메뉴 건너뛰기




Volumn , Issue , 2013, Pages 238-245

Reconstructing a fragmented face from a cryptographic identification protocol

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC FACE RECOGNITION SYSTEMS; FACE IDENTIFICATION; FACE RECOGNITION SYSTEMS; IDENTIFICATION PROTOCOL; MALICIOUS ADVERSARIES; PROTOCOL EXECUTION; SECURE COMPUTATION; TERRORIST WATCH LISTS;

EID: 84875621083     PISSN: 21583978     EISSN: 21583986     Source Type: Conference Proceeding    
DOI: 10.1109/WACV.2013.6475024     Document Type: Conference Paper
Times cited : (8)

References (31)
  • 2
    • 85142395551 scopus 로고    scopus 로고
    • Efficient methods for privacy preserving face detection
    • S. Avidan and M. Butman. Efficient methods for privacy preserving face detection. In NIPS, 2006.
    • (2006) NIPS
    • Avidan, S.1    Butman, M.2
  • 4
    • 34948845148 scopus 로고    scopus 로고
    • Robust distance measures for face recognition supporting revocable biometric tokens
    • T. Boult. Robust distance measures for face recognition supporting revocable biometric tokens. In Face and Gesture, 2006.
    • (2006) Face and Gesture
    • Boult, T.1
  • 7
    • 33645146449 scopus 로고    scopus 로고
    • Histograms of oriented gradients for human detection
    • N. Dalal and B. Triggs. Histograms of oriented gradients for human detection. In CVPR, 2005.
    • (2005) CVPR
    • Dalal, N.1    Triggs, B.2
  • 11
    • 18244382662 scopus 로고
    • How to prove all npstatements in zero-knowledge, and a methodology of crpytographic protocol design
    • O. Goldreich, S. Micali, and A. Wigderson. How to prove all npstatements in zero-knowledge, and a methodology of crpytographic protocol design. In CRYPTO, 1986.
    • (1986) CRYPTO
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 12
    • 0037341419 scopus 로고    scopus 로고
    • Reconstruction of partially damaged face images based on morphable face model
    • B.-W. Hwang and S.-W. Lee. Reconstruction of partially damaged face images based on morphable face model. PAMI, 25(3), 2003.
    • (2003) PAMI , vol.25 , Issue.3
    • Hwang, B.-W.1    Lee, S.-W.2
  • 15
    • 77951193770 scopus 로고    scopus 로고
    • FaceTracer: A search engine for large collections of images with faces
    • N. Kumar, P. N. Belhumeur, and S. K. Nayar. FaceTracer: A Search Engine for Large Collections of Images with Faces. In ECCV, 2008.
    • (2008) ECCV
    • Kumar, N.1    Belhumeur, P.N.2    Nayar, S.K.3
  • 16
    • 2442526724 scopus 로고    scopus 로고
    • Person identification from heavily occluded face images
    • A. Lanitis. Person identification from heavily occluded face images. In ACM Symposium on Applied Computing, 2004.
    • (2004) ACM Symposium on Applied Computing
    • Lanitis, A.1
  • 17
    • 0036603474 scopus 로고    scopus 로고
    • Principal manifolds and probabilistic subspaces for visual recognition
    • June
    • B. Moghaddam. Principal manifolds and probabilistic subspaces for visual recognition. PAMI, 24(6):780-788, June 2002.
    • (2002) PAMI , vol.24 , Issue.6 , pp. 780-788
    • Moghaddam, B.1
  • 18
    • 0003147279 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In STOC, 1999.
    • (1999) STOC
    • Naor, M.1    Pinkas, B.2
  • 19
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In SODA, 2001.
    • (2001) SODA
    • Naor, M.1    Pinkas, B.2
  • 21
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 24
    • 0033314388 scopus 로고    scopus 로고
    • Estimation of eyeglassless facial images using principal component analysis
    • Y. Saito, Y. Kenmochi, and K. Kotani. Estimation of eyeglassless facial images using principal component analysis. In ICIP, 1999.
    • (1999) ICIP
    • Saito, Y.1    Kenmochi, Y.2    Kotani, K.3
  • 26
    • 0026384289 scopus 로고
    • Face recognition using eigenfaces
    • M. Turk and A. Pentland. Face recognition using eigenfaces. In CVPR, 1992.
    • (1992) CVPR
    • Turk, M.1    Pentland, A.2
  • 27
    • 26444609828 scopus 로고    scopus 로고
    • Capacity and examples of templateprotecting biometric authentication systems
    • P. Tuyls and J. Goseling. Capacity and examples of templateprotecting biometric authentication systems. In ECCV Workshop on BioAW, 2004.
    • (2004) ECCV Workshop on BioAW
    • Tuyls, P.1    Goseling, J.2
  • 29
    • 52249084303 scopus 로고    scopus 로고
    • Reconstruction of partially occluded face by fast recursive PCA
    • Z.Wang and J. Tao. Reconstruction of partially occluded face by fast recursive PCA. In Intl Conf on Comp Intell and Security, 2007.
    • (2007) Intl Conf on Comp Intell and Security
    • Wang, Z.1    Tao, J.2
  • 30
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. Yao. Protocols for secure computations. In FOCS, 1982.
    • (1982) FOCS
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.