21.5.1.3 Biometrics, Privacy Issues

Chapter Contents (Back)
Privacy. Application, Biometrics. See also Surveillance Systems, Privacy Protection, Issues, Techniques, Face Obscuration.

Prabhakar, S.[Salil], Pankanti, S.[Sharath], and Jain, A.K.[Anil K.],
Biometric Recognition: Security and Privacy Concerns,
SecPriv(1), No. 2, March-April 2003, pp. 33-42. BibRef 0303

Jain, A.K.[Anil K.],
Biometric Recognition: Overview and Recent Advances,
CIARP07(13-19).
Springer DOI 0711
BibRef

Wu, F.[Fan], Liu, J.Q.[Ji-Qiang], Zhong, S.[Sheng],
An efficient protocol for private and accurate mining of support counts,
PRL(30), No. 1, 1 January 2009, pp. 80-86.
Elsevier DOI 0811
Keeping private information private. Support count; Bilinear mapping; Identity-based encryption BibRef

Schouten, B.[Ben], Jacobs, B.[Bart],
Biometrics and their use in e-passports,
IVC(27), No. 3, February 2009, pp. 305-312.
Elsevier DOI 0804
Biometrics; Privacy; Security; Passports BibRef

Schouten, B., Salah, A.A.,
Empowering the end-user in biometrics,
ICARCV08(1357-1360).
IEEE DOI 1109
BibRef

Cimato, S.[Stelvio], Sassi, R.[Roberto], Scotti, F.[Fabio],
Biometrics and Privacy,
RPCS(1), No. 2, June 2008, pp. 98-109
WWW Link. BibRef 0806

Jain, A.K.[Anil K.], Nandakumar, K.[Karthik],
Biometric Authentication: System Security and User Privacy,
Computer(45), No. 11, November 2012, pp. 87-92.
IEEE DOI 1212
BibRef

Bringer, J., Chabanne, H., Patey, A.,
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends,
SPMag(30), No. 2, 2012, pp. 42-52.
IEEE DOI 1303
BibRef

Karthik, K.[Kannan], Kashyap, S.[Sachin],
Transparent hashing in the encrypted domain for privacy preserving image retrieval,
SIViP(7), No. 4, July 2013, pp. 647-664.
WWW Link. 1306
BibRef

Klarreich, E.[Erica],
Hello, My Name Is . . .,
CACM(56), No. 8, August 2014, pp. 17-19.
DOI Link 1408
Facial recognition and privacy concerns. BibRef

Babaguchi, N.[Noboru], Nakashima, Y.[Yuta],
Protection and Utilization of Privacy Information via Sensing,
IEICE(E98-D), No. 1, January 2015, pp. 2-9.
WWW Link. 1503
BibRef

Barni, M., Droandi, G., Lazzeretti, R.,
Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing,
SPMag(32), No. 5, September 2015, pp. 66-76.
IEEE DOI 1509
biometrics (access control) BibRef

Bustard, J.,
The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications,
SPMag(32), No. 5, September 2015, pp. 101-108.
IEEE DOI 1509
biometrics (access control) BibRef

Samuel, A., Sarfraz, M.I., Haseeb, H., Basalamah, S., Ghafoor, A.,
A Framework for Composition and Enforcement of Privacy-Aware and Context-Driven Authorization Mechanism for Multimedia Big Data,
MultMed(17), No. 9, September 2015, pp. 1484-1494.
IEEE DOI 1509
Big Data BibRef

Ribaric, S.[Slobodan], Ariyaeeinia, A.[Aladdin], Pavesic, N.[Nikola],
De-identification for privacy protection in multimedia content: A survey,
SP:IC(47), No. 1, 2016, pp. 131-151.
Elsevier DOI 1610
Survey, Biometrics Privacy. Privacy BibRef

Bringer, J.[Julien], Morel, C.[Constance], Rathgeb, C.[Christian],
Security analysis and improvement of some biometric protected templates based on Bloom filters,
IVC(58), No. 1, 2017, pp. 239-253.
Elsevier DOI 1703
Bloom filter BibRef

Pittaluga, F.[Francesco], Koppal, S.J.[Sanjeev J.],
Pre-Capture Privacy for Small Vision Sensors,
PAMI(39), No. 11, November 2017, pp. 2215-2226.
IEEE DOI 1710
BibRef
Earlier:
Privacy preserving optics for miniature vision sensors,
CVPR15(314-324)
IEEE DOI 1510
Thermal sensors, privacy BibRef

Kumaki, T.[Takeshi], Fujino, T.[Takeshi],
Hierarchical-Masked Image Filtering for Privacy-Protection,
IEICE(E100-D), No. 10, October 2017, pp. 2327-2338.
WWW Link. 1710
BibRef

Li, H., Wang, K., Liu, X., Sun, Y., Guo, S.,
A Selective Privacy-Preserving Approach for Multimedia Data,
MultMedMag(24), No. 4, October 2017, pp. 14-25.
IEEE DOI 1712
Big data, Computer crime, Computer security, Data analysis, Data models, Data privacy, Encryption, Handheld devices, time constraints BibRef

Wang, Y.[Yi], Wan, J.W.[Jian-Wu], Guo, J.[Jun], Cheung, Y.M.[Yiu-Ming], Yuen, P.C.[Pong C.],
Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification,
PAMI(40), No. 7, July 2018, pp. 1611-1624.
IEEE DOI 1806
Cryptography, Hamming distance, Indexes, Privacy, Search problems, Servers, Biometric identification, hypothesis testing, privacy protection BibRef

Mochaourab, R., Oechtering, T.J.,
Private Filtering for Hidden Markov Models,
SPLetters(25), No. 6, June 2018, pp. 888-892.
IEEE DOI 1806
data privacy, dynamic programming, hidden Markov models, Markov process, Shannons equivocation, hidden Markov model, privacy BibRef

Fiandrotti, A.[Attilio], Mattelliano, M.[Massimo], Baccaglini, E.[Enrico], Vergori, P.[Paolo],
CDVSec: Privacy-preserving biometrical user authentication in the cloud with CDVS descriptors,
PRL(113), 2018, pp. 67-74.
Elsevier DOI 1810
Biometrics, User authentication, Privacy preserving, Visual analytics, CDVS BibRef

Jiang, Z.W.[Zheng-Wei], Chen, G.[Guoen], Jin, X.Q.[Xue-Qi], Wang, Y.Q.[Yue-Qiang],
Analysis of security operation and maintenance system using privacy utility in media environment,
JVCIR(56), 2018, pp. 177-181.
Elsevier DOI 1811
KVM, Safety, Operation and maintenance control, Intelligent management BibRef


Gerhardt, C., Aichroth, P., Mann, S.,
Selective face encryption in H.264 encoded videos,
VCIP17(1-4)
IEEE DOI 1804
cryptography, video coding, video surveillance, H.264 video encryption, data confidentiality, Videos BibRef

Sokolic, J., Rodrigues, M.R.D., Qiu, Q., Sapiro, G.,
Learning to Identify While Failing to Discriminate,
HumID17(2537-2544)
IEEE DOI 1802
Data privacy, Face, Measurement, Prediction algorithms, Privacy, Training BibRef

Orekondy, T., Schiele, B., Fritz, M.,
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images,
ICCV17(3706-3715)
IEEE DOI 1802
Web services, data privacy, explicit content, image content, privacy preferences, privacy risks, privacy settings, Visualization BibRef

Hung, P.C.K.[Patrick C. K.], Kanev, K.[Kamen], Iqbal, F.[Farkhund], Mettrick, D.[David], Rafferty, L.[Laura], Pan, G.P.[Guan-Pu], Huang, S.C.[Shih-Chia], Fung, B.C.M.[Benjamin C. M.],
A Study of Children Facial Recognition for Privacy in Smart TV,
CompIMAGE16(229-240).
Springer DOI 1704
BibRef

Guo, T.[Teng], Liu, F.[Feng], Wang, W.[Wen], Yu, B.[Bing_Tao],
Privacy Monitor,
IWDW16(187-197).
Springer DOI 1703
BibRef

Brkic, K., Sikiric, I., Hrkac, T., Kalafatic, Z.,
De-identifying people in videos using neural art,
IPTA16(1-6)
IEEE DOI 1703
Gaussian processes BibRef

Fujii, K.[Kojiro], Nakamura, K.[Kazuaki], Nitta, N.[Naoko], Babaguchi, N.[Noboru],
A Framework of Privacy-Preserving Image Recognition for Image-Based Information Services,
MMMod17(I: 40-52).
Springer DOI 1701
BibRef

Oh, S.J.[Seong Joon], Benenson, R.[Rodrigo], Fritz, M.[Mario], Schiele, B.[Bernt],
Faceless Person Recognition: Privacy Implications in Social Media,
ECCV16(III: 19-35).
Springer DOI 1611
BibRef

Chaussy, E.[Erwan], Machida, S.[Shimon], Sonehara, N.[Noboru], Echizen, I.[Isao],
Definition of Private Information for Image Sharing in Social Networking Services,
IWDW14(544-556).
Springer DOI 1602
BibRef

Sim, T., Zhang, L.[Li],
Controllable face privacy,
FG15(1-1)
IEEE DOI 1508
data privacy BibRef

Mosaddegh, S.[Saleh], Simon, L.[Loic], Jurie, F.[Frédéric],
Photorealistic Face De-Identification by Aggregating Donors' Face Components,
ACCV14(III: 159-174).
Springer DOI 1504
BibRef

Korshunov, P.[Pavel], Ebrahimi, T.[Touradj],
Towards optimal distortion-based visual privacy filters,
ICIP14(6051-6055)
IEEE DOI 1502
Accuracy BibRef

Erdelyi, A.[Adam], Barat, T.[Tibor], Valet, P.[Patrick], Winkler, T.[Thomas], Rinner, B.[Bernhard],
Adaptive cartooning for privacy protection in camera networks,
AVSS14(44-49)
IEEE DOI 1411
Cameras BibRef

Aouada, D.[Djamila], Khader, D.[Dalia],
SPN2: Single-sided privacy preserving nearest neighbor and its application to face recognition,
AVSS14(31-36)
IEEE DOI 1411
Databases; Encryption; Face recognition; Privacy; Servers; Vectors BibRef

Al-Shammari, E.T., Hassanien, A.E., Al-Razgan, O.S.,
Protecting Patient Privacy against Unauthorized Release of Medical Images Using Weighted Quantum Particle Swarm Optimization Algorithm,
ACPR13(667-671)
IEEE DOI 1408
authorisation BibRef

Luong, A., Gerbush, M., Waters, B., Grauman, K.,
Reconstructing a fragmented face from a cryptographic identification protocol,
WACV13(238-245).
IEEE DOI 1303
Secure Computation of Face Identification -- keep the faces private. BibRef

Shi, J.Y.[Jin-Yang], You, Z.Y.[Zhi-Yang], Gu, M.[Ming], Lam, K.Y.[Kwok-Yan],
Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions,
ICPR08(1-4).
IEEE DOI 0812
BibRef

Linnartz, J.P.[Jean-Paul], Tuyls, P.[Pim],
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates,
AVBPA03(393-402).
Springer DOI 0310
BibRef

Chapter on Face Recognition, Detection, Tracking, Gesture Recognition, Fingerprints, Biometrics continues in
Liveness Detection, Spoofing, Faces, Other Biometrics .


Last update:Nov 12, 2018 at 11:26:54