Dependable identity recognition and authorization based on visual information
Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the id...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-11-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020293/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841528916694532096 |
---|---|
author | Chunlei PENG Xinbo GAO Nannan WANG Jie LI |
author_facet | Chunlei PENG Xinbo GAO Nannan WANG Jie LI |
author_sort | Chunlei PENG |
collection | DOAJ |
description | Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented. |
format | Article |
id | doaj-art-15f9dc4a276f4aa898ce949d5553bd1a |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-11-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-15f9dc4a276f4aa898ce949d5553bd1a2025-01-15T03:32:02ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-11-013611759813090Dependable identity recognition and authorization based on visual informationChunlei PENGXinbo GAONannan WANGJie LIRecently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020293/identity recognitionvisual informationdependable recognitionidentity anonymization |
spellingShingle | Chunlei PENG Xinbo GAO Nannan WANG Jie LI Dependable identity recognition and authorization based on visual information Dianxin kexue identity recognition visual information dependable recognition identity anonymization |
title | Dependable identity recognition and authorization based on visual information |
title_full | Dependable identity recognition and authorization based on visual information |
title_fullStr | Dependable identity recognition and authorization based on visual information |
title_full_unstemmed | Dependable identity recognition and authorization based on visual information |
title_short | Dependable identity recognition and authorization based on visual information |
title_sort | dependable identity recognition and authorization based on visual information |
topic | identity recognition visual information dependable recognition identity anonymization |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020293/ |
work_keys_str_mv | AT chunleipeng dependableidentityrecognitionandauthorizationbasedonvisualinformation AT xinbogao dependableidentityrecognitionandauthorizationbasedonvisualinformation AT nannanwang dependableidentityrecognitionandauthorizationbasedonvisualinformation AT jieli dependableidentityrecognitionandauthorizationbasedonvisualinformation |