2021
DOI: 10.48550/arxiv.2102.02458
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Deep Face Fuzzy Vault: Implementation and Performance

Abstract: Deep convolutional neural networks have achieved remarkable improvements in facial recognition performance. Similar kinds of developments, e.g. deconvolutional neural networks, have shown impressive results for reconstructing face images from their corresponding embeddings in the latent space. This poses a severe security risk which necessitates the protection of stored deep face embeddings in order to prevent from misuse, e.g. identity fraud.In this work, an unlinkable improved deep face fuzzy vaultbased temp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(13 citation statements)
references
References 61 publications
0
13
0
Order By: Relevance
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
“…To analyse PolyProtect's irreversibility, we must first define our threat model, as specified in ISO/IEC 30316 (the international standard on performance testing of biometric template protection schemes) 10 . The threat model characterises the type of attacker on which we wish to base our irreversibility analysis.…”
Section: Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…During authentication, the probe biometric template is used to determine the true points and thereby recover the secret polynomial from the reference fuzzy vault, which will be successful if the cryptographic hash of the recovered set of polynomial coefficients matches the hash of the set of reference coefficients. The Fuzzy Vault scheme was proposed as a Non-NN face BTP method in [17].…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%