Loading…
A method for circumventing the biometric identification system based on facial recognition
The article deals with the task of identifying wanted people using two-dimensional face recognition. A potential method for circumventing the recognition system is described. “Potential” in this case means the absence of precedents for the use of the described method in governmental systems. An illu...
Saved in:
Published in: | IOP conference series. Materials Science and Engineering 2021-03, Vol.1069 (1), p.12047 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The article deals with the task of identifying wanted people using two-dimensional face recognition. A potential method for circumventing the recognition system is described. “Potential” in this case means the absence of precedents for the use of the described method in governmental systems. An illustration of the algorithm for implementing a potential method for disrupting the functioning of the reference samples database of the facial recognition system is given. The results of testing the effectiveness of the presented method on the Microsoft Azure platform are presented. The results of the analysis of the modified image for obvious signs of montage are presented. As a result, the conclusion is presented that it is impossible to implement effective and operational protection of the reference samples database from the presented potential method of circumventing the facial recognition system. |
---|---|
ISSN: | 1757-8981 1757-899X |
DOI: | 10.1088/1757-899X/1069/1/012047 |