Cargando…

A comprehensive survey on techniques to handle face identity threats: challenges and opportunities

The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a high...

Descripción completa

Detalles Bibliográficos
Autores principales: Rusia, Mayank Kumar, Singh, Dushyant Kumar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9183764/
https://www.ncbi.nlm.nih.gov/pubmed/35702682
http://dx.doi.org/10.1007/s11042-022-13248-6
_version_ 1784724361302769664
author Rusia, Mayank Kumar
Singh, Dushyant Kumar
author_facet Rusia, Mayank Kumar
Singh, Dushyant Kumar
author_sort Rusia, Mayank Kumar
collection PubMed
description The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers.
format Online
Article
Text
id pubmed-9183764
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-91837642022-06-10 A comprehensive survey on techniques to handle face identity threats: challenges and opportunities Rusia, Mayank Kumar Singh, Dushyant Kumar Multimed Tools Appl Article The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers. Springer US 2022-06-10 2023 /pmc/articles/PMC9183764/ /pubmed/35702682 http://dx.doi.org/10.1007/s11042-022-13248-6 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Rusia, Mayank Kumar
Singh, Dushyant Kumar
A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
title A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
title_full A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
title_fullStr A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
title_full_unstemmed A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
title_short A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
title_sort comprehensive survey on techniques to handle face identity threats: challenges and opportunities
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9183764/
https://www.ncbi.nlm.nih.gov/pubmed/35702682
http://dx.doi.org/10.1007/s11042-022-13248-6
work_keys_str_mv AT rusiamayankkumar acomprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities
AT singhdushyantkumar acomprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities
AT rusiamayankkumar comprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities
AT singhdushyantkumar comprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities