The More Secure, The Less Equally Usable: Gender and Ethnicity (Un)fairness of Deep Face Recognition along Security Thresholds.
Andrea AtzoriGianni FenuMirko MarrasPublished in: EUSPN/ICTH (2022)
Keyphrases
- face recognition
- security requirements
- security issues
- security measures
- security level
- security mechanisms
- key management
- data encryption
- security analysis
- information security
- security properties
- security management
- stream cipher
- security model
- security protocols
- security architecture
- access control
- authentication mechanism
- electronic voting
- data security
- security services
- key exchange
- diffie hellman
- key agreement protocol
- key agreement
- user authentication
- security patterns
- encryption scheme
- authentication protocol
- trusted computing
- mobile agent system
- security policies
- integrity verification
- digital signature scheme
- private key
- cryptographic protocols
- factor authentication
- age groups
- key distribution
- secure multiparty computation
- sensitive data
- key exchange protocol
- public key encryption
- identity management
- facial images
- face images
- key establishment
- smart card
- recognition rate
- provably secure
- digital rights management
- previously mentioned
- human faces
- key management scheme
- face detection
- secure routing
- face databases
- signature scheme
- public key
- secure communication
- principal component analysis
- intrusion detection
- public key cryptosystem
- ad hoc networks
- secret key
- standard model
- rfid systems