2022
DOI: 10.1007/s10586-022-03808-8
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection framework for face recognition in edge-based Internet of Things

Abstract: Edge computing (EC) gets the Internet of Things (IoT)-based face recognition systems out of trouble caused by limited storage and computing resources of local or mobile terminals. However, data privacy leak remains a concerning problem. Previous studies only focused on some stages of face data processing, while this study focuses on the privacy protection of face data throughout its entire life cycle. Therefore, we propose a general privacy protection framework for edge-based face recognition (EFR) systems. To… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…Other studies use local differential privacy to ensure that individual data points cannot be reverse-engineered or identified. The work of [33] proposes a general privacy protection framework for edge-based face recognition systems. This is done through a local differential privacy algorithm based on the proportion difference of feature information.…”
Section: A Privacy-preserving Face Recognitionmentioning
confidence: 99%
“…Other studies use local differential privacy to ensure that individual data points cannot be reverse-engineered or identified. The work of [33] proposes a general privacy protection framework for edge-based face recognition systems. This is done through a local differential privacy algorithm based on the proportion difference of feature information.…”
Section: A Privacy-preserving Face Recognitionmentioning
confidence: 99%
“…Et. Al in [82] works on the security and privacy of face recognition systems by making the system secure against man-in- middle attacks and temper attacks. J. Galbally et al in [79] show that the Bayesian hill-climbing attack is effective and faster than the brute force attack for all operating points.…”
Section: Authentication Based On Face Scanmentioning
confidence: 99%