Li et al., 2024 - Google Patents
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy ProtectionLi et al., 2024
View PDF- Document ID
- 5529857596252959953
- Author
- Li S
- Xu H
- Wang J
- Xu R
- Liu A
- He F
- Liu X
- Tao D
- Publication year
- Publication venue
- IEEE Transactions on Image Processing
External Links
Snippet
Billions of people share images from their daily lives on social media every day. However, their biometric information (eg, fingerprints) could be easily stolen from these images. The threat of fingerprint leakage from social media has created a strong desire to anonymize …
- 238000002347 injection 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pinto et al. | Face spoofing detection through visual codebooks of spectral temporal cubes | |
Ramachandra et al. | Presentation attack detection methods for face recognition systems: A comprehensive survey | |
Jia et al. | 3D face anti-spoofing with factorized bilinear coding | |
Xu et al. | Virtual u: Defeating face liveness detection by building virtual models from your public photos | |
Ortega-Delcampo et al. | Border control morphing attack detection with a convolutional neural network de-morphing approach | |
CN113614731A (en) | Authentication verification using soft biometrics | |
Qin et al. | Low visual distortion and robust morphing attacks based on partial face image manipulation | |
Li et al. | DeepBlur: A simple and effective method for natural image obfuscation | |
Barni et al. | Iris deidentification with high visual realism for privacy protection on websites and social networks | |
Hao et al. | Robustness analysis of face obscuration | |
Li et al. | Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection | |
Khojasteh et al. | Gmfim: a generative mask-guided facial image manipulation model for privacy preservation | |
Ghouzali et al. | Trace attack against biometric mobile applications | |
Ibsen et al. | Impact of facial tattoos and paintings on face recognition systems | |
Fourati et al. | Face anti-spoofing with image quality assessment | |
Yoo et al. | Defending against adversarial fingerprint attacks based on deep image prior | |
Felouat et al. | eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC Systems | |
Rafiq et al. | Template security in Iris recognition systems: research challenges and opportunities | |
Solomon | Face anti-spoofing and deep learning based unsupervised image recognition systems | |
SulaimanAlshebli et al. | The cyber security biometric authentication based on liveness face-iris images and deep learning classifier | |
Abbas et al. | Sanitization of visual multimedia content: a survey of techniques, attacks, and future directions | |
Mohanty et al. | Privacy & security issues related to match scores | |
Vinutha et al. | Antispoofing in face biometrics: A comprehensive study on software-based techniques | |
Arora et al. | Liveness and threat aware selfie face recognition | |
Todt et al. | Fant\^ omas: Understanding Face Anonymization Reversibility |