jtrpinto / SecureTL
Code for the Secure Triplet Loss approach for biometric template security.
☆10Updated 4 years ago
Alternatives and similar repositories for SecureTL:
Users that are interested in SecureTL are comparing it to the libraries listed below
- Implementation of the local and global unlinkability metrics for biometric template protection systems☆20Updated 5 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆11Updated 3 years ago
- MiDeCon: Minutia Detection Confidence for Unsupervised and Accurate Minutia and Fingerprint Quality Assessment☆21Updated last year
- ☆19Updated 4 years ago
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆11Updated 5 years ago
- Synthetic Face Recognition☆19Updated last year
- ☆11Updated 2 years ago
- QuantFace: Towards Lightweight Face Recognition by Synthetic Data Low-bit Quantization☆32Updated 2 years ago
- ☆35Updated last year
- Privacy mechanisms for decentralized fingerprint-based authentication☆11Updated 4 years ago
- Machine/deep learning papers that address the topic of privacy in visual data.☆75Updated 2 years ago
- MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders☆18Updated 2 years ago
- ☆38Updated 3 years ago
- SFace: Privacy-friendly and Accurate Face Recognition using Synthetic Data☆35Updated 9 months ago
- Official repository of the paper Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors☆20Updated 2 years ago
- Unsupervised Face Morphing Attack Detection via Self-paced Anomaly Detection☆19Updated 2 years ago
- DP-HyperparamTuning offers an array of tools for fast and easy hypertuning of various hyperparameters for the DP-SGD algorithm.☆23Updated 3 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆32Updated 4 years ago
- This is an official pytorch implementation of 'Effective Presentation Attack Detection Driven by Face Related Task'☆36Updated 2 years ago
- Code of ”Comprehensive Competition Mechanism in Palmprint Recognition“ (Accepted by IEEE TIFS)☆40Updated 8 months ago
- ☆13Updated 4 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Updated 3 years ago
- Code for paper "Towards Privacy-Preserving, Real-Time and Lossless Feature Matching"☆12Updated 2 years ago
- Official Implementation of the CVPR'20 paper 'Π-nets: Deep Polynomial Neural Networks' and its T-PAMI-21 extension.☆170Updated 2 years ago
- InstaHide: Instance-hiding Schemes for Private Distributed Learning☆50Updated 4 years ago
- ☆17Updated 2 years ago
- Tricks for Accelerating (encrypted) Prediction As a Service☆19Updated 5 years ago
- [NeurIPS 2019] This is the code repo of our novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into va…☆81Updated last year
- [NeurIPS'21] "AugMax: Adversarial Composition of Random Augmentations for Robust Training" by Haotao Wang, Chaowei Xiao, Jean Kossaifi, Z…☆125Updated 3 years ago
- Official mirror of Python-FHEz; Python Fully Homomorphic Encryption (FHE) Library for Encrypted Deep Learning as a Service (EDLaaS).☆29Updated 3 years ago