Maximum Entropy Binary Encoding for Face Template Protection

12/05/2015
by   Rohit Kumar Pandey, et al.
0

In this paper we present a framework for secure identification using deep neural networks, and apply it to the task of template protection for face authentication. We use deep convolutional neural networks (CNNs) to learn a mapping from face images to maximum entropy binary (MEB) codes. The mapping is robust enough to tackle the problem of exact matching, yielding the same code for new samples of a user as the code assigned during training. These codes are then hashed using any hash function that follows the random oracle model (like SHA-512) to generate protected face templates (similar to text based password protection). The algorithm makes no unrealistic assumptions and offers high template security, cancelability, and state-of-the-art matching performance. The efficacy of the approach is shown on CMU-PIE, Extended Yale B, and Multi-PIE face databases. We achieve high ( 95 zero false accept rate (FAR) with up to 1024 bits of template security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/14/2015

Deep Secure Encoding: An Application to Face Recognition

In this paper we present Deep Secure Encoding: a framework for secure cl...
research
08/05/2019

Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection

In this paper, we present a novel architecture that integrates a deep ha...
research
02/04/2021

Deep Face Fuzzy Vault: Implementation and Performance

Deep convolutional neural networks have achieved remarkable improvements...
research
08/07/2017

Multibiometric Secure System Based on Deep Learning

In this paper, we propose a secure multibiometric system that uses deep ...
research
10/01/2021

Towards Protecting Face Embeddings in Mobile Face Verification Scenarios

This paper proposes PolyProtect, a method for protecting the sensitive f...
research
12/20/2019

TentacleNet: A Pseudo-Ensemble Template for Accurate Binary Convolutional Neural Networks

Binarization is an attractive strategy for implementing lightweight Deep...
research
09/07/2018

Protection of Information from Imitation on the Basis of Crypt-Code Structures

A system is offered for imitation resistant transmitting of encrypted in...

Please sign up or login with your details

Forgot password? Click here to reset