Affiliation:
1. School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
2. School of Software and Microelectronics, Peking University, 24th Jinyuan Road, Daxing Industrial District, Beijing 102600, China
Abstract
With the continuous development of Internet technology and technological innovation, image recognition technologies such as face unlocking and face brushing payment have gradually entered daily life. However, it can not be ignored that these technologies not only bring us great convenience but also face great risks. The biological characteristics of a face image are unique, and it will be difficult to modify once it is leaked. If the image information stored in the cloud is leaked because it cannot be properly kept, users have no privacy. The encryption and recognition of face image can effectively solve this problem. Aiming at this, high-dimensional chaos Henon Map and one-dimensional chaos Logistic Map are used to generate a key to complete the encryption of the image in the transformation domain, and the capacity and complexity of the key are further enhanced. Then, combined with BP neural network to achieve face image recognition. Finally, the robustness of the proposed algorithm is verified and analyzed by conventional attacks, geometric attacks, and occlusion attacks.
Subject
General Mathematics,General Medicine,General Neuroscience,General Computer Science
Reference26 articles.
1. Network information security privacy protection system in big data era Lecture Notes of the Institute for Computer Sciences, social-informatics and telecommunications engineering 2019;L. Ma
2. Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
3. Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov;T. Zhang;Wireless Communications and Mobile Computing,2020
4. Research on the Privacy Security of Face Recognition Technology;L. Pang;Computational Intelligence and Neuroscience,2022
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献