Proceedings of the 24th ACM Symposium on Access Control Models and Technologies 2019
DOI: 10.1145/3322431.3325417
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning

Abstract: In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based authentication systems. Though these systems demonstrate remarkable performance and have seen wide acceptance, they present unique and pressing security and privacy concerns. One proposed method which addresses these concerns is the elegant, fusion-based BioCapsule method. The BioCapsule method is provably secure, privacypreserving… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 20 publications
1
23
0
Order By: Relevance
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…These methods use some sort of algorithmically defined transformation to convert the face embeddings (learned from the input face images) to more secure representations. The proposed transformations include one-way cryptographic [6] or Winner Takes All [7] hashing, convolution of the embedding with a random kernel [8], use of the Fuzzy Commitment [9] or Fuzzy Vault [10] scheme, fusion of a subject's face embedding with a different subject's face embedding using keys extracted from the two sets of features [11], and homomorphic encryption [12]. The main issue with these approaches is that they have not been comprehensively evaluated in terms of their ability to simultaneously satisfy all three properties of face embedding protection methods.…”
Section: Face Embedding Protection Methodsmentioning
confidence: 99%
“…It is, therefore, precisely these embeddings that the attacker in our irreversibility analysis is trying to recover. This means that the attacker should not have access to these embeddings; however, they may be assumed to have access to the development set, since these embeddings are not used for enrollment 11 . The attacker could, therefore, use the development set's reference face embeddings to estimate the distribution of the 128 elements in the evaluation set's reference embeddings, which they are attempting to recover.…”
Section: Threat Modelmentioning
confidence: 99%
“…Among the Non-NN face BTP methods considered thus far, hashing appears to be the most popular approach; however, alternatives are proposed in [19], [30], [31]. In [19], face features extracted from different face regions (using a CNN) are fused, and the fused feature vector is convolved with a random kernel.…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%
“…In [19], face features extracted from different face regions (using a CNN) are fused, and the fused feature vector is convolved with a random kernel. A fusion approach is also adopted in [30], but this time a DNN-extracted face feature vector is fused with a different person's face feature vector. Specifically, a key is generated from each feature vector, then each key is used to alter the other feature vector via element-wise multiplication, followed by vector addition of the altered feature vectors.…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%
See 1 more Smart Citation