Facial-recognition spoofing emerged to combat accurate identification from facial recognition software. For example, Business Insider reported that in 2018 Chinese children started using a photo of a sleeping parent to bypass age and time-limit restrictions for playing popular video games online.Photos of many people are found on social media. It is sometimes possible to fool facial recognition software with these photos by printing them, using a screenshot, or using the photo for 3D model mapping of full facial representation.Developers of facial recognition software responded to spoofing attempts by creating various anti-spoofing methods to add more protection when giving access to confidential information. The anti-spoofing procedures make it more difficult for unauthorized persons to bypass facial-identification. This helps reduce fraud.It seems like facial recognition should be effective; however, vulnerabilities exist. Anti-spoofing methods are used with facial identification to reduce these vulnerabilities. Advanced facial identification systems detect whether a person seeking authorization is alive. This double-check determines if the person is really there or if they are trying to spoof the facial recognition system with a photograph, that is called a 2D presentation attack. A software product to prevent the spoofing attempts must meet the following criteria:Identify 2D static and dynamic ...
Read More on Datafloq
No comments:
Post a Comment