Zum Hauptinhalt springen

Showing 1–14 of 14 results for author: Ratha, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02790  [pdf, other

    cs.CR cs.LG

    Confidential and Protected Disease Classifier using Fully Homomorphic Encryption

    Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla

    Abstract: With the rapid surge in the prevalence of Large Language Models (LLMs), individuals are increasingly turning to conversational AI for initial insights across various domains, including health-related inquiries such as disease diagnosis. Many users seek potential causes on platforms like ChatGPT or Bard before consulting a medical professional for their ailment. These platforms offer valuable benef… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  2. arXiv:2404.17225  [pdf, other

    cs.CR cs.AI cs.RO

    Enhancing Privacy and Security of Autonomous UAV Navigation

    Authors: Vatsal Aggarwal, Arjun Ramesh Kaushik, Charanjit Jutla, Nalini Ratha

    Abstract: Autonomous Unmanned Aerial Vehicles (UAVs) have become essential tools in defense, law enforcement, disaster response, and product delivery. These autonomous navigation systems require a wireless communication network, and of late are deep learning based. In critical scenarios such as border protection or disaster response, ensuring the secure navigation of autonomous UAVs is paramount. But, these… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  3. arXiv:2404.16255  [pdf, other

    cs.CR cs.CV

    Enhancing Privacy in Face Analytics Using Fully Homomorphic Encryption

    Authors: Bharat Yalavarthi, Arjun Ramesh Kaushik, Arun Ross, Vishnu Boddeti, Nalini Ratha

    Abstract: Modern face recognition systems utilize deep neural networks to extract salient features from a face. These features denote embeddings in latent space and are often stored as templates in a face recognition system. These embeddings are susceptible to data leakage and, in some cases, can even be used to reconstruct the original face image. To prevent compromising identities, template protection sch… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  4. RidgeBase: A Cross-Sensor Multi-Finger Contactless Fingerprint Dataset

    Authors: Bhavin Jawade, Deen Dayal Mohan, Srirangaraj Setlur, Nalini Ratha, Venu Govindaraju

    Abstract: Contactless fingerprint matching using smartphone cameras can alleviate major challenges of traditional fingerprint systems including hygienic acquisition, portability and presentation attacks. However, development of practical and robust contactless fingerprint matching techniques is constrained by the limited availability of large scale real-world datasets. To motivate further advances in contac… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Comments: Paper accepted at IJCB 2022

    Journal ref: 2022 IEEE International Joint Conference on Biometrics (IJCB), Abu Dhabi, United Arab Emirates, 2022, pp. 1-9

  5. arXiv:2208.07241  [pdf, other

    cs.CV cs.CR

    HEFT: Homomorphically Encrypted Fusion of Biometric Templates

    Authors: Luke Sperling, Nalini Ratha, Arun Ross, Vishnu Naresh Boddeti

    Abstract: This paper proposes a non-interactive end-to-end solution for secure fusion and matching of biometric templates using fully homomorphic encryption (FHE). Given a pair of encrypted feature vectors, we perform the following ciphertext operations, i) feature concatenation, ii) fusion and dimensionality reduction through a learned linear projection, iii) scale normalization to unit $\ell_2$-norm, and… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: IJCB 2022

  6. arXiv:2103.03411  [pdf, other

    cs.CR cs.AI cs.LG

    Efficient Encrypted Inference on Ensembles of Decision Trees

    Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin

    Abstract: Data privacy concerns often prevent the use of cloud-based machine learning services for sensitive personal data. While homomorphic encryption (HE) offers a potential solution by enabling computations on encrypted data, the challenge is to obtain accurate machine learning models that work within the multiplicative depth constraints of a leveled HE scheme. Existing approaches for encrypted inferenc… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: 9 pages, 6 figures

  7. arXiv:2102.00319  [pdf, other

    cs.CR cs.LG

    Efficient CNN Building Blocks for Encrypted Data

    Authors: Nayna Jain, Karthik Nandakumar, Nalini Ratha, Sharath Pankanti, Uttam Kumar

    Abstract: Machine learning on encrypted data can address the concerns related to privacy and legality of sharing sensitive data with untrustworthy service providers. Fully Homomorphic Encryption (FHE) is a promising technique to enable machine learning and inferencing while providing strict guarantees against information leakage. Since deep convolutional neural networks (CNNs) have become the machine learni… ▽ More

    Submitted 30 January, 2021; originally announced February 2021.

    Comments: The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21)

  8. arXiv:2011.02272  [pdf, other

    cs.CY cs.CR cs.CV cs.LG

    Trustworthy AI

    Authors: Richa Singh, Mayank Vatsa, Nalini Ratha

    Abstract: Modern AI systems are reaping the advantage of novel learning methods. With their increasing usage, we are realizing the limitations and shortfalls of these systems. Brittleness to minor adversarial changes in the input data, ability to explain the decisions, address the bias in their training data, high opacity in terms of revealing the lineage of the system, how they were trained and tested, and… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

    Comments: ACM CODS-COMAD 2021 Tutorial

  9. arXiv:2008.00054  [pdf, other

    cs.CR

    Securing CNN Model and Biometric Template using Blockchain

    Authors: Akhil Goel, Akshay Agarwal, Mayank Vatsa, Richa Singh, Nalini Ratha

    Abstract: Blockchain has emerged as a leading technology that ensures security in a distributed framework. Recently, it has been shown that blockchain can be used to convert traditional blocks of any deep learning models into secure systems. In this research, we model a trained biometric recognition system in an architecture which leverages the blockchain technology to provide fault tolerant access in a dis… ▽ More

    Submitted 31 July, 2020; originally announced August 2020.

    Comments: Published in IEEE BTAS 2019

  10. arXiv:1901.10436  [pdf, other

    cs.CV

    Diversity in Faces

    Authors: Michele Merler, Nalini Ratha, Rogerio S. Feris, John R. Smith

    Abstract: Face recognition is a long standing challenge in the field of Artificial Intelligence (AI). The goal is to create systems that accurately detect, recognize, verify, and understand human faces. There are significant technical hurdles in making these systems accurate, particularly in unconstrained settings due to confounding factors related to pose, resolution, illumination, occlusion, and viewpoint… ▽ More

    Submitted 8 April, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: Updated statistics after slight modification to dataset due to inactive links and deletions

  11. arXiv:1812.00099  [pdf, other

    cs.CV cs.CY stat.ML

    Understanding Unequal Gender Classification Accuracy from Face Images

    Authors: Vidya Muthukumar, Tejaswini Pedapati, Nalini Ratha, Prasanna Sattigeri, Chai-Wah Wu, Brian Kingsbury, Abhishek Kumar, Samuel Thomas, Aleksandra Mojsilovic, Kush R. Varshney

    Abstract: Recent work shows unequal performance of commercial face classification services in the gender classification task across intersectional groups defined by skin type and gender. Accuracy on dark-skinned females is significantly worse than on any other group. In this paper, we conduct several analyses to try to uncover the reason for this gap. The main finding, perhaps surprisingly, is that skin typ… ▽ More

    Submitted 30 November, 2018; originally announced December 2018.

  12. arXiv:1811.08837  [pdf, other

    cs.CV

    Recognizing Disguised Faces in the Wild

    Authors: Maneet Singh, Richa Singh, Mayank Vatsa, Nalini Ratha, Rama Chellappa

    Abstract: Research in face recognition has seen tremendous growth over the past couple of decades. Beginning from algorithms capable of performing recognition in constrained environments, the current face recognition systems achieve very high accuracies on large-scale unconstrained face datasets. While upcoming algorithms continue to achieve improved performance, a majority of the face recognition systems a… ▽ More

    Submitted 21 November, 2018; originally announced November 2018.

  13. arXiv:1811.00846  [pdf, other

    cs.CV

    Heterogeneity Aware Deep Embedding for Mobile Periocular Recognition

    Authors: Rishabh Garg, Yashasvi Baweja, Soumyadeep Ghosh, Mayank Vatsa, Richa Singh, Nalini Ratha

    Abstract: Mobile biometric approaches provide the convenience of secure authentication with an omnipresent technology. However, this brings an additional challenge of recognizing biometric patterns in unconstrained environment including variations in mobile camera sensors, illumination conditions, and capture distance. To address the heterogeneous challenge, this research presents a novel heterogeneity awar… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

  14. arXiv:1803.00401  [pdf, other

    cs.CV

    Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks

    Authors: Gaurav Goswami, Nalini Ratha, Akshay Agarwal, Richa Singh, Mayank Vatsa

    Abstract: Deep neural network (DNN) architecture based models have high expressive power and learning capacity. However, they are essentially a black box method since it is not easy to mathematically formulate the functions that are learned within its many layers of representation. Realizing this, many researchers have started to design methods to exploit the drawbacks of deep learning based algorithms ques… ▽ More

    Submitted 22 February, 2018; originally announced March 2018.

    Comments: Accepted in AAAI 2018 (8 pages, 5 figures, 5 tables)