Meden et al., 2021 - Google Patents
Privacy–enhancing face biometrics: A comprehensive surveyMeden et al., 2021
View PDF- Document ID
- 4283758689177870677
- Author
- Meden B
- Rot P
- Terhörst P
- Damer N
- Kuijper A
- Scheirer W
- Ross A
- Peer P
- Štruc V
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Biometric recognition technology has made significant advances over the last decade and is now used across a number of services and applications. However, this widespread deployment has also resulted in privacy concerns and evolving societal expectations about …
- 238000000034 method 0 abstract description 316
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meden et al. | Privacy–enhancing face biometrics: A comprehensive survey | |
Wen et al. | Differential private identification protection for face images | |
Malik et al. | DeepFake detection for human face images and videos: A survey | |
Ribaric et al. | De-identification for privacy protection in multimedia content: A survey | |
Gu et al. | Password-conditioned anonymization and deanonymization with face identity transformers | |
Agrawal et al. | Person de-identification in videos | |
Proença | The uu-net: Reversible face de-identification for visual surveillance video footage | |
Zhang et al. | Visual privacy attacks and defenses in deep learning: a survey | |
Mosaddegh et al. | Photorealistic face de-identification by aggregating donors’ face components | |
Yu et al. | Privacy protecting visual processing for secure video surveillance | |
Roy et al. | 3D CNN architectures and attention mechanisms for deepfake detection | |
Wen et al. | IdentityMask: Deep motion flow guided reversible face video de-identification | |
Le et al. | StyleID: Identity disentanglement for anonymizing faces | |
Tolosana et al. | Future trends in digital face manipulation and detection | |
Laishram et al. | Toward a privacy-preserving face recognition system: A survey of leakages and solutions | |
Hao et al. | Robustness analysis of face obscuration | |
Zhao et al. | Private‐encoder: Enforcing privacy in latent space for human face images | |
Laishram et al. | Face de-identification using face caricature | |
Todt et al. | Fant\^ omas: Understanding Face Anonymization Reversibility | |
Diwan et al. | Systematic analysis of video tampering and detection techniques | |
Nadimpalli et al. | Social media authentication and combating deepfakes using semi-fragile invisible image watermarking | |
Cao et al. | Face de-identification: State-of-the-art methods and comparative studies | |
Al-Khasawneh et al. | Safeguarding Identities with GAN-based Face Anonymization | |
Dharmawan et al. | Toward Deep Face Spoofing: Taxonomy, Recent Advances, and Open Challenges | |
Khan et al. | Person de-identification: A comprehensive review of methods, datasets, applications, and ethical aspects along-with new dimensions |