A Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”

dc.contributor.authorRath, S.
dc.contributor.authorRamalingam, J.
dc.contributor.authorSeal, S.
dc.date.accessioned2026-02-03T13:20:53Z
dc.date.issued2025
dc.description.abstractZhang et al. (2020) exhibit a fundamental mathematical flaw that renders their algorithm infeasible. Additionally, existing outsourcing protocols for PCA-based face recognition suffer from inadequate verification methods, undermining the reliability of these algorithms. © 2005-2012 IEEE.
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2025, 20, , pp. 1765-1766
dc.identifier.issn15566013
dc.identifier.urihttps://doi.org/10.1109/TIFS.2025.3526057
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/20723
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectConsensus algorithm
dc.subjectFace recognition
dc.subjectOutsourcing
dc.subjectPrincipal-component analysis
dc.subjectRobust verification
dc.subjectVerification method
dc.subjectPrincipal component analysis
dc.titleA Note on “Secure and Efficient Outsourcing of PCA-Based Face Recognition”

Files

Collections