Skip to main content

Showing 1–20 of 20 results for author: Razeghi, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.07627  [pdf, other

    cs.CV

    Synthetic to Authentic: Transferring Realism to 3D Face Renderings for Boosting Face Recognition

    Authors: Parsa Rahimi, Behrooz Razeghi, Sebastien Marcel

    Abstract: In this paper, we investigate the potential of image-to-image translation (I2I) techniques for transferring realism to 3D-rendered facial images in the context of Face Recognition (FR) systems. The primary motivation for using 3D-rendered facial images lies in their ability to circumvent the challenges associated with collecting large real face datasets for training FR systems. These images are ge… ▽ More

    Submitted 13 December, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: ECCV24 Synthetic Data for Computer Vision (Oral)

  2. arXiv:2404.02696  [pdf, other

    cs.LG

    Deep Privacy Funnel Model: From a Discriminative to a Generative Approach with an Application to Face Recognition

    Authors: Behrooz Razeghi, Parsa Rahimi, Sébastien Marcel

    Abstract: In this study, we apply the information-theoretic Privacy Funnel (PF) model to the domain of face recognition, developing a novel method for privacy-preserving representation learning within an end-to-end training framework. Our approach addresses the trade-off between obfuscation and utility in data protection, quantified through logarithmic loss, also known as self-information loss. This researc… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  3. arXiv:2401.14792  [pdf, other

    cs.CV cs.IT cs.LG

    Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition

    Authors: Behrooz Razeghi, Parsa Rahimi, Sébastien Marcel

    Abstract: In this study, we harness the information-theoretic Privacy Funnel (PF) model to develop a method for privacy-preserving representation learning using an end-to-end training framework. We rigorously address the trade-off between obfuscation and utility. Both are quantified through the logarithmic loss, a measure also recognized as self-information loss. This exploration deepens the interplay betwe… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: IEEE ICASSP 2024

  4. arXiv:2207.04895  [pdf, other

    cs.LG cs.CR cs.IT math.ST

    Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility

    Authors: Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy

    Abstract: Bottleneck problems are an important class of optimization problems that have recently gained increasing attention in the domain of machine learning and information theory. They are widely used in generative models, fair machine learning algorithms, design of privacy-assuring mechanisms, and appear as information-theoretic performance bounds in various multi-user communication problems. In this wo… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

  5. Variational Leakage: The Role of Information Complexity in Privacy Leakage

    Authors: Amir Ahooye Atashin, Behrooz Razeghi, Deniz Gündüz, Slava Voloshynovskiy

    Abstract: We study the role of information complexity in privacy leakage about an attribute of an adversary's interest, which is not known a priori to the system designer. Considering the supervised representation learning setup and using neural networks to parameterize the variational bounds of information quantities, we study the impact of the following factors on the amount of information leakage: inform… ▽ More

    Submitted 8 June, 2021; v1 submitted 5 June, 2021; originally announced June 2021.

  6. arXiv:2102.04274  [pdf, other

    cs.IR

    Privacy-Preserving Near Neighbor Search via Sparse Coding with Ambiguation

    Authors: Behrooz Razeghi, Sohrab Ferdowsi, Dimche Kostadinov, Flavio. P. Calmon, Slava Voloshynovskiy

    Abstract: In this paper, we propose a framework for privacy-preserving approximate near neighbor search via stochastic sparsifying encoding. The core of the framework relies on sparse coding with ambiguation (SCA) mechanism that introduces the notion of inherent shared secrecy based on the support intersection of sparse codes. This approach is `fairness-aware', in the sense that any point in the neighborhoo… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: To be presented at 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2021)

  7. arXiv:2009.04157  [pdf, other

    cs.IT cs.CR math.PR

    On Perfect Obfuscation: Local Information Geometry Analysis

    Authors: Behrooz Razeghi, Flavio. P. Calmon, Deniz Gunduz, Slava Voloshynovskiy

    Abstract: We consider the problem of privacy-preserving data release for a specific utility task under perfect obfuscation constraint. We establish the necessary and sufficient condition to extract features of the original data that carry as much information about a utility attribute as possible, while not revealing any information about the sensitive attribute. This problem formulation generalizes both the… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

  8. arXiv:2002.01469  [pdf, other

    cs.CV cs.CR eess.IV

    Privacy-Preserving Image Sharing via Sparsifying Layers on Convolutional Groups

    Authors: Sohrab Ferdowsi, Behrooz Razeghi, Taras Holotyak, Flavio P. Calmon, Slava Voloshynovskiy

    Abstract: We propose a practical framework to address the problem of privacy-aware image sharing in large-scale setups. We argue that, while compactness is always desired at scale, this need is more severe when trying to furthermore protect the privacy-sensitive content. We therefore encode images, such that, from one hand, representations are stored in the public domain without paying the huge cost of priv… ▽ More

    Submitted 4 February, 2020; originally announced February 2020.

    Comments: Accepted as an oral presentation for ICASSP 2020

  9. arXiv:1907.06388  [pdf, other

    cs.IT cs.CR cs.IR

    Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation

    Authors: Behrooz Razeghi, Taras Stanko, Boris Škorić, Slava Voloshynovskiy

    Abstract: We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. This property is e.g. the sign or an indicator that a threshold is exceeded… ▽ More

    Submitted 1 October, 2019; v1 submitted 15 July, 2019; originally announced July 2019.

  10. arXiv:1905.03282  [pdf, other

    cs.LG cs.CR cs.IR stat.ML

    Reconstruction of Privacy-Sensitive Data from Protected Templates

    Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy

    Abstract: In this paper, we address the problem of data reconstruction from privacy-protected templates, based on recent concept of sparse ternary coding with ambiguization (STCA). The STCA is a generalization of randomization techniques which includes random projections, lossy quantization, and addition of ambiguization noise to satisfy the privacy-utility trade-off requirements. The theoretical privacy-pr… ▽ More

    Submitted 8 May, 2019; originally announced May 2019.

    Comments: accepted at ICIP 2019

  11. arXiv:1901.10760  [pdf, ps, other

    cs.LG stat.ML

    Clustering with Jointly Learned Nonlinear Transforms Over Discriminating Min-Max Similarity/Dissimilarity Assignment

    Authors: Dimche Kostadinov, Behrooz Razeghi, Taras Holotyak, Slava Voloshynovskiy

    Abstract: This paper presents a novel clustering concept that is based on jointly learned nonlinear transforms (NTs) with priors on the information loss and the discrimination. We introduce a clustering principle that is based on evaluation of a parametric min-max measure for the discriminative prior. The decomposition of the prior measure allows to break down the assignment into two steps. In the first ste… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  12. arXiv:1812.03943  [pdf, other

    cs.CR

    Aggregation and Embedding for Group Membership Verification

    Authors: Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy

    Abstract: This paper proposes a group membership verification protocol preventing the curious but honest server from reconstructing the enrolled signatures and inferring the identity of querying clients. The protocol quantizes the signatures into discrete embeddings, making reconstruction difficult. It also aggregates multiple embeddings into representative values, impeding identification. Theoretical and e… ▽ More

    Submitted 23 April, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: accepted at ICASSP 2019

  13. arXiv:1806.08658  [pdf, ps, other

    cs.IT cs.CR cs.DB cs.DC cs.DS

    Privacy-Preserving Identification via Layered Sparse Code Design: Distributed Servers and Multiple Access Authorization

    Authors: Behrooz Razeghi, Slava Voloshynovskiy, Sohrab Ferdowsi, Dimche Kostadinov

    Abstract: We propose a new computationally efficient privacy-preserving identification framework based on layered sparse coding. The key idea of the proposed framework is a sparsifying transform learning with ambiguization, which consists of a trained linear map, a component-wise nonlinearity and a privacy amplification. We introduce a practical identification framework, which consists of two phases: public… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: EUSIPCO 2018

  14. arXiv:1805.07802  [pdf, other

    cs.LG cs.AI cs.NE stat.ML

    Network Learning with Local Propagation

    Authors: Dimche Kostadinov, Behrooz Razeghi, Sohrab Ferdowsi, Slava Voloshynovskiy

    Abstract: This paper presents a locally decoupled network parameter learning with local propagation. Three elements are taken into account: (i) sets of nonlinear transforms that describe the representations at all nodes, (ii) a local objective at each node related to the corresponding local representation goal, and (iii) a local propagation model that relates the nonlinear error vectors at each node with th… ▽ More

    Submitted 20 May, 2018; originally announced May 2018.

    Comments: preprint, a similar version submitted to NIPS 2018

  15. arXiv:1709.10297  [pdf, other

    cs.CR cs.LG stat.ML

    Privacy Preserving Identification Using Sparse Approximation with Ambiguization

    Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran

    Abstract: In this paper, we consider a privacy preserving encoding framework for identification applications covering biometrics, physical object security and the Internet of Things (IoT). The proposed framework is based on a sparsifying transform, which consists of a trained linear map, an element-wise nonlinearity, and privacy amplification. The sparsifying transform and privacy amplification are not symm… ▽ More

    Submitted 29 September, 2017; originally announced September 2017.

    Comments: submitted to WIFS 2017

  16. Joint Source-Channel Coding for Broadcast Channel with Cooperating Receivers

    Authors: Sajjad Bahrami, Behrooz Razeghi, Mostafa Monemizadeh, Ghosheh Abed Hodtani

    Abstract: It is known that, as opposed to point-to-point channel, separate source and channel coding is not optimal in general for sending correlated sources over multiuser channels. In some works joint source-channel coding has been investigated for some certain multiuser channels; i.g., multiple access channel (MAC) and broadcast channel (BC). In this paper, we obtain a sufficient condition for transmitti… ▽ More

    Submitted 17 August, 2015; originally announced August 2015.

    Comments: to appear in Proceedings of IEEE Information Theory Workshop - Fall (ITW'2015)

  17. arXiv:1410.2997  [pdf, other

    cs.IT

    Coverage Region Analysis for MIMO Amplify-and-Forward Relay Channel with the Source to Destination Link

    Authors: Behrooz Razeghi, Ghosheh Abed Hodtani, Seyed Alireza Seyedin

    Abstract: In this paper we study and analyze coverage region for half-duplex multiple-input multiple-output (MIMO) relay channel with amplify-and-forward (AF) strategy at the relay station. By assuming mixed Rayleigh and Rician fading channels with two different relay station situations, we consider the objective of maximizing coverage region for a given transmission rate and find the optimal relay location… ▽ More

    Submitted 11 October, 2014; originally announced October 2014.

    Comments: Accepted for publication in Seventh International Symposium on Telecommunications (IST'2014)

  18. arXiv:1408.2813  [pdf, ps, other

    cs.NI cs.IR

    BSROne: Binary Search with Routing of O(1); A Scalable Circular Design for Distributed Networks

    Authors: Alireza Naghizadeh, Tahereh Yourdkhani, Behrooz Razeghi, Ehsan Meamari

    Abstract: Peer-to-Peer (P2P) networks as distributed solutions are used in a variety of applications. Based on the type of routing for queries among their nodes, they are classified into three groups: structured, unstructured and small-world P2P networks. Each of these categories has its own applications and benefits. Structured networks by using Distributed Hash Tables (DHT) can forward request search quer… ▽ More

    Submitted 27 June, 2020; v1 submitted 12 August, 2014; originally announced August 2014.

    Comments: 22 pages, 11 figures

  19. A Generalized Write Channel Model for Bit-Patterned Media Recording

    Authors: Sima Naseri, Somaie Yazdani, Behrooz Razeghi, Ghosheh Abed Hodtani

    Abstract: In this paper, we propose a generalized write channel model for bit-patterned media recording by considering all sources of errors causing some extra disturbances during write process, in addition to data dependent write synchronization errors. We investigate information-theoretic bounds for this new model according to various input distributions and also compare it numerically to the last propose… ▽ More

    Submitted 15 July, 2014; originally announced July 2014.

    Comments: Accepted for publication in the IEEE International Symposium on Information Theory and its Applications (ISITA 2014), Melbourne, Australia, Oct. 2014

  20. arXiv:1406.7068  [pdf, other

    cs.IT

    Analysis of Coverage Region for MIMO Relay Network with Multiple Cooperative DF-Relays

    Authors: Behrooz Razeghi, Alireza Alizadeh, Sima Naseri, Ghosheh Abed Hodtani, Seyed Alireza Seyedin

    Abstract: We study and analyze coverage region in MIMO communication systems for a multiple-relay network with decode-and-forward (DF) strategy at the relays. Assuming that there is a line-of-sight (LOS) propagation environment for source-relay channels and channel state information is available at receivers (CSIR), we consider the objective of maximizing coverage region for a given transmission rate and sh… ▽ More

    Submitted 27 June, 2014; originally announced June 2014.

    Comments: Accepted for publication in International Symposium on Wireless Communication Systems (ISWCS) 2014