2017 IEEE Workshop on Information Forensics and Security (WIFS) 2017
DOI: 10.1109/wifs.2017.8267664
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving identification using sparse approximation with ambiguization

Abstract: In this paper, we consider a privacy preserving encoding framework for identification applications covering biometrics, physical object security and the Internet of Things (IoT). The proposed framework is based on a sparsifying transform, which consists of a trained linear map, an element-wise nonlinearity, and privacy amplification. The sparsifying transform and privacy amplification are not symmetric for the data owner and data user. We demonstrate that the proposed approach is closely related to sparse tern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(32 citation statements)
references
References 14 publications
0
32
0
Order By: Relevance
“…We believe that these factors should be covered in future research. In particular, the lack of reliably image priors can be addressed by the generative model in the formulation (8) under the linear ternarization approximation and compared with the solution based on (9). An additional research problem to be addressed is an adversarial training (9), when the various ambiguizations u a should replace the clean version u similarly to the denoising auto-encoder training [22].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We believe that these factors should be covered in future research. In particular, the lack of reliably image priors can be addressed by the generative model in the formulation (8) under the linear ternarization approximation and compared with the solution based on (9). An additional research problem to be addressed is an adversarial training (9), when the various ambiguizations u a should replace the clean version u similarly to the denoising auto-encoder training [22].…”
Section: Discussionmentioning
confidence: 99%
“…We do not pretend to be exhaustive in our overview and refer interesting readers to [8]. Recently, a concept of the STCA was proposed that combines and extends the encoding and randomization principles from the informationtheoretic perspectives [9][10][11]. The STCA ensures the protection of both templates and queries in authentication and identification systems against the adversarial reconstruction and clustering [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…G. Sparse Coding with Amibiguation (SCA) [9], [10] Given a sparse ternary vector v = ϕ(x) ∈ {−1, 0, 1} L , the ambiguation mechanism A turns S n randomly chosen zero components of v into a (random) ±1. The resulting ternary vector u = A(v) is stored as enrolment data (see Fig.…”
Section: E Sparse Binary Coding (Sbc)mentioning
confidence: 99%
“…At their core, these approaches use for example sketching or quantization techniques that prohibit reconstructing identities with sufficient precision [2,3]. Other techniques embed real vectors into another representational space with the purpose of security and privacy [12,11].…”
Section: Introductionmentioning
confidence: 99%