
on Computer and communications security, pages 28–
36.
Keller, D., Osadchy, M., and Dunkelman, O. (2020). Fuzzy
commitments offer insufficient protection to biometric
templates produced by deep learning. arXiv preprint
arXiv:2012.13293.
Keller, D., Osadchy, M., and Dunkelman, O. (2021). Invert-
ing binarizations of facial templates produced by deep
learning (and its implications). IEEE Transactions on
Information Forensics and Security, 16:4184–4196.
Kirchgasser, S., Uhl, A., Martinez-Diaz, Y., and Mendez-
Vazquez, H. (2020). Is warping-based cancellable
biometrics (still) sensible for face recognition? In
2020 IEEE International joint conference on biomet-
rics (IJCB), pages 1–9. IEEE.
Knoche, M., Hormann, S., and Rigoll, G. (2021). Cross-
quality lfw: A database for analyzing cross-resolution
image face recognition in unconstrained environ-
ments. In 2021 16th IEEE International Confer-
ence on Automatic Face and Gesture Recognition (FG
2021), pages 1–5. IEEE.
Lala, S. K., Kumar, A., and Subbulakshmi, T. (2021).
Secure web development using owasp guidelines.
In 2021 5th International Conference on Intelli-
gent Computing and Control Systems (ICICCS), pages
323–332. IEEE.
Li, S. and Kot, A. C. (2010). Privacy protection of fin-
gerprint database. IEEE Signal Processing Letters,
18(2):115–118.
Li, S. and Kot, A. C. (2012). Fingerprint combination for
privacy protection. IEEE transactions on information
forensics and security, 8(2):350–360.
Ma, Y., Wu, L., Gu, X., He, J., and Yang, Z. (2017). A se-
cure face-verification scheme based on homomorphic
encryption and deep neural networks. IEEE Access,
5:16532–16538.
Manisha and Kumar, N. (2020). On generating cancelable
biometric templates using visual secret sharing. In
Arai, K., Kapoor, S., and Bhatia, R., editors, Intelli-
gent Computing, pages 532–544, Cham. Springer In-
ternational Publishing.
Marcel, S., Fierrez, J., and Evans, N. (2023). Hand-
book of Biometric Anti-Spoofing: Presentation Attack
Detection and Vulnerability Assessment, volume 1.
Springer.
Meng, Q., Zhao, S., Huang, Z., and Zhou, F. (2021).
Magface: A universal representation for face recog-
nition and quality assessment. In Proceedings of the
IEEE/CVF conference on computer vision and pattern
recognition, pages 14225–14234.
Moschoglou, S., Papaioannou, A., Sagonas, C., Deng, J.,
Kotsia, I., and Zafeiriou, S. (2017). Agedb: the first
manually collected, in-the-wild age database. In pro-
ceedings of the IEEE conference on computer vision
and pattern recognition workshops, pages 51–59.
Mousa, A., Karabatak, M., and Mustafa, T. (2020).
Database security threats and challenges. In 2020 8th
International Symposium on Digital Forensics and Se-
curity (ISDFS), pages 1–5. IEEE.
National Inst Of Standards And Technology Gaithersburg
Md (2001). Advanced Encryption Standard (AES).
https://apps.dtic.mil/sti/citations/ADA403903. (ac-
cessed: April, 2024).
Osorio-Roig, D., Rathgeb, C., Drozdowski, P., and Busch,
C. (2021). Stable hash generation for efficient privacy-
preserving face identification. IEEE Transactions on
Biometrics, Behavior, and Identity Science, 4(3):333–
348.
Ramu, T. and Arivoli, T. (2012). Biometric template se-
curity: an overview. In Proceedings of International
Conference on Electronics, volume 65.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001).
Enhancing security and privacy in biometrics-based
authentication systems. IBM systems Journal,
40(3):614–634.
Rui, Z. and Yan, Z. (2019). A survey on biometric authen-
tication: Toward secure and privacy-preserving iden-
tification. IEEE Access, 7:5994–6009.
Sarkar, A. and Singh, B. K. (2020). A review on perfor-
mance, security and various biometric template pro-
tection schemes for biometric authentication systems.
Multimedia Tools and Applications, 79(37):27721–
27776.
Schroff, F., Kalenichenko, D., and Philbin, J. (2015).
Facenet: A unified embedding for face recognition
and clustering. In Proceedings of the IEEE con-
ference on computer vision and pattern recognition,
pages 815–823.
Singh, A., Srivastva, R., and Singh, Y. N. (2021). Plexnet:
An ensemble of deep neural networks for biometric
template protection. International Journal of Ad-
vanced Computer Science and Applications, 12(4).
Smith, R. and Xu, J. (2011). A survey of personal privacy
protection in public service mashups. In Proceedings
of 2011 IEEE 6th International Symposium on Service
Oriented System (SOSE), pages 214–224. IEEE.
Tremoc¸o, J., Medvedev, I., and Gonc¸alves, N. (2021). Qual-
face: Adapting deep learning face recognition for id
and travel documents with quality assessment. In
2021 International Conference of the Biometrics Spe-
cial Interest Group (BIOSIG), pages 1–6.
Wang, M., Deng, W., Hu, J., Tao, X., and Huang, Y. (2019).
Racial faces in the wild: Reducing racial bias by in-
formation maximization adaptation network. In Pro-
ceedings of the ieee/cvf international conference on
computer vision, pages 692–702.
Wu, H., Wu, J., Wu, R., Sharma, A., Machiry, A., and
Bianchi, A. Veribin: Adaptive verification of patches
at the binary level.
Zheng, T. and Deng, W. (2018). Cross-pose lfw: A database
for studying cross-pose face recognition in uncon-
strained environments. Beijing University of Posts
and Telecommunications, Tech. Rep, 5(7):5.
Zheng, T., Deng, W., and Hu, J. (2017). Cross-age
lfw: A database for studying cross-age face recogni-
tion in unconstrained environments. arXiv preprint
arXiv:1708.08197.
ICPRAM 2025 - 14th International Conference on Pattern Recognition Applications and Methods
518