In the recent past, different researchers have proposed privacy-enhancing face recognition systems designed to conceal soft-biometric attributes at feature level. These works have reported impressive results, but generally did not consider specific attacks in their analysis of privacy protection. We introduce an attack on said schemes based on two observations: (1) highly similar facial representations usually originate from face images with similar soft-biometric attributes; (2) to achieve high recognition accuracy, robustness against intra-class variations within facial representations has to be retained in their privacy-enhanced versions. The presented attack only requires the privacy-enhancing algorithm as a black-box and a relatively s...
Face recognition service has been used in many fields and brings much convenience to people. However...
In recent years, biometric, or "who you are," authentication has grown rapidly in acceptance and use...
The rapid development of machine learning and the decreasing costs of computational resources has le...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Face images processed by a biometric system are expected to be used for recognition purposes only. H...
Face images processed by a biometric system are expected to be used for recognition purposes only. H...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Research on soft-biometrics showed that privacy-sensitive information can be deduced from biometric ...
The success of modern face recognition systems is based on the advances of deeply-learned features. ...
The success of modern face recognition systems is based on the advances of deeply-learned features. ...
Biometric recognition technology has made significant advances over the last decade and is now used ...
Biometric recognition technology has made significant advances over the last decade and is now used ...
Face recognition service has been used in many fields and brings much convenience to people. However...
In recent years, biometric, or "who you are," authentication has grown rapidly in acceptance and use...
The rapid development of machine learning and the decreasing costs of computational resources has le...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Face images processed by a biometric system are expected to be used for recognition purposes only. H...
Face images processed by a biometric system are expected to be used for recognition purposes only. H...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Biometric verification refers to the automatic verification of a person’s identity based on their be...
Research on soft-biometrics showed that privacy-sensitive information can be deduced from biometric ...
The success of modern face recognition systems is based on the advances of deeply-learned features. ...
The success of modern face recognition systems is based on the advances of deeply-learned features. ...
Biometric recognition technology has made significant advances over the last decade and is now used ...
Biometric recognition technology has made significant advances over the last decade and is now used ...
Face recognition service has been used in many fields and brings much convenience to people. However...
In recent years, biometric, or "who you are," authentication has grown rapidly in acceptance and use...
The rapid development of machine learning and the decreasing costs of computational resources has le...