et al [7] in which they generate binary feature vectors from biometric face data that can be protected by using helper data introduced into this bit sequence.…”
Section: Previous Workmentioning
confidence: 99%
“…Kuan et al [6] presented a method for extracting cryptographic keys from dynamic handwritten signatures. A similar approach 4 for face templates was presented by Kevenaar et al [7] in which they generate binary feature vectors from biometric face data that can be protected by using helper data introduced into this bit sequence.…”
Section: Previous Workmentioning
confidence: 99%
“…However, the drawback of not having a score is that it is not possible to apply fusion at score-level. Therefore, published work on fusion with template protection are mainly focussed on fusion at feature-level or at decision-level [33,34,[46][47][48]. However, we show in Chapter 7 that by extending the PI reconstruction process with the derivation of a dissimilarity score, it is possible to apply fusion at score-level, given some limitations on the match and non-match regions that can be created.…”
Section: Fusionmentioning
confidence: 99%
“…bits with a smaller bit-error probability [33][34][35][42][43][44][45]. We limit the scope of our analysis to the simple binarization scheme, the reliable component selection (RCS) scheme [33][34][35], and the DROBA scheme [42].…”
Section: Bit Extraction Part (Ad 1 )mentioning
confidence: 99%
See 2 more Smart Citations