HomeTechnologyArtificial IntelligenceFace Recognition Identification with a Twist

    Face Recognition Identification with a Twist

    Using your face to unlock your phone is a pretty genius security protocol. But like any advanced technology, hackers and thieves are always up to the challenge, whether that’s unlocking your phone with your face while you sleep or using a photo from social media to do the same.

    Like every other human biometric identification system before it (fingerprints, retina scans) there are still significant security flaws in some of the most advanced identity verification technology. Brigham Young University electrical and computer engineering decided there is a better and more secure way to use your face for restricted access.

    It’s called Concurrent Two-Factor Identity Verification (C2FIV) and it requires both one’s facial identity and a specific facial motion to gain access. To set it up, a user faces a camera and records a short 1-2 second video of either a unique facial motion or a lip movement from reading a secret phrase. The video then inputs into the device, which extracts facial features and the features of the facial motion, storing them for later ID verification.

    The biggest problem they are trying to solve is to make sure the identity verification process is intentional. If someone is unconscious, you can still use their finger to unlock a phone and get access to their device or you can scan their retina. You see this a lot in the movies—think of Ethan Hunt in Mission Impossible even using masks to replicate someone else’s face.

    To get technical, C2FIV relies on an integrated neural network framework to learn facial features and actions concurrently. This framework models dynamic, sequential data like facial motions, where all the frames in a recording have to be considered (unlike a static photo with a figure that can be outlined).

    Using this integrated neural network framework, the user’s facial features and movements are embedded and stored on a server or in an embedded device and when they later attempt to gain access, the computer compares the newly generated embedding to the stored one. That user’s ID is verified if the new and stored embeddings match at a certain threshold.

    In their preliminary study, they recorded 8,000 video clips from 50 subjects making facial movements such as blinking, dropping their jaw, smiling, or raising their eyebrows as well as many random facial motions to train the neural network. They then created a dataset of positive and negative pairs of facial motions and inputted higher scores for the positive pairs (those that matched). Currently, with the small dataset, the trained neural network verifies identities with over 90% accuracy. They are confident the accuracy can be much higher with a larger dataset and improvements on the network.

    The idea is not to compete with Apple or have the application be all about smartphone access. In this opinion, C2FIV has broader applications, including accessing restricted areas at a workplace, online banking, ATM use, safe deposit box access, or even hotel room entry or keyless entry/access to your vehicle.

    ELE Times News
    ELE Times Newshttps://www.eletimes.ai/
    ELE Times provides extensive global coverage of Electronics, Technology, and the Market. In addition to providing in-depth articles, ELE Times attracts the industry’s largest, qualified, and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build experience, drive traffic, communicate your contributions to the right audience, generate leads, and market your products favorably.

    Related News

    Must Read

    Arrow Electronics and Infineon introduce 240W USB-C PD 3.2 reference design for battery-powered motor control applications

    Arrow Electronics and Infineon Technologies AG have announced REF_ARIF240GaN, a...

    Robotics Engineering: The Architectural Evolution Behind IT–OT Convergence

    Factories today operate as dense mechanical ecosystems, whether in...

    How AI Is Transforming Network Protocol Testing in Software-Defined Networks?

    As enterprises accelerate toward cloud-native infrastructure, edge computing, and...

    What is Fashion Tech? Providing New Product Value and Customer Experiences with Technology

    Courtesy: Murata Electronics What is fashion tech? - diverse technologies...

    Emergency Screaming Detection: How AI Recognizes Human Screams and Saves Lives

    Courtesy: Renesas Detecting human screams for help is important in...

    India’s Electronics Push: Ambition Is Clear. Execution Will Decide the Outcome

    India’s electronics story has entered a decisive phase. The...

    India on the Road to Semicon Self-Reliance with Three More Plants

    India to welcome three more semiconductor plants after PM...

    Upcoming years to Bring Boom for Semiconductors and Electronics

    Union Minister for Electronics and Information Technology Ashwini Vaishnaw...

    R&S Propels 6G Readiness With FR1–FR3 Carrier Demonstration

    Rohde & Schwarz and Qualcomm Technologies, Inc. have reached...

    ROHM and Suchi Semicon Establish a Strategic Semicon Manufacturing Partnership in India

    ROHM and Suchi Semicon have announced the establishment of...