Efficient privacy-preserving facial expression classification

Y Rahulamathavan, M Rajarajan - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper proposes an efficient algorithm to perform privacy-preserving (PP) facial
expression classification (FEC) in the client-server model. The server holds a database and …

Fusion of machine learning and privacy preserving for secure facial expression recognition

A Ullah, J Wang, MS Anwar, A Ahmad… - Security and …, 2021 - Wiley Online Library
The interest in Facial Expression Recognition (FER) is increasing day by day due to its
practical and potential applications, such as human physiological interaction diagnosis and …

Efficient privacy-preserving face identification protocol

H Huang, L Wang - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Face identification is an important research topic in artificial intelligence and it has wide
application in civilian and law enforcement scenarios that require reliable biometric …

Secure facial recognition in the encrypted domain using a local ternary pattern approach

FA Khan, A Bouridane, S Boussakta, R Jiang… - Journal of Information …, 2021 - Elsevier
Automatic facial recognition is fast becoming a reliable method for identifying individuals.
Due to its reliability and unobtrusive nature facial recognition has been widely deployed in …

Efficient privacy-preserving face recognition

AR Sadeghi, T Schneider, I Wehrenberg - International conference on …, 2009 - Springer
Automatic recognition of human faces is becoming increasingly popular in civilian and law
enforcement applications that require reliable recognition of humans. However, the rapid …

Efficient privacy-preserving face verification scheme

H Huang, L Wang - Journal of Information Security and Applications, 2021 - Elsevier
Face verification has been a promising artificial intelligence technique and is becoming
increasingly popular in civilian and law enforcement applications that require reliable …

Preliminary Experiments of a Real-World Authentication Mechanism Based on Facial Recognition and Fully Homomorphic Encryption

G Crihan, L Dumitriu, MV Crăciun - Applied Sciences, 2024 - mdpi.com
In the current context in which user authentication is the first line of defense against
emerging attacks and can be considered a defining element of any security infrastructure …

Ciphertext face recognition system based on secure inner product protocol

X Li, Z Chen, J Gao - Journal of Information Security and Applications, 2024 - Elsevier
User privacy data leakage is a major weakness of current plaintext face recognition systems.
This article combines Pallier homomorphic encryption algorithm with inner product protocol …

Design on face recognition system with privacy preservation based on homomorphic encryption

Y Yang, Q Zhang, W Gao, C Fan, Q Shu… - Wireless personal …, 2022 - Springer
Face recognition is playing an increasingly important role in present society, and suffers
from the privacy leakage in plaintext. Therefore, a recognition system based on …

Stable hash generation for efficient privacy-preserving face identification

D Osorio-Roig, C Rathgeb… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The development of large-scale facial identification systems that provide privacy protection
of the enrolled subjects represents an open challenge. In the context of privacy protection …