Terhörst, PhilippHuber, MarcoDamer, NaserRot, PeterKirchbuchner, FlorianStruc, VitomirKuijper, ArjanBrömme, ArslanBusch, ChristophDantcheva, AntitzaRaja, KiranRathgeb, ChristianUhl, Andreas2020-09-162020-09-162020978-3-88579-700-5https://dl.gi.de/handle/20.500.12116/34330Biometric data includes privacy-sensitive information, such as soft-biometrics. Soft-biometric privacy enhancing technologies aim at limiting the possibility of deducing such information. Previous works proposed several solutions to this problem using several different evaluation processes, metrics, and attack scenarios. The absence of a standardized evaluation protocol makes a meaningful comparison of these solutions difficult. In this work, we propose privacy evaluation protocols (PEPs) for privacy-enhancing technologies (PETs) dealing with soft-biometric privacy. Our framework evaluates PETs in the most critical scenario of an attacker that knows and adapts to the systems privacy-mechanism. Moreover, our PEPs differentiate between PET of learning-based or training-free nature. To ensure that our protocol meets the highest standards in both cases, it is based on Kerckhoffs‘s principle of cryptography.enFacesoft-biometric privacyprivacy-enhancing technologiesevaluation protocolsPrivacy Evaluation Protocols for the Evaluation of Soft-Biometric Privacy-Enhancing TechnologiesText/Conference Paper1617-5468