A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”
| dc.contributor.author | Rath, S. | |
| dc.contributor.author | Ramalingam, J. | |
| dc.contributor.author | Seal, S. | |
| dc.date.accessioned | 2026-02-03T13:20:53Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | Zhang et al. (2020) exhibit a fundamental mathematical flaw that renders their algorithm infeasible. Additionally, existing outsourcing protocols for PCA-based face recognition suffer from inadequate verification methods, undermining the reliability of these algorithms. © 2005-2012 IEEE. | |
| dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2025, 20, , pp. 1765-1766 | |
| dc.identifier.issn | 15566013 | |
| dc.identifier.uri | https://doi.org/10.1109/TIFS.2025.3526057 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/20723 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.subject | Consensus algorithm | |
| dc.subject | Face recognition | |
| dc.subject | Outsourcing | |
| dc.subject | Principal-component analysis | |
| dc.subject | Robust verification | |
| dc.subject | Verification method | |
| dc.subject | Principal component analysis | |
| dc.title | A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition” |
