2022 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW) 2022
DOI: 10.1109/wacvw54805.2022.00038
|View full text |Cite
|
Sign up to set email alerts
|

OTB-morph: One-Time Biometrics via Morphing applied to Face Templates

Abstract: https://repositorio.uam.es Esta es la versión de autor del artículo publicado en: This is an author produced version of a paper published in: IEEE Winter Applications and Computer Vision Workshops

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…The two feature vectors from the face and periocular regions are fused at the feature level by conjunction. Built on time-varying keys obtained from the One-Time Biometrics via morphing (OTB-morph) random face data, the method proposed by Ghafourian et al [98] was executed on a pre-trained Resnet-50 for general image recognition tasks. When applied to face images, OTB-morph can produce artificial faces so that users do not have to expose their real faces, thus improving biometric recognition performance and security.…”
Section: Resnet-50mentioning
confidence: 99%
“…The two feature vectors from the face and periocular regions are fused at the feature level by conjunction. Built on time-varying keys obtained from the One-Time Biometrics via morphing (OTB-morph) random face data, the method proposed by Ghafourian et al [98] was executed on a pre-trained Resnet-50 for general image recognition tasks. When applied to face images, OTB-morph can produce artificial faces so that users do not have to expose their real faces, thus improving biometric recognition performance and security.…”
Section: Resnet-50mentioning
confidence: 99%
“…To address these concerns, adversarial examples have gained attention as a countermeasure. A study by Ghafourian et al [41] evaluates the efficacy of the Basic Iterative Method (BIM) and Iterative Least Likely Class (ILLC), two adversarial methodologies for detecting private face pictures within FR. Fig.…”
Section: Face De-identificationmentioning
confidence: 99%
“…These perturbations are being generated by applying a very slight (imperceptible to human eyes) modification to the input and optimizing it to maximize the probability of misclassifcation by a machine learning classifier (Chakraborty et al 2021;Biggio et al 2013). Using attacks to preserve privacy in biometrics has attracted attention (Ghafourian et al 2022) which also includes adversarial examples. The goal of image cloaking for privacy protection is to suppress the identification rate of the subject while preserving the quality of their images (Hernandez-Ortega et al 2020;Schlett et al 2022) keeping the adversarial perturbation imperceptible.…”
Section: Introductionmentioning
confidence: 99%