2019 IEEE International Conference on Consumer Electronics (ICCE) 2019
DOI: 10.1109/icce.2019.8661905
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Template Protection Through Adversarial Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(28 citation statements)
references
References 20 publications
0
27
0
Order By: Relevance
“…These methods learn the protected template from the input face image (with face embeddings being extracted, in some format, during the process). In [13]- [16], a random code is pre-defined for each subject during enrollment, then the neural network is trained to map different samples of the same subject's face to their (same) corresponding code. A cryptographic hash of the random code represents the protected face template.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…These methods learn the protected template from the input face image (with face embeddings being extracted, in some format, during the process). In [13]- [16], a random code is pre-defined for each subject during enrollment, then the neural network is trained to map different samples of the same subject's face to their (same) corresponding code. A cryptographic hash of the random code represents the protected face template.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
“…As stated earlier, however, an overdetermined system of equations may result in an inconsistent solution set, thereby actually confusing the solver as to which solution is the correct one. This may explain the sudden drop in 16. The k values for overlaps 0 to 4 are indicated in Table 1.…”
Section: Multiple Polyprotected Templatesmentioning
confidence: 98%
See 1 more Smart Citation
“…Examples of NN-learned face BTP methods that pre-define a representative binary code (and cryptographically hash it to produce the protected template), include [37]- [42]. Of these, [37]- [39] adopt an image-level approach, whereby the NN is trained in an end-to-end manner to map the input face images to their corresponding, pre-defined codes.…”
Section: Feature-levelmentioning
confidence: 99%
“…Of these, [37]- [39] adopt an image-level approach, whereby the NN is trained in an end-to-end manner to map the input face images to their corresponding, pre-defined codes. Alternatively, [40]- [42] adopt a feature-level approach, where the NN training starts from the extracted face features as opposed to the raw images. Overall, most of these methods build upon the approach proposed in [37], [38], which involves assigning a random maximum-entropy binary code to every user of the face recognition system, then training a Convolutional Neural Network (CNN) to map each user's face image to their corresponding code.…”
Section: Feature-levelmentioning
confidence: 99%