2021
DOI: 10.1109/tbiom.2020.3046620
|View full text |Cite
|
Sign up to set email alerts
|

Secure Triplet Loss: Achieving Cancelability and Non-Linkability in End-to-End Deep Biometrics

Abstract: Biometric systems store sensitive personal data that need to be highly protected. However, state-of-the-art template protection schemes generally consist of separate processes, inspired by salting, hashing, or encryption, that limit the achievable performance. Moreover, these are inadequate to protect current state-of-the-art biometric models as they rely on end-to-end deep learning methods. After proposing the Secure Triplet Loss, focused on template cancelability, we now reformulate it to address the problem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(34 citation statements)
references
References 36 publications
0
34
0
Order By: Relevance
“…Fig. 6 shows the unlinkability plots 19 for the development subset of the Mobio database, separately for our Facenet and Idiap PolyProtected and baseline (unprotected) systems. Due to space restrictions, we show only the unlinkability plots for an overlap of 2, since this was the generally recommended overlap value in Section 4.3, and Table 3 summarises the global D sys ↔ measures for all overlaps.…”
Section: Unlinkabilitymentioning
confidence: 99%
“…Fig. 6 shows the unlinkability plots 19 for the development subset of the Mobio database, separately for our Facenet and Idiap PolyProtected and baseline (unprotected) systems. Due to space restrictions, we show only the unlinkability plots for an overlap of 2, since this was the generally recommended overlap value in Section 4.3, and Table 3 summarises the global D sys ↔ measures for all overlaps.…”
Section: Unlinkabilitymentioning
confidence: 99%
“…Examples of BTP methods in this category, include: [43]- [51]. Of these methods, [43], [44], [50], [51] adopt a feature-level approach, where the NN learns a protected template from extracted face features, and [45]- [49] adopt an image-level approach, where the NN is trained in an end-to-end manner to generate the protected template from the face image. A feature-level BTP method can take advantage of robust feature extractors (e.g., pre-trained face recognition models), and it is usually easier to implement/train such methods since the feature extraction part is already taken care of.…”
Section: Feature-levelmentioning
confidence: 99%
“…The salting approaches towards incorporating user-specific randomness into the learned protected template, include: [43], [44], [49]. In [43], a pre-trained CNN is used to extract a feature vector from a face image, then the feature vector plus a serial number are passed as inputs to a Recurrent Neural Network (RNN).…”
Section: Feature-levelmentioning
confidence: 99%
See 2 more Smart Citations