메뉴 건너뛰기




Volumn , Issue , 2010, Pages 239-254

SCiFI - A system for secure face identification

Author keywords

Face recognition; Privacy; Secure computation

Indexed keywords

ACTUAL SYSTEM; CLIENT MACHINE; CRYPTOGRAPHIC OPERATIONS; DATA-COMMUNICATION; ENTIRE SYSTEM; FACE IDENTIFICATION; FACE RECOGNITION ALGORITHMS; FACE RECOGNITION PERFORMANCE; ON-LINE PERFORMANCE; PRIVACY; PUBLIC KEYS; PUBLIC PLACES; SECURE COMPUTATION; SECURE PROTOCOLS; STATE-OF-THE-ART ALGORITHMS; VIEWING CONDITIONS;

EID: 77955178939     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.39     Document Type: Conference Paper
Times cited : (205)

References (33)
  • 1
    • 34249661090 scopus 로고    scopus 로고
    • Synergistic face detection and pose estimation with energy-based models
    • May
    • M. Osadchy, Y. LeCun, and M. Miller, "Synergistic face detection and pose estimation with energy-based models," Journal of Machine Learning Research, vol. 8, pp. 1197-1215, May 2007.
    • (2007) Journal of Machine Learning Research , vol.8 , pp. 1197-1215
    • Osadchy, M.1    LeCun, Y.2    Miller, M.3
  • 3
    • 52049107821 scopus 로고    scopus 로고
    • Biometric binary string generation with detection rate optimized bit allocation
    • C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans, "Biometric binary string generation with detection rate optimized bit allocation," in CVPR Workshop on Biometrics, 2008, pp. 1-7.
    • (2008) CVPR Workshop on Biometrics , pp. 1-7
    • Chen, C.1    Veldhuis, R.2    Kevenaar, T.3    Akkermans, A.4
  • 4
    • 0034290919 scopus 로고    scopus 로고
    • The FERET evaluation methodology for face-recognition algorithms
    • P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face-recognition algorithms," PAMI, vol. 22, no. 10, pp. 1090-1104, 2000.
    • (2000) PAMI , vol.22 , Issue.10 , pp. 1090-1104
    • Phillips, P.J.1    Moon, H.2    Rizvi, S.A.3    Rauss, P.J.4
  • 5
    • 0347380229 scopus 로고    scopus 로고
    • The CMU pose, illumination, and expression database
    • T. Sim, S. Baker, and M. Bsat, "The CMU pose, illumination, and expression database," PAMI, vol. 25, pp. 1615-1618, 2003.
    • (2003) PAMI , vol.25 , pp. 1615-1618
    • Sim, T.1    Baker, S.2    Bsat, M.3
  • 7
    • 26444609828 scopus 로고    scopus 로고
    • Capacity and examples of templateprotecting biométrie authentication systems
    • P. Tuyls and J. Goseling, "Capacity and examples of templateprotecting biométrie authentication systems," in ECCV Workshop BioAW, 2004.
    • (2004) ECCV Workshop BioAW
    • Tuyls, P.1    Goseling, J.2
  • 8
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 9
    • 0031187307 scopus 로고    scopus 로고
    • Face recognition: The problem of compensating for changes in illumination direction
    • Y Adini, Y Moses, and S. Ullman, "Face recognition: the problem of compensating for changes in illumination direction," PAMI, vol. 19, no. 7, pp. 721-732, 1997.
    • (1997) PAMI , vol.19 , Issue.7 , pp. 721-732
    • Adini, Y.1    Moses, Y.2    Ullman, S.3
  • 11
    • 33947530278 scopus 로고    scopus 로고
    • Generating cancelable fingerprint templates
    • N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," PAMI, vol. 29, no. 4, pp. 561-572, 2007.
    • (2007) PAMI , vol.29 , Issue.4 , pp. 561-572
    • Ratha, N.K.1    Chikkerur, S.2    Connell, J.H.3    Bolle, R.M.4
  • 12
    • 33750799305 scopus 로고    scopus 로고
    • Robust distance measures for face-recognition supporting revocable biometrie tokens
    • T. Boult, "Robust distance measures for face-recognition supporting revocable biometrie tokens," in IEEE, 7th Intl. Confi. on Automatic Face and Gesture Recognition, 2006, pp. 560-566.
    • (2006) IEEE, 7th Intl. Confi. on Automatic Face and Gesture Recognition , pp. 560-566
    • Boult, T.1
  • 13
    • 33745857614 scopus 로고    scopus 로고
    • Blind vision
    • S. Avidan and M. Butman, "Blind vision," in ECCV (3). Springer, 2006, pp. 1-13.
    • (2006) ECCV , vol.3 , pp. 1-13
    • Avidan, S.1    Butman, M.2
  • 19
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. Yao, "How to generate and exchange secrets," in FOCS, 1986, pp. 162-167.
    • (1986) FOCS , pp. 162-167
    • Yao, A.1
  • 23
    • 3042535216 scopus 로고    scopus 로고
    • Distinctive image features from scale-invariant keypoints
    • D. G. Lowe, "Distinctive image features from scale-invariant keypoints," IJCV, vol. 60, no. 2, pp. 91-110, 2004.
    • (2004) IJCV , vol.60 , Issue.2 , pp. 91-110
    • Lowe, D.G.1
  • 24
    • 77955183060 scopus 로고    scopus 로고
    • Automatic detection of face and facial features
    • C. T. Yuen, M. Rizon, W. S. San, and M. Sugisaka, "Automatic detection of face and facial features," in ISPRA'08, 2008, pp. 230-234.
    • (2008) ISPRA'08 , pp. 230-234
    • Yuen, C.T.1    Rizon, M.2    San, W.S.3    Sugisaka, M.4
  • 26
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 27
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • M. Naor and B. Pinkas, "Computationally secure oblivious transfer," J. Cryptology, vol. 18, no. 1, pp. 1-35, 2005.
    • (2005) J. Cryptology , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 29
    • 0001539365 scopus 로고    scopus 로고
    • On economical construction of the transitive closure of an oriented graph
    • V. Arlazarov, E. Dinic, M. Kronrod, and I. Faradzev, "On economical construction of the transitive closure of an oriented graph," in Soviet Math. Dokl, vol. 11, no. 1209-1210.
    • Soviet Math. Dokl , vol.11 , Issue.1209-1210
    • Arlazarov, V.1    Dinic, E.2    Kronrod, M.3    Faradzev, I.4
  • 30
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • S. P. Vadhan, Ed. Springer
    • Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries," in TCC, ser. Lecture Notes in Computer Science, S. P. Vadhan, Ed., vol. 4392. Springer, 2007, pp. 137-156.
    • (2007) TCC, Ser. Lecture Notes in Computer Science , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 31
    • 84937559183 scopus 로고    scopus 로고
    • Face identification by fitting a 3d morphable model using linear shape and texture error functions
    • S. Romdhani, V. Blanz, and T. Vetter, "Face identification by fitting a 3d morphable model using linear shape and texture error functions," in ECCV, 2002, pp. 3-19.
    • (2002) ECCV , pp. 3-19
    • Romdhani, S.1    Blanz, V.2    Vetter, T.3
  • 32
    • 35148890332 scopus 로고    scopus 로고
    • Face re-lighting from a single image under harsh lighting conditions
    • Y. Wang, Z. Liu, G. Hua, Z. Wen, Z. Zhang, and D. Samaras, "Face re-lighting from a single image under harsh lighting conditions," in CVPR, vol. 1, 2007, pp. 1-8.
    • (2007) CVPR , vol.1 , pp. 1-8
    • Wang, Y.1    Liu, Z.2    Hua, G.3    Wen, Z.4    Zhang, Z.5    Samaras, D.6
  • 33
    • 33947167478 scopus 로고    scopus 로고
    • Face description with local binary patterns: Application to face recognition
    • T. Ahonen, A. Hadid, and M. Pietikainen, "Face description with local binary patterns: Application to face recognition," PAMI, vol. 28, no. 12, pp. 2037-2041, 2006.
    • (2006) PAMI , vol.28 , Issue.12 , pp. 2037-2041
    • Ahonen, T.1    Hadid, A.2    Pietikainen, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.