Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Privacy-Preserving Face Recognition in Hybrid Frequency-Color Domain (2401.13386v1)

Published 24 Jan 2024 in cs.CV

Abstract: Face recognition technology has been deployed in various real-life applications. The most sophisticated deep learning-based face recognition systems rely on training millions of face images through complex deep neural networks to achieve high accuracy. It is quite common for clients to upload face images to the service provider in order to access the model inference. However, the face image is a type of sensitive biometric attribute tied to the identity information of each user. Directly exposing the raw face image to the service provider poses a threat to the user's privacy. Current privacy-preserving approaches to face recognition focus on either concealing visual information on model input or protecting model output face embedding. The noticeable drop in recognition accuracy is a pitfall for most methods. This paper proposes a hybrid frequency-color fusion approach to reduce the input dimensionality of face recognition in the frequency domain. Moreover, sparse color information is also introduced to alleviate significant accuracy degradation after adding differential privacy noise. Besides, an identity-specific embedding mapping scheme is applied to protect original face embedding by enlarging the distance among identities. Lastly, secure multiparty computation is implemented for safely computing the embedding distance during model inference. The proposed method performs well on multiple widely used verification datasets. Moreover, it has around 2.6% to 4.2% higher accuracy than the state-of-the-art in the 1:N verification scenario.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (37)
  1. Cancelable fusion-based face recognition. Multimedia Tools and Applications, 78:31557–31580.
  2. Face description with local binary patterns: Application to face recognition. IEEE transactions on pattern analysis and machine intelligence, 28(12):2037–2041.
  3. Vggface2: A dataset for recognising faces across pose and age. In 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018), pages 67–74. IEEE.
  4. Privacy preserving face recognition utilizing differential privacy. Computers & Security, 97:101951.
  5. Synthesizing normalized faces from facial identity features. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 3703–3712.
  6. Multiparty computation from somewhat homomorphic encryption. In Annual Cryptology Conference, pages 643–662. Springer.
  7. Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 4690–4699.
  8. Benchmarking binarisation schemes for deep face templates. In 2018 25th IEEE International Conference on Image Processing (ICIP), pages 191–195. IEEE.
  9. Quantization guided jpeg artifact correction. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part VIII 16, pages 293–309. Springer.
  10. A pragmatic introduction to secure multi-party computation. Foundations and Trends® in Privacy and Security, 2(2-3):70–246.
  11. De-anonymizing facial recognition embeddings. Infocommunications Journal, 12(2):50–56.
  12. Faster neural networks straight from jpeg. Advances in Neural Information Processing Systems, 31.
  13. Ms-celeb-1m: A dataset and benchmark for large-scale face recognition. In Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part III 14, pages 87–102. Springer.
  14. Towards protecting face embeddings in mobile face verification scenarios. IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(1):117–134.
  15. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
  16. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In Workshop on faces in’Real-Life’Images: detection, alignment, and recognition.
  17. Privacy-preserving face recognition with learnable privacy budgets in frequency domain. In European Conference on Computer Vision, pages 475–491. Springer.
  18. Crypten: Secure multi-party computation meets machine learning. Advances in Neural Information Processing Systems, 34:4961–4973.
  19. Using warping for privacy protection in video surveillance. In 2013 18th International Conference on Digital Signal Processing (DSP), pages 1–6. IEEE.
  20. Deep secure encoding for face template protection. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 9–15.
  21. Exploring semantic segmentation on the dct representation. In Proceedings of the ACM Multimedia Asia, pages 1–6.
  22. A secure face-verification scheme based on homomorphic encryption and deep neural networks. IEEE Access, 5:16532–16538.
  23. Canonical face embeddings. IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(2):197–209.
  24. Privacy-preserving face recognition using random frequency components. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 19673–19684.
  25. Agedb: the first manually collected, in-the-wild age database. In proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 51–59.
  26. A comparative study of texture measures with classification based on featured distributions. Pattern recognition, 29(1):51–59.
  27. Secure face template generation via local region hashing. In 2015 international conference on biometrics (ICB), pages 299–304. IEEE.
  28. Frontal to profile face verification in the wild. In 2016 IEEE winter conference on applications of computer vision (WACV), pages 1–9. IEEE.
  29. On using cnn with dct based image data.
  30. Visualizing data using t-sne. journal of machine learning research 9. Nov (2008).
  31. Wallace, G. K. (1991). The jpeg still picture compression standard. Communications of the ACM, 34(4):30–44.
  32. Privacy-preserving face recognition in the frequency domain. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 36, pages 2558–2566.
  33. Color-related local binary pattern: A learned local descriptor for color image recognition. arXiv preprint arXiv:2012.06132.
  34. Learning in the frequency domain. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 1740–1749.
  35. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE signal processing letters, 23(10):1499–1503.
  36. Cross-pose lfw: A database for studying cross-pose face recognition in unconstrained environments. Beijing University of Posts and Telecommunications, Tech. Rep, 5(7).
  37. Cross-age lfw: A database for studying cross-age face recognition in unconstrained environments. arXiv preprint arXiv:1708.08197.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Dong Han (44 papers)
  2. Yong Li (628 papers)
  3. Joachim Denzler (87 papers)
Citations (2)

Summary

We haven't generated a summary for this paper yet.