CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Overview of the Face Recognition Grand Challenge
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
EURASIP Journal on Advances in Signal Processing
Multi-algorithm fusion with template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Electronic Commerce Research and Applications
Hi-index | 0.00 |
In this paper we apply template protection to an authentication system based on 3D face data in order to protect the privacy of its users. We use the template protection system based on the helper data system (HDS). The experimental results performed on the FRGC v2.0 database demonstrate that the performance of the protected system is of the same order as the performance of the unprotected system. The protected system has a performance of a FAR ≈ 0.19% and a FRR ≈ 16% with a security level of 35 bits.