2019
DOI: 10.1007/s00371-019-01715-5
|View full text |Cite
|
Sign up to set email alerts
|

Cancelable multi-biometric recognition system based on deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 50 publications
0
20
0
Order By: Relevance
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
“…To conduct this analysis, the recognition accuracy of each baseline system (Facenet and Idiap) was first evaluated on the Mobio dataset, by running the mobile0-male verification protocol 7 used to generate the reported baseline results 8 . The same protocol was then applied to the corresponding PolyProtected face verification systems.…”
Section: Recognition Accuracymentioning
confidence: 99%
“…Abdellatef et al [23] designed a multi-instance CB for the face using multiple CNNs to extract features from multiple regions of a face image, such as face, eyes, nose, mouth, etc. After fusion of several deep features, a cancelable template was generated via bioconvolving encryption.…”
Section: Cancelable Multimodal Biometrics With Deep Learningmentioning
confidence: 99%
“…Abdelatif et al presented an approach for cancelable face recognition that depends on Convolutional Neural Networks (CNNs) [ 28 , 29 ]. Its idea begins by isolating the face, eyes, nose, and mouth regions.…”
Section: Introductionmentioning
confidence: 99%