2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2016
DOI: 10.1109/cvprw.2016.17
|View full text |Cite
|
Sign up to set email alerts
|

Deep Secure Encoding for Face Template Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(48 citation statements)
references
References 21 publications
0
48
0
Order By: Relevance
“…With this work we are specifically focusing on the biometric authentication problem for which, apart from achieving a high recognition accuracy, it is even more crucial to reduce the number of wrongly authorized users. For the same reason, it is common to assume that the user puts him/herself in a controlled condition and as such, the face datasets we consider, are those commonly used for biometric authentication tasks, see [26], [27]. Conversely, recent "inthe-wild" face datasets, because of the large number of users and poses, are better suited for the evaluation of recognition and clustering tasks.…”
Section: Figurementioning
confidence: 99%
“…With this work we are specifically focusing on the biometric authentication problem for which, apart from achieving a high recognition accuracy, it is even more crucial to reduce the number of wrongly authorized users. For the same reason, it is common to assume that the user puts him/herself in a controlled condition and as such, the face datasets we consider, are those commonly used for biometric authentication tasks, see [26], [27]. Conversely, recent "inthe-wild" face datasets, because of the large number of users and poses, are better suited for the evaluation of recognition and clustering tasks.…”
Section: Figurementioning
confidence: 99%
“…Vizilter et al [38] decoded the output of CNN and then hashed it via a boosted hashing forest. Pandey et al [26] protected face template by mapping original images to a binary code using CNN. Jindal et al [39] used CNN, with one-shot and multi-shot enrolment, to learn a robust mapping from face images of the users to the unique binary codes.…”
Section: Related Workmentioning
confidence: 99%
“…The approach such as [26] usually maps the outputs of CNN to [0, 1] by sigmoid function and then uses a threshold to decide the where r k and l k denote the kth element of R and L m , respectively. We find that the distribution of noise follows the Gaussian distribution, which is shown in Fig.…”
Section: Ldpc Decodingmentioning
confidence: 99%
See 2 more Smart Citations