The More Secure, The Less Equally Usable: Gender and Ethnicity (Un)fairness of Deep Face Recognition along Security Thresholds.
Andrea AtzoriGianni FenuMirko MarrasPublished in: CoRR (2022)
Keyphrases
- face recognition
- security requirements
- security issues
- security level
- security measures
- key management
- security mechanisms
- security management
- security protocols
- security properties
- sensitive data
- security analysis
- electronic voting
- access control
- data security
- key agreement protocol
- encryption scheme
- cryptographic protocols
- authentication protocol
- data encryption
- security services
- security architecture
- trusted computing
- stream cipher
- key exchange protocol
- diffie hellman
- key exchange
- age groups
- public key encryption
- security model
- recognition rate
- information security
- face images
- integrity verification
- key agreement
- authentication mechanism
- facial images
- identity management
- key distribution
- public key cryptosystem
- security patterns
- secure communication
- mobile agent system
- user authentication
- security policies
- previously mentioned
- secure multiparty computation
- secure routing
- private key
- digital signature scheme
- authentication scheme
- key establishment
- gender classification
- secret key
- principal component analysis
- resource constrained
- factor authentication
- standard model
- electronic payment
- public key infrastructure
- privacy preserving
- unauthorized access
- smart card
- rfid systems
- network security
- facial expressions
- human faces
- face databases
- rfid tags
- data integrity