2020
DOI: 10.1109/tifs.2020.2969513
|View full text |Cite
|
Sign up to set email alerts
|

Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(39 citation statements)
references
References 46 publications
0
39
0
Order By: Relevance
“…In this way, the distortion parameters can be modified if a cancelable feature is compromised, producing a new template. This improves the security level by enabling the use of several disrupted templates, all of them associated with the same biometric information, but may reduce the performance of the authentication system [ 87 ]. Cancelable biometrics are usually divided into two categories [ 84 , 88 ]: Salting : An invertible transformation is used to alter the features, hence being possible to recuperate the original information; Non-invertible : The distortions are produced with an irreversible function, which imply better diversity and revocability than salting methods.…”
Section: Privacy-preserving Approachesmentioning
confidence: 99%
“…In this way, the distortion parameters can be modified if a cancelable feature is compromised, producing a new template. This improves the security level by enabling the use of several disrupted templates, all of them associated with the same biometric information, but may reduce the performance of the authentication system [ 87 ]. Cancelable biometrics are usually divided into two categories [ 84 , 88 ]: Salting : An invertible transformation is used to alter the features, hence being possible to recuperate the original information; Non-invertible : The distortions are produced with an irreversible function, which imply better diversity and revocability than salting methods.…”
Section: Privacy-preserving Approachesmentioning
confidence: 99%
“…Im et al [12] proposed a face-feature based authentication system for mobile phones. They use Yao's garbled circuit based secure-multi party computation to secure the biometric data.…”
Section: Related Workmentioning
confidence: 99%
“…With the recent advances in mobile technologies, biometric verification is being adopted in many smart devices as a tool for authenticating their owners. This technique is used not only to unlock devices but also permit users to run security-critical applications, such as financial services [ 2 ].…”
Section: Introductionmentioning
confidence: 99%
“…Although their protocol was very fast, it required a high communication cost for preprocessing. In 2020, Im et al proposed a secure face verification system that guarantees a real-time authentication performance on a smartphone [ 2 ]. They evaluated the performance of their system with two experiments; (1) an experiment involving 30 users in a real-world environment and (2) an experiment using the public face datasets CFP [ 51 ] and ORL [ 52 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation