Evaluating a class of distance-mapping algorithms for data mining and clustering
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A General Additive Data Perturbation Method for Database Security
Management Science
The FERET Evaluation Methodology for Face-Recognition Algorithms
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Random projection in dimensionality reduction: applications to image and text data
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
The CMU Pose, Illumination, and Expression Database
IEEE Transactions on Pattern Analysis and Machine Intelligence
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
IEEE Transactions on Knowledge and Data Engineering
Preliminary Face Recognition Grand Challenge Results
FGR '06 Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition
Robust Distance Measures for Face-Recognition Supporting Revocable Biometric Tokens.
FGR '06 Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
An improved BioHashing for human authentication
Pattern Recognition
On solving the face recognition problem with one training sample per subject
Pattern Recognition
Histogram-based image hashing scheme robust against geometric deformations
Proceedings of the 9th workshop on Multimedia & security
Journal of Cognitive Neuroscience
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Vulnerabilities in biometric encryption systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Biometric hash: high-confidence face recognition
IEEE Transactions on Circuits and Systems for Video Technology
Face recognition using kernel direct discriminant analysis algorithms
IEEE Transactions on Neural Networks
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
Hi-index | 0.00 |
This paper presents a novel approach for changeable and privacy preserving face recognition. We first introduce a new method of biometric matching using the sorted index numbers (SINs) of feature vectors. Since it is impossible to recover any of the exact values of the original features, the transformation from original features to the SIN vectors is noninvertible. To address the irrevocable nature of biometric signals whilst obtaining stronger privacy protection, a random projection-based method is employed in conjunction with the SIN approach to generate changeable and privacy preserving biometric templates. The effectiveness of the proposed method is demonstrated on a large generic data set, which contains images from several well-known face databases. Extensive experimentation shows that the proposed solution may improve the recognition accuracy.