Abstract
Facial recognition is a wide area of a computer vision which is mostly used for security purpose. The main motive of the face recognition system is to authentic a person from a given training database. The face-based biometric system and surveillance cameras are deployed everywhere, for that need a strong face recognition system. The recognition system needs a large number of training samples that need to store in any storage center but when the face data is collected and stored, that time hackers can access and manipulate that data. So, a platform is presented that is secure and tamper-proof from these data breaches as well as hacks and is not compromising with data availability, by using blockchain to store face images. The absolute infeasibility of editing a historical record in a blockchain makes it tamper-proof (immutable) ensuring security. The storage of data on multiple computers provides accessibility. For face recognition, VGGFace deep neural network is used for automatic extraction of features and logistic regression for classification. \(\ldots \)
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Khan, J.K., Upadhyay, D.: Security issues in face recognition. In: 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) (2014)
Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11, 1818–1830 (2016)
Singh, P., Kaur, K.: Database security using encryption. In: International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (2015)
Alsirhani, A., Bodorik, P., Sampalli, S.: Improving database security in cloud computing by fragmentation of data. In: International Conference on Computer and Applications (ICCA) (2017)
Wu, W.-C., Yang, S.-C.: Enhancing image security and privacy in cloud system using steganography. In: IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW) (2017)
Do, H.G., Ng, W.K.: Blockchain-based system for secure data storage with private keyword search. In: IEEE World Congress on Services (SERVICES) (2017)
Tso, H.-K., Lou, D.-C., Wang, K.-P., Liu, C.-L.: A lossless secret image sharing method. In: Eighth International Conference on Intelligent Systems Design and Applications (2008)
Chien, M.-C., Hwang, J.-I.G.: Secret image sharing using (t, n) threshold scheme with lossless recovery. In: 5th International Congress on Image and Signal Processing (2012)
Mohanty, M., Gehrmann, C., Atrey, P.K.: Avoiding weak parameters in secret image sharing. In: IEEE Visual Communications and Image Processing Conference (2014)
Ahmadian, A.M., Amirmazlaghani, M.: Computationally secure secret image sharing. In: Iranian Conference on Electrical Engineering (ICEE) (2017)
Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops (2015)
Hanifatunnisa, R., Rahardjo, B.: Blockchain based e-voting recording system design. In: 11th International Conference on Telecommunication Systems Services and Applications (TSSA) (2017)
Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom) (2016)
Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (2016)
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE (2016)
Yermack, D.: Corporate governance and blockchains. Rev. Financ. 21, 7–31 (2017). NYU Stern School of Business and National Bureau of Economic Research
Lawrence, S., Giles, C.L., Tsoi, A.C., Back, A.D.: Face recognition: a convolutional neural-network approach. IEEE Trans. Neural Networks 8, 98–113 (1997)
Khalajzadeh, H., Mansouri, M., Teshnehlab, M.: Face recognition using convolutional neural network and simple logistic classifier. In: Snášel, V., Krömer, P., Köppen, M., Schaefer, G. (eds.) Soft Computing in Industrial Applications. AISC, vol. 223, pp. 197–207. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-00930-8_18
Yan, K., Huang, S., Song, Y., Liu, W., Fan, N.: Face recognition based on convolution neural network. In: 36th Chinese Control Conference (CCC) (2017)
Wan, L., Liu, N., Huo, H., Fang, T.: Face recognition with convolutional neural networks and subspace learning. In: 2nd International Conference on Image, Vision and Computing (ICIVC) (2017)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60, 84–90 (2017)
Guo, S., Chen, S., Li, Y.: Face recognition based on convolutional neural network and support vector machine. In: IEEE International Conference on Information and Automation (ICIA) (2016)
Coşkun, M., Uçar, A., Yildirim, Ö., Demir, Y.: Face recognition based on convolutional neural network. In: International Conference on Modern Electrical and Energy Systems (MEES) (2017)
Acknowledgements
The work was supported by Visvesvaraya PhD scheme, Govt of India.
Funding
This study was funded by the Ministry of Electronics and Information Technology (India) (Grant No.: MLA/MUM/GA/10(37)B).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shankar, S., Madarkar, J., Sharma, P. (2020). Securing Face Recognition System Using Blockchain Technology. In: Bhattacharjee, A., Borgohain, S., Soni, B., Verma, G., Gao, XZ. (eds) Machine Learning, Image Processing, Network Security and Data Sciences. MIND 2020. Communications in Computer and Information Science, vol 1241. Springer, Singapore. https://doi.org/10.1007/978-981-15-6318-8_37
Download citation
DOI: https://doi.org/10.1007/978-981-15-6318-8_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6317-1
Online ISBN: 978-981-15-6318-8
eBook Packages: Computer ScienceComputer Science (R0)