2020
DOI: 10.1109/tdsc.2017.2759732
|View full text |Cite
|
Sign up to set email alerts
|

Known Sample Attacks on Relation Preserving Data Transformations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Kaplan et al [16] propose a SA scheme by utilizing the relation of multiple compromised transformed templates from the same individual. The scheme exploits distance preserving trait of the transformation algorithm.…”
Section: Related Work 21 Similarity-based Attack (Sa)mentioning
confidence: 99%
“…Kaplan et al [16] propose a SA scheme by utilizing the relation of multiple compromised transformed templates from the same individual. The scheme exploits distance preserving trait of the transformation algorithm.…”
Section: Related Work 21 Similarity-based Attack (Sa)mentioning
confidence: 99%
“…A recent work [17] has devised an attack on Relation Preserving Transformation (RPT). Since RPT is the basis of our transformation, it may be open to breach by [17].…”
Section: Number Of Iterations Needed To Convergementioning
confidence: 99%
“…A recent work [17] has devised an attack on Relation Preserving Transformation (RPT). Since RPT is the basis of our transformation, it may be open to breach by [17]. Assuming that such an attack is implemented, we analyze the feasibility of it in detail.…”
Section: Number Of Iterations Needed To Convergementioning
confidence: 99%
See 2 more Smart Citations