Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
en:tc_technology_fs2_lfd_technology [2017/12/06 11:03]
kyle created
en:tc_technology_fs2_lfd_technology [2023/08/01 17:06] (current)
mwkim
Line 1: Line 1:
-{{tag>"​FaceStation 2" "​Face ​Recognition" "Face ID"}}+{{tag>"​FaceStation 2" "​Face ​Authentication" "Face ID"}}
  
-===== Security Threats to Face Recognition ​and FaceStation 2 Technology =====+====== Security Threats to Face Authentication ​and FaceStation 2 Technology ​======
  
-Apple recently released its most ambitious product, the iPhone X, in celebration of the 10th anniversary of the release of the first iPhone. The iPhone X especially stands out with its introduction of Face ID, a face recognition ​technology to replace the fingerprint recognition technology (Touch ID). According to Apple, Face ID will recognize a user’s face wrongly only once in 1 million times, an immense improvement over the once in 50,000 times probability of Touch ID.  ​+Apple recently released its most ambitious product, the iPhone X, in celebration of the 10th anniversary of the release of the first iPhone. The iPhone X especially stands out with its introduction of Face ID, a face authentication ​technology to replace the fingerprint recognition technology (Touch ID). According to Apple, Face ID will recognize a user’s face wrongly only once in 1 million times, an immense improvement over the once in 50,000 times probability of Touch ID.  ​
  
 \\ \\
Line 11: Line 11:
  
 \\ \\
-However, authentication through face recognition ​is actually as prone to spoofing as fingerprint-based methods. The press was quick to point out after Face ID was announced that it would be easy to recreate through 3D rendering the faces of well-known politicians or actors that are often exposed in photos or videos as there is a great amount of data available on them. 3D printers, which are used to build face structures, are also no longer hard to find. They can be commonly found on the online shopping mall like Amazon.+However, authentication through face authentication ​is actually as prone to spoofing as fingerprint-based methods. The press was quick to point out after Face ID was announced that it would be easy to recreate through 3D rendering the faces of well-known politicians or actors that are often exposed in photos or videos as there is a great amount of data available on them. 3D printers, which are used to build face structures, are also no longer hard to find. They can be commonly found on the online shopping mall like Amazon.
  
 \\ \\
Line 28: Line 28:
 \\ \\
  
-Then what about Suprema’s FaceStation 2, which also authenticates users with face recognition? \\+Then what about Suprema’s FaceStation 2, which also authenticates users with face authentication? \\
 Is its security also vulnerable to similar methods? ​ Is its security also vulnerable to similar methods? ​
  
  
 \\ \\
-===== FaceStation 2's Advanced Face Recognition ​Technology =====+===== FaceStation 2's Advanced Face Authentication ​Technology =====
  
-FaceStation 2’s face recognition ​method functions differently from the iPhone X'​s. ​+FaceStation 2’s face Authentication ​method functions differently from the iPhone X'​s. ​
 \\ \\
  
Line 41: Line 41:
 \\ \\
  
-FaceStation 2, on the other hand, not only uses 140 near-infrared (NIR) LEDs to extract 3D modeling ​data, but also uses an algorithm to produce various numerical values from the infrared light reflected off of the face. These values include those related to skin tone and skin texture values, which are helpful in distinguishing between similar faces. This special hardware and algorithm render the mask built by Bkav useless when tested against FaceStation 2’s authentication system. ​+FaceStation 2, on the other hand, not only uses 140 near-infrared (NIR) LEDs to extract 3D feature ​data, but also uses an algorithm to produce various numerical values from the infrared light reflected off of the face. These values include those related to skin tone and skin texture values, which are helpful in distinguishing between similar faces. This special hardware and algorithm render the mask built by Bkav useless when tested against FaceStation 2’s authentication system. ​
 \\ \\
  
Line 49: Line 49:
  
 \\ \\
-FaceStation 2 also uses a matching score when executing face recognition. The matching score is a calculation of the match between a pre-registered face template and the actual face to be authenticated. The score helps guard FaceStation 2 against spoofing, as a low value is produced if the mask used in spoofing does not use a 3D model that exactly matches the actual face. +FaceStation 2 also uses a matching score when executing face authentication. The matching score is a calculation of the match between a pre-registered face template and the actual face to be authenticated. The score helps guard FaceStation 2 against spoofing, as a low value is produced if the mask used in spoofing does not use a 3D model that exactly matches the actual face. 
  
 \\ \\