Server-based face recognition access control (SFRAC) is a widely used biometric authentication method where a camera captures a user's face image and sends the face information to a backend server to determine an ...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
Server-based face recognition access control (SFRAC) is a widely used biometric authentication method where a camera captures a user's face image and sends the face information to a backend server to determine an authentication result. In existing systems, user face images or raw facial features are sent to the backend server, which induces privacy concerns. this paper proposes a method to protect user face privacy in SFRAC systems, such that user face images or raw facial features are never sent to the server, but the system can still do face-based access control. the method uses a novel partially order-preserving hash-induced transformation (POP-HIT) to perform feature transformation on facial embeddings. POP-HIT maps a user's facial features to a transformed space in order to preserve privacy. Authentication is performed by checking the transformed facial embedding of the user's face image captured at the time of authentication against the user's pre-stored transformed facial embeddings at the server, based on similarity metrics or machine learning methods. Since the server only sees transformed facial embeddings, which cannot be used to recover the facial image, facial privacy is protected. Analysis and experimental evaluations show that our method has a high authentication accuracy, and it achieves privacy protection without being vulnerable to impersonation attacks.
Timed Buchi automata provide a very expressive formalism for expressing requirements of real-time systems. Online monitoring of embedded real-time systems can then be achieved by symbolic execution of such automata on...
详细信息
ISBN:
(纸本)9783031765537;9783031765544
Timed Buchi automata provide a very expressive formalism for expressing requirements of real-time systems. Online monitoring of embedded real-time systems can then be achieved by symbolic execution of such automata on the trace observed from the system. this direct construction however only is faithful if observation of the trace is immediate in the sense that the monitor can assign exact time stamps to the actions it observes, which is rarely true in practice due to the substantial and fluctuating parametric delays introduced by the circuitry connecting the observed system to its monitoring device. We present a purely zone-based online monitoring algorithm, which handles such parametric delays exactly without recurrence to costly verification procedures for parametric timed automata. We have implemented our monitoring algorithm on top of the real-time model checking tool UPPAAL, and report on encouraging initial results.
computer Vision techniques are extensively utilised in entertainment, enhancing realism in games and movies. Within video games, these techniques enable the recognition of objects, characters, and player movements, th...
详细信息
the proceedings contain 103 papers. the topics discussed include: evolutionary hyper-heuristics for improving global optimization algorithms;multi-objective decision making system based on spatial -temporal logics;ana...
ISBN:
(纸本)9798350313390
the proceedings contain 103 papers. the topics discussed include: evolutionary hyper-heuristics for improving global optimization algorithms;multi-objective decision making system based on spatial -temporal logics;analysis of trajectory optimization for solving tower of Hanoi problem using industrial manipulator;achievements regarding the optimal control of refinery processes;experimental study of pressure variation in a constant volume enclosure;velocity computation for vehicle trajectory tracking: a comparative analysis of performance and efficiency;smart digital-twin hub concept for rice yield prediction and monitoring from multivariate time series data;enhanced cyber-physical system with semantic technologies and machine learning to support smart farming;qualified remote signature through a hybrid cloud architecture;and an industry 4.0 oriented predictive maintenance solution deployed in real-world automotive manufacturing facilities.
the rapid development of artificial intelligence (AI) technology has driven substantial transformations across various sectors of commercial society. However, the successful application of AI System in the command and...
详细信息
Intrusion Detection systems play an important role in network security. Withthe advent of Machine Learning and Artificial Intelligence, ML-based IDS have been gaining increasing popularity in comparison with traditio...
详细信息
In the process of modeling and solving large-scale complex systems, issues with complex state structures and low computational efficiency are often *** partially observable discrete event systems, this paper proposes ...
详细信息
the increased financial value of the power grids and the multitude of potential attackers, including such with advanced capabilities, makes the enhancement of cybersecurity in power grids very important. In order to s...
详细信息
Withthe rapid digitization of Electronic Health Records (EHRs), fast and adaptive data anonymization methods have become increasingly important. While tools from topological data analysis (TDA) have been proposed to ...
详细信息
In controlled Functional Encryption (C-FE), a policy parameter is introduced during encryption to restrict how the decryptor can decrypt and compute the ciphertext, but C-FE shows certain limitations in complex scenar...
详细信息
ISBN:
(纸本)9789819790524;9789819790531
In controlled Functional Encryption (C-FE), a policy parameter is introduced during encryption to restrict how the decryptor can decrypt and compute the ciphertext, but C-FE shows certain limitations in complex scenarios involving multiple encryptors participating withtheir data remaining confidential from each other. To overcome these limitations and leverage the advantages of Multi-Client Functional Encryption (MCFE) and Attribute-Based Encryption (ABE), we extend C-FE, introducing a new primitive termed controlled Multi-Client Functional Encryption for Flexible Access control (CMCFE-FAC). this primitive introduces several key innovations: firstly, our CMCFE-FAC scheme combines MCFE to support multiple encryptors, enabling independent encryption and ensuring data privacy and security. Secondly, CMCFE-FAC combines attribute-based mechanisms to support dynamic access control, expanding traditional access control policies and enhancing their flexibility. thirdly, we formalize the definition and security model for CMCFE-FAC, propose a CMCFE-FAC scheme tailored for the inner product function, and demonstrate the scheme's security based on the DBDH assumption. Finally, theoretical analysis and experimental results are provided to illustrate its effectiveness and security.
暂无评论