Facial Modality

Techniques:

  • Recognize a 2D or 3D image of the subject's face.
  • Analyze the relative position, size, &| geometry of:
    • - eyes
    • - nose
    • - cheekbones
    • - jaw
  • Normalize
  • Eliminate the useless data

    Recognition Algorithms

  • - eigenfaces
  • - linear discriminant analysis
  • - elastic bunch graph matching (Fisherface algorithm)
  • - hidden Markov model
  • - tensor representation of multilinear subspace

    Vulnerability Flaws

  • 2012 2D image can be spoofed with a photograph
  • 2017 Samsung S8 Iris Scanner used for face recognition & unlock feature
    ;  allows a person to break into someone else's Samsung Galaxy S8 smartphone by:
    • - presenting the photo of a user on the smartphone
    • - flash it at the S8 front camera

    Vulnerability: Extremely High

  • Samsung S3 Launch Date: May 29, 2012
  • 1st Spoof Date:                   June 27, 2012

    Identity Fraud

    estimated 16.6 million human faces stolen, 2012
    resulted in financial fallouts 24.7 billion usd