Handwriting verification has stood as a steadfast identity authentication method for decades. However, this technique risks potential privacy breaches due to the inclusion of personal information in handwritten biometrics such as signatures. To address this concern, we propose using the Random Digit String (RDS) for privacy-preserving handwriting verification. This approach allows users to authenticate themselves by writing an arbitrary digit sequence, effectively ensuring privacy protection. To evaluate the effectiveness of RDS, we construct a new HRDS4BV dataset composed of online naturally handwritten RDS. Unlike conventional handwriting, RDS encompasses unconstrained and variable content, posing significant challenges for modeling consistent personal writing style. To surmount this, we propose the Pattern Attentive VErification Network (PAVENet), along with a Discriminative Pattern Mining (DPM) module. DPM adaptively enhances the recognition of consistent and discriminative writing patterns, thus refining handwriting style representation. Through comprehensive evaluations, we scrutinize the applicability of online RDS verification and showcase a pronounced outperformance of our model over existing methods. Furthermore, we discover a noteworthy forgery phenomenon that deviates from prior findings and discuss its positive impact in countering malicious impostor attacks. Substantially, our work underscores the feasibility of privacy-preserving biometric verification and propels the prospects of its broader acceptance and application.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TPAMI.2025.3529022 | DOI Listing |
IEEE Trans Pattern Anal Mach Intell
April 2025
Handwriting verification has stood as a steadfast identity authentication method for decades. However, this technique risks potential privacy breaches due to the inclusion of personal information in handwritten biometrics such as signatures. To address this concern, we propose using the Random Digit String (RDS) for privacy-preserving handwriting verification.
View Article and Find Full Text PDFSensors (Basel)
January 2025
School of Computer Science & Cyber Engineering, Guangzhou University, Guangzhou 510006, China.
Cybersecurity, complimenting authentication, has become the backbone of the Internet of Things. In the authentication process, the word authentication is of the utmost importance, as it is the door through which both Mr. Right Guy and Mr.
View Article and Find Full Text PDFPLoS One
February 2025
School of Computing and Information Systems, Singapore Management University, Singapore.
In recent years, facial recognition technology has been widely adopted in modern society. However, the plaintext storage, computation, and transmission of facial data have posed significant risks of information leakage. To address this issue, this paper proposes a facial recognition framework based on approximate homomorphic encryption (HE_FaceNet), aimed at effectively mitigating privacy leaks during the facial recognition process.
View Article and Find Full Text PDFSensors (Basel)
January 2025
School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an 710049, China.
This review offers a comprehensive and in-depth analysis of face mask detection and recognition technologies, emphasizing their critical role in both public health and technological advancements. Existing detection methods are systematically categorized into three primary classes: feaRture-extraction-and-classification-based approaches, object-detection-models-based methods and multi-sensor-fusion-based methods. Through a detailed comparison, their respective workflows, strengths, limitations, and applicability across different contexts are examined.
View Article and Find Full Text PDFRadiography (Lond)
January 2025
Department of Radiology, Charité Universitätsmedizin Berlin, Berlin, Germany; Berlin Institute of Health, Berlin, Germany.
Background: Facial recognition technology in medical imaging, particularly with head scans, poses privacy risks due to identifiable facial features. This study evaluates the use of facial recognition software in identifying facial features from head CT scans and explores a defacing pipeline using TotalSegmentator to reduce re-identification risks while preserving data integrity for research.
Methods: 1404 high-quality renderings from the UCLH EIT Stroke dataset, both with and without defacing were analysed.
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!