A comprehensive survey on techniques to handle face identity threats: challenges and opportunities

被引:24
|
作者
Rusia, Mayank Kumar [1 ]
Singh, Dushyant Kumar [1 ]
机构
[1] MNNIT Allahabad, CSED, Prayagraj, Uttar Pradesh, India
关键词
Biometrics; Face recognition; Authentication; Computer vision; Machine learning; Deep learning; Image processing; FACIAL EXPRESSION RECOGNITION; PRESENTATION ATTACK DETECTION; SINGULAR-VALUE DECOMPOSITION; PLASTIC-SURGERY; OCCLUSION DETECTION; LANDMARK DETECTION; SPOOFING DETECTION; FUSION; 3D; FEATURES;
D O I
10.1007/s11042-022-13248-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The human face is considered the prime entity in recognizing a person's identity in our society. Henceforth, the importance of face recognition systems is growing higher for many applications. Facial recognition systems are in huge demand, next to fingerprint-based systems. Face-biometric has a highly dominant role in various applications such as border surveillance, forensic investigations, crime detection, access management systems, information security, and many more. Facial recognition systems deliver highly meticulous results in every of these application domains. However, the face identity threats are evenly growing at the same rate and posing severe concerns on the use of face-biometrics. This paper significantly explores all types of face recognition techniques, their accountable challenges, and threats to face-biometric-based identity recognition. This survey paper proposes a novel taxonomy to represent potential face identity threats. These threats are described, considering their impact on the facial recognition system. State-of-the-art approaches available in the literature are discussed here to mitigate the impact of the identified threats. This paper provides a comparative analysis of countermeasure techniques focusing on their performance on different face datasets for each identified threat. This paper also highlights the characteristics of the benchmark face datasets representing unconstrained scenarios. In addition, we also discuss research gaps and future opportunities to tackle the facial identity threats for the information of researchers and readers.
引用
收藏
页码:1669 / 1748
页数:80
相关论文
共 50 条
  • [31] Survey of Image Processing Techniques for Brain Pathology Diagnosis: Challenges and Opportunities
    Cenek, Martin
    Hu, Masa
    York, Gerald
    Dahl, Spencer
    FRONTIERS IN ROBOTICS AND AI, 2018, 5
  • [32] A Contemporary Survey of Multimodal Presentation Attack Detection Techniques: Challenges and Opportunities
    Kavita
    Walia G.S.
    Rohilla R.
    SN Computer Science, 2021, 2 (1)
  • [33] Opportunities, Threats Face NPs As Congress Deals with Deficits
    Mason, Dave
    JNP-JOURNAL FOR NURSE PRACTITIONERS, 2013, 9 (03): : A17 - A17
  • [34] A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities
    Song, Yisheng
    Wang, Ting
    Cai, Puyu
    Mondal, Subrota K.
    Sahoo, Jyoti Prakash
    ACM COMPUTING SURVEYS, 2023, 55 (13S)
  • [35] A comprehensive survey of Federated Intrusion Detection Systems: Techniques, challenges and solutions
    Makris, Ioannis
    Karampasi, Aikaterini
    Radoglou-Grammatikis, Panagiotis
    Episkopos, Nikolaos
    Iturbe, Eider
    Rios, Erkuden
    Piperigkos, Nikos
    Lalos, Aris
    Xenakis, Christos
    Lagkas, Thomas
    Argyriou, Vasileios
    Sarigiannidis, Panagiotis
    COMPUTER SCIENCE REVIEW, 2025, 56
  • [36] A comprehensive survey of edge prediction in social networks: Techniques, parameters and challenges
    Pandey, Babita
    Bhanodia, Praveen Kumar
    Khamparia, Aditya
    Pandey, Devendra Kumar
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 124 : 164 - 181
  • [37] A Comprehensive Survey to Face Hallucination
    Wang, Nannan
    Tao, Dacheng
    Gao, Xinbo
    Li, Xuelong
    Li, Jie
    INTERNATIONAL JOURNAL OF COMPUTER VISION, 2014, 106 (01) : 9 - 30
  • [38] A Comprehensive Survey to Face Hallucination
    Nannan Wang
    Dacheng Tao
    Xinbo Gao
    Xuelong Li
    Jie Li
    International Journal of Computer Vision, 2014, 106 : 9 - 30
  • [39] Virtualization Techniques: Challenges and Opportunities
    Bouali, Lyes
    Abd-Elrahman, Emad
    Afifi, Hossam
    Bouzefrane, Samia
    Daoui, Mehammed
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING (MSPN 2016), 2016, 10026 : 49 - 62
  • [40] Chinese engineers face challenges, opportunities
    Ma, TF
    Liu, H
    ELECTRONIC DESIGN, 1999, 47 (01) : 114 - 116