Dependable identity recognition and authorization based on visual information

Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the id...

Full description

Saved in:
Bibliographic Details
Main Authors: Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020293/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841528916694532096
author Chunlei PENG
Xinbo GAO
Nannan WANG
Jie LI
author_facet Chunlei PENG
Xinbo GAO
Nannan WANG
Jie LI
author_sort Chunlei PENG
collection DOAJ
description Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.
format Article
id doaj-art-15f9dc4a276f4aa898ce949d5553bd1a
institution Kabale University
issn 1000-0801
language zho
publishDate 2020-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-15f9dc4a276f4aa898ce949d5553bd1a2025-01-15T03:32:02ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-11-013611759813090Dependable identity recognition and authorization based on visual informationChunlei PENGXinbo GAONannan WANGJie LIRecently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020293/identity recognitionvisual informationdependable recognitionidentity anonymization
spellingShingle Chunlei PENG
Xinbo GAO
Nannan WANG
Jie LI
Dependable identity recognition and authorization based on visual information
Dianxin kexue
identity recognition
visual information
dependable recognition
identity anonymization
title Dependable identity recognition and authorization based on visual information
title_full Dependable identity recognition and authorization based on visual information
title_fullStr Dependable identity recognition and authorization based on visual information
title_full_unstemmed Dependable identity recognition and authorization based on visual information
title_short Dependable identity recognition and authorization based on visual information
title_sort dependable identity recognition and authorization based on visual information
topic identity recognition
visual information
dependable recognition
identity anonymization
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020293/
work_keys_str_mv AT chunleipeng dependableidentityrecognitionandauthorizationbasedonvisualinformation
AT xinbogao dependableidentityrecognitionandauthorizationbasedonvisualinformation
AT nannanwang dependableidentityrecognitionandauthorizationbasedonvisualinformation
AT jieli dependableidentityrecognitionandauthorizationbasedonvisualinformation