The human face is considered the prime entity in recognizing a person's identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9183764 | PMC |
http://dx.doi.org/10.1007/s11042-022-13248-6 | DOI Listing |
Biochem Biophys Res Commun
January 2025
Department of Botany, Vivekananda Mahavidyalaya, Haripal, Hooghly, 712405, West Bengal, India. Electronic address:
Citrus canker poses a serious threat to a highly significant citrus fruit crop, this disease caused by one of the most destructive bacterial plant pathogens Xanthomonas citri pv. citri (Xcc). Bacterial plant diseases significantly reduce crop yields worldwide, making it more difficult to supply the growing food demand.
View Article and Find Full Text PDFPrev Sci
January 2025
School of Behavioral Health Sciences, The University of Texas Health Science Center at Houston, 7000 Fannin St, Houston, TX, 77030, USA.
Developing accurate and equitable screening protocols can lead to more targeted, efficient, and effective, teen dating violence (TDV) prevention programming. Current TDV screening protocols perform poorly and are rarely implemented, but recent research and policy emphasizes the importance of leveraging more trauma-focused screening measures for improved prevention outcomes. In response, the present study examined which adversities (i.
View Article and Find Full Text PDFPLoS One
January 2025
Department of Computer Science and Engineering at Hanyang University ERICA, Ansan-si, Gyeonggi-do, South Korea.
Privacy-preserving record linkage (PPRL) technology, crucial for linking records across datasets while maintaining privacy, is susceptible to graph-based re-identification attacks. These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks.
View Article and Find Full Text PDFWhat happens when disadvantaged groups feel that their freedom to define and practice their collective identity (i.e., collective autonomy) is restricted? The present theoretical review outlines the conditions under which social inequality activates the feelings of collective autonomy restriction among disadvantaged group members and motivates the mobilization of social movements seeking social equality.
View Article and Find Full Text PDFCurr Opin Psychol
December 2024
University of Pretoria, South Africa.
People with marginalized identities must often manage the diversity dynamics that are activated by their presence in organizations. Due to underrepresentation and stigmatization, they cope with a range of identity threats while navigating diverse settings. A host of studies over the past twenty-five years have examined the wide range of verbal and nonverbal tactics that people use to suppress and express their devalued versus valued social identities at work.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!