Cargando…
A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a high...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9183764/ https://www.ncbi.nlm.nih.gov/pubmed/35702682 http://dx.doi.org/10.1007/s11042-022-13248-6 |
_version_ | 1784724361302769664 |
---|---|
author | Rusia, Mayank Kumar Singh, Dushyant Kumar |
author_facet | Rusia, Mayank Kumar Singh, Dushyant Kumar |
author_sort | Rusia, Mayank Kumar |
collection | PubMed |
description | The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers. |
format | Online Article Text |
id | pubmed-9183764 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-91837642022-06-10 A comprehensive survey on techniques to handle face identity threats: challenges and opportunities Rusia, Mayank Kumar Singh, Dushyant Kumar Multimed Tools Appl Article The human face is considered the prime entity in recognizing a person’s identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers. Springer US 2022-06-10 2023 /pmc/articles/PMC9183764/ /pubmed/35702682 http://dx.doi.org/10.1007/s11042-022-13248-6 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Rusia, Mayank Kumar Singh, Dushyant Kumar A comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
title | A comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
title_full | A comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
title_fullStr | A comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
title_full_unstemmed | A comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
title_short | A comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
title_sort | comprehensive survey on techniques to handle face identity threats: challenges and opportunities |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9183764/ https://www.ncbi.nlm.nih.gov/pubmed/35702682 http://dx.doi.org/10.1007/s11042-022-13248-6 |
work_keys_str_mv | AT rusiamayankkumar acomprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities AT singhdushyantkumar acomprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities AT rusiamayankkumar comprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities AT singhdushyantkumar comprehensivesurveyontechniquestohandlefaceidentitythreatschallengesandopportunities |