Skip to main content

Securing Face Recognition System Using Blockchain Technology

  • Conference paper
  • First Online:
Machine Learning, Image Processing, Network Security and Data Sciences (MIND 2020)

Abstract

Facial recognition is a wide area of a computer vision which is mostly used for security purpose. The main motive of the face recognition system is to authentic a person from a given training database. The face-based biometric system and surveillance cameras are deployed everywhere, for that need a strong face recognition system. The recognition system needs a large number of training samples that need to store in any storage center but when the face data is collected and stored, that time hackers can access and manipulate that data. So, a platform is presented that is secure and tamper-proof from these data breaches as well as hacks and is not compromising with data availability, by using blockchain to store face images. The absolute infeasibility of editing a historical record in a blockchain makes it tamper-proof (immutable) ensuring security. The storage of data on multiple computers provides accessibility. For face recognition, VGGFace deep neural network is used for automatic extraction of features and logistic regression for classification. \(\ldots \)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khan, J.K., Upadhyay, D.: Security issues in face recognition. In: 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) (2014)

    Google Scholar 

  2. Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11, 1818–1830 (2016)

    Article  Google Scholar 

  3. Singh, P., Kaur, K.: Database security using encryption. In: International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (2015)

    Google Scholar 

  4. Alsirhani, A., Bodorik, P., Sampalli, S.: Improving database security in cloud computing by fragmentation of data. In: International Conference on Computer and Applications (ICCA) (2017)

    Google Scholar 

  5. Wu, W.-C., Yang, S.-C.: Enhancing image security and privacy in cloud system using steganography. In: IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW) (2017)

    Google Scholar 

  6. Do, H.G., Ng, W.K.: Blockchain-based system for secure data storage with private keyword search. In: IEEE World Congress on Services (SERVICES) (2017)

    Google Scholar 

  7. Tso, H.-K., Lou, D.-C., Wang, K.-P., Liu, C.-L.: A lossless secret image sharing method. In: Eighth International Conference on Intelligent Systems Design and Applications (2008)

    Google Scholar 

  8. Chien, M.-C., Hwang, J.-I.G.: Secret image sharing using (t, n) threshold scheme with lossless recovery. In: 5th International Congress on Image and Signal Processing (2012)

    Google Scholar 

  9. Mohanty, M., Gehrmann, C., Atrey, P.K.: Avoiding weak parameters in secret image sharing. In: IEEE Visual Communications and Image Processing Conference (2014)

    Google Scholar 

  10. Ahmadian, A.M., Amirmazlaghani, M.: Computationally secure secret image sharing. In: Iranian Conference on Electrical Engineering (ICEE) (2017)

    Google Scholar 

  11. Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops (2015)

    Google Scholar 

  12. Hanifatunnisa, R., Rahardjo, B.: Blockchain based e-voting recording system design. In: 11th International Conference on Telecommunication Systems Services and Applications (TSSA) (2017)

    Google Scholar 

  13. Mettler, M.: Blockchain technology in healthcare: the revolution starts here. In: IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom) (2016)

    Google Scholar 

  14. Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (2016)

    Google Scholar 

  15. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the Internet of Things. IEEE (2016)

    Google Scholar 

  16. Yermack, D.: Corporate governance and blockchains. Rev. Financ. 21, 7–31 (2017). NYU Stern School of Business and National Bureau of Economic Research

    Google Scholar 

  17. Lawrence, S., Giles, C.L., Tsoi, A.C., Back, A.D.: Face recognition: a convolutional neural-network approach. IEEE Trans. Neural Networks 8, 98–113 (1997)

    Article  Google Scholar 

  18. Khalajzadeh, H., Mansouri, M., Teshnehlab, M.: Face recognition using convolutional neural network and simple logistic classifier. In: Snášel, V., Krömer, P., Köppen, M., Schaefer, G. (eds.) Soft Computing in Industrial Applications. AISC, vol. 223, pp. 197–207. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-00930-8_18

    Chapter  Google Scholar 

  19. Yan, K., Huang, S., Song, Y., Liu, W., Fan, N.: Face recognition based on convolution neural network. In: 36th Chinese Control Conference (CCC) (2017)

    Google Scholar 

  20. Wan, L., Liu, N., Huo, H., Fang, T.: Face recognition with convolutional neural networks and subspace learning. In: 2nd International Conference on Image, Vision and Computing (ICIVC) (2017)

    Google Scholar 

  21. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60, 84–90 (2017)

    Article  Google Scholar 

  22. Guo, S., Chen, S., Li, Y.: Face recognition based on convolutional neural network and support vector machine. In: IEEE International Conference on Information and Automation (ICIA) (2016)

    Google Scholar 

  23. Coşkun, M., Uçar, A., Yildirim, Ö., Demir, Y.: Face recognition based on convolutional neural network. In: International Conference on Modern Electrical and Energy Systems (MEES) (2017)

    Google Scholar 

Download references

Acknowledgements

The work was supported by Visvesvaraya PhD scheme, Govt of India.

Funding

This study was funded by the Ministry of Electronics and Information Technology (India) (Grant No.: MLA/MUM/GA/10(37)B).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jitendra Madarkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shankar, S., Madarkar, J., Sharma, P. (2020). Securing Face Recognition System Using Blockchain Technology. In: Bhattacharjee, A., Borgohain, S., Soni, B., Verma, G., Gao, XZ. (eds) Machine Learning, Image Processing, Network Security and Data Sciences. MIND 2020. Communications in Computer and Information Science, vol 1241. Springer, Singapore. https://doi.org/10.1007/978-981-15-6318-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6318-8_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6317-1

  • Online ISBN: 978-981-15-6318-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics