A comprehensive survey on techniques to handle face identity threats: challenges and opportunities.

Multimed Tools Appl

CSED, MNNIT Allahabad, Prayagraj, Uttar Pradesh India.

Published: June 2022

The human face is considered the prime entity in recognizing a person's identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9183764PMC
http://dx.doi.org/10.1007/s11042-022-13248-6DOI Listing

Publication Analysis

Top Keywords

identity threats
16
face identity
12
recognition systems
12
facial recognition
12
face
8
face recognition
8
face datasets
8
threats
7
identity
6
recognition
6

Similar Publications

Citrus canker poses a serious threat to a highly significant citrus fruit crop, this disease caused by one of the most destructive bacterial plant pathogens Xanthomonas citri pv. citri (Xcc). Bacterial plant diseases significantly reduce crop yields worldwide, making it more difficult to supply the growing food demand.

View Article and Find Full Text PDF

Developing accurate and equitable screening protocols can lead to more targeted, efficient, and effective, teen dating violence (TDV) prevention programming. Current TDV screening protocols perform poorly and are rarely implemented, but recent research and policy emphasizes the importance of leveraging more trauma-focused screening measures for improved prevention outcomes. In response, the present study examined which adversities (i.

View Article and Find Full Text PDF

Privacy-preserving record linkage (PPRL) technology, crucial for linking records across datasets while maintaining privacy, is susceptible to graph-based re-identification attacks. These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks.

View Article and Find Full Text PDF

What happens when disadvantaged groups feel that their freedom to define and practice their collective identity (i.e., collective autonomy) is restricted? The present theoretical review outlines the conditions under which social inequality activates the feelings of collective autonomy restriction among disadvantaged group members and motivates the mobilization of social movements seeking social equality.

View Article and Find Full Text PDF

People with marginalized identities must often manage the diversity dynamics that are activated by their presence in organizations. Due to underrepresentation and stigmatization, they cope with a range of identity threats while navigating diverse settings. A host of studies over the past twenty-five years have examined the wide range of verbal and nonverbal tactics that people use to suppress and express their devalued versus valued social identities at work.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!