Published Papers

Transactions Papers

A comprehensive review of AI-powered facial recognition systems with enhanced privacy features

Praveen Kumar J, Anwar Basha H, O Pandithurai and G Saikrishnan
Pages: 1-9Published: 23 Apr 2026
DOI: 10.33430/V33N1THIE-2025-0062
Cite thisHide

Praveen Kumar J, Anwar Basha H, Pandithurai O and Saikrishnan G, A comprehensive review of AI-powered facial recognition systems with enhanced privacy features, HKIE Transactions, Vol. 33, No. 1 (Regular Issue), Article THIE-2025-0062, 2026, 10.33430/V33N1THIE-2025-0062

 Copy

Abstract:

Facial recognition systems that use artificial intelligence (AI) have transformed a number of applications, such as identity verification, security, and surveillance. However, issues with data security and privacy have become significant obstacles. AI-driven facial recognition systems are thoroughly examined in this paper, with a particular emphasis on improved privacy features. The study examines the most cutting-edge privacy-preserving facial recognition techniques currently in use, such as homomorphic encryption, secure multi-party computation, and differential privacy. For academics, practitioners, and developers in the field, the discussion of each approach's advantages, disadvantages, and potential future paths offers insightful information.

Keywords:

facial recognition, artificial intelligence, homomorphic encryption, differential privacy, multi-party computation

Reference List:

1. Wang, Mei, and Weihong Deng. "Deep face recognition: A survey." Neurocomputing 429 (2021): 215-244.
2. ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discrete logarithms." IEEE transactions on information theory 31.4 (1985): 469-472.
3. Schroff, Florian, Dmitry Kalenichenko, and James Philbin. "Facenet: A unified embedding for face recognition and clustering." Proceedings of the IEEE conference on computer vision and pattern recognition. 2015.
4. Alzu’bi, Ahmad, et al. "Masked face recognition using deep learning: A review." Electronics 10.21 (2021): 2666.
5. Yin, Xi, et al. "Feature transfer learning for face recognition with under-represented data." Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2019.
6. Paillier, Pascal. "Public-key cryptosystems based on composite degree residuosity classes." International conference on the theory and applications of cryptographic techniques. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999.
7. Jing, Hongrong, et al. "A face recognition algorithm based on improved resnet." Frontiers in Computing and Intelligent Systems 1.1 (2022): 22-25.
8. Goodfellow, Ian, et al. "Generative adversarial networks." Communications of the ACM 63.11 (2020): 139-144.
9. Gilad-Bachrach, Ran, et al. "Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy." International conference on machine learning. PMLR, 2016.
10. Cheon, Jung Hee, et al. "Homomorphic encryption for arithmetic of approximate numbers." Advances in cryptology–ASIACRYPT 2017: 23rd international conference on the theory and applications of cryptology and information security, Hong kong, China, December 3-7, 2017, proceedings, part i 23. Springer International Publishing, 2017.
11. Al-Mannai, Kamela, et al. "Multimodal Face Data Sets—A Survey of Technologies, Applications, and Contents." IEEE Access (2024).
12. Brakerski, Zvika, and Vinod Vaikuntanathan. "Efficient fully homomorphic encryption from (standard) LWE." SIAM Journal on computing 43.2 (2014): 831-871.
13. Van Dijk, Marten, et al. "Fully homomorphic encryption over the integers." Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30–June 3, 2010. Proceedings 29. Springer Berlin Heidelberg, 2010.
14. Yang, Tao, et al. "Privacy enhanced cloud-based facial recognition." Neural Processing Letters (2022): 1-9.
15. Bringer, Julien, Hervé Chabanne, and Bruno Kindarji. "Error-tolerant searchable encryption." 2009 IEEE International Conference on Communications. IEEE, 2009.
16. Kairouz, Peter, et al. "Advances and open problems in federated learning." Foundations and trends® in machine learning 14.1–2 (2021): 1-210.
17. Pradel, Gaëtan, and Chris Mitchell. "Privacypreserving biometric matching using homomorphic encryption." 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2021.
18. Gong, Sixue, Yichun Shi, and Anil K. Jain. "Recurrent embedding aggregation network for video face recognition." arXiv preprint arXiv:1904.12019 (2019).
19. Yang, Qiang, et al. "Federated machine learning: Concept and applications." ACM Transactions on Intelligent Systems and Technology (TIST) 10.2 (2019): 1-19.
20. McMahan, Brendan, et al. "Communication-efficient learning of deep networks from decentralized data."Artificial intelligence and statistics. PMLR, 2017.
21. Fuad, Md Tahmid Hasan, et al. "Recent advances in deep learning techniques for face recognition." IEEE Access 9 (2021): 99112-99142.
22. Becerra-Riera, Fabiola, Annette Morales-González, and Heydi Méndez-Vázquez. "A survey on facial soft biometrics for video surveillance and forensic applications." Artificial Intelligence Review 52.2 (2019): 1155-1187.
23. Kairouz, Peter, et al. "Advances and open problems in federated learning." Foundations and trends® in machine learning 14.1–2 (2021): 1-210.
24. Pagnin, Elena, and Aikaterini Mitrokotsa. "Privacypreserving Biometric authentication: challenges and directions." Security and Communication Networks 2017.1 (2017): 7129505.
25. Abdullahi, Sani M., et al. "Biometric template attacks and recent protection mechanisms: A survey."Information Fusion 103 (2024): 102144.
26. Goodfellow, Ian J., Jonathon Shlens, and Christian Szegedy. "Explaining and harnessing adversarial examples." arXiv preprint arXiv:1412.6572 (2014).
27. Li, Tian, et al. "Federated learning: Challenges, methods, and future directions." IEEE signal processing magazine 37.3 (2020): 50-60.
28. Zhang, Yu, and Qiang Yang. "A survey on multi-task learning." IEEE transactions on knowledge and data engineering 34.12 (2021): 5586-5609.
29. Dwork, Cynthia. "Differential privacy: A survey of results." International conference on theory and applications of models of computation. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008.
30. Simonyan, Karen, and Andrew Zisserman. "Very deep convolutional networks for large-scale image recognition." arXiv preprint arXiv:1409.1556 (2014).
31. Sarwar, Omair, Bernhard Rinner, and Andrea Cavallaro. "A privacy-preserving filter for oblique face images based on adaptive hopping Gaussian mixtures." IEEE Access 7 (2019): 142623-142639.
32. Dwork, Cynthia, and Aaron Roth. "The algorithmic foundations of differential privacy." Foundations and Trends® in Theoretical Computer Science 9.3–4 (2014): 211-407.
33. Abadi, Martin, et al. "Deep learning with differential privacy." Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016.
>> more<< less