2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2019
DOI: 10.1109/cvprw.2019.00293
|View full text |Cite
|
Sign up to set email alerts
|

Significant Feature Based Representation for Template Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 31 publications
0
14
0
Order By: Relevance
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
“…In the worst-case (SCE) scenario where all users' parameters are stolen, the recognition accuracy of a PolyProtected system may be worse than that of the baseline; however, our results indicate that the performance can be improved by tuning the amount of overlap used in the PolyProtect mapping as well as the FMR tolerance of the underlying system. So, although this worst-case scenario is highly unlikely to occur in practice 9 , even in this case the recognition accuracy should be acceptable, ensuring that the system does not suffer much in the time it takes to replace the compromised PolyProtected template(s). We may thus reasonably conclude that PolyProtect is capable of satisfying the recognition accuracy property of a face embedding protection scheme.…”
Section: Recognition Accuracymentioning
confidence: 99%
“…In this case, an appropriate error-correction mechanism should be able to correct a sufficient number of errors in the recovered codeword, such that the hash of the corrected codeword matches the hash of the reference codeword. Variants of the Fuzzy Commitment scheme were investigated for the protection of NN-extracted face features in [14]- [16].…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%
“…The first reason was to train a reliable NN-based feature extractor (by either fine-tuning an adopted/modified DNN model/architecture, or by training a proprietary DNN), so that a handcrafted BTP algorithm could be applied to the extracted face features. This approach was used in [6], [13], [14], [18], [19]. Similarly, [11] trained a DNN to reduce a face feature vector to its "intrinsic" dimensionality before encrypting it (via HE), while [21] and [30] trained a CNN and an SVM, respectively, to classify already-protected face templates.…”
Section: A Reproducibilitymentioning
confidence: 99%
“…To address the advent of similarity-based attacks (SA), Deep Secure Quantization (DSQ) based on neural network implementations is used to protect iris feature [31]. Deen Dayal Mohan presented a significant bit based representation for creating secure face templates with negligible degradation in the performance [32]. Compared with single biometrics system, multi-biometrics system which integrates multiple biometrics can improve the accuracy and security of recognition.…”
Section: Related Workmentioning
confidence: 99%