Spoof: A barrier to the acceptance of Facial Recognition Systems

Innovative Technology Ltd •  11 November 2020

By Dr. Andrew O’Brien
ICU Product Manager
November 2020


The use of biometrics and facial recognition software to identify and verify individuals is being rapidly deployed and becoming commonplace across a wide range of industries. Despite some unease in terms of consumer privacy, overall, it has the potential to positivity transform our everyday lives and can bring advanced security benefits with improved accuracy, speed and contactless interaction.


Biometrics: the growth of Neural Networks

Biometrics use an individual’s unique biological characteristics to verify identity. Different biometric techniques include using fingerprints, faces, iris scanning, voice analysis and so on. Biometrics has the potential to be far more secure than the use of traditional identification techniques such as paper ID, pin numbers or RF Identification. The evolution of Artificial Intelligence (AI), in particular the growing sophistication of Neural Networks, has enabled the practical implementation of Facial Recognition across numerous applications.

The inevitable growth in the use of facial features to determine identification and estimate age requires that providers of the technology both understand and respond to the threats and attempts to spoof the technique.


A neural network is a series of algorithms that endeavours to recognise underlying relationships in a set of data through a process that mimics the way the human brain operates. In this sense, neural networks refer to systems of neurons, either organic or artificial in nature. Source: Investopedia


The importance of spoof detection

Spoofing is a type of presentation attack which tries to defeat or interfere with the biometric identification process. As biometric systems are being more widely used in real-world applications, presentation attacks or spoofs are becoming a larger threat to organisations. Fraudsters use various techniques to try and impersonate other people. For example, for facial recognition, they could hold up a photograph to try and impersonate someone or even use a video or photograph on a mobile device. More sophisticated ways to trick systems are being used such as a replay or video attack. This involves a looped video of a face which means that behaviour and facial expressions look real and not fake.


Cooperative or Intrusive Spoof:

Cooperative spoof is one of the first attempts to determine the liveness of a subject. Liveness detection is any technique used to identify a spoof attempt using algorithms to detect indicators which monitor if the person is ‘live’ or ‘fake’. This solution requires participation from the user or subject who would need to perform an action to be identified. The subject will be issued a series of random commands or prompts designed to be not easily replicated with a spoof. These instructions may be a determination of pose (look left/right/up/down) and/or emotive response (smile broadly). Their response will be monitored to determine if the subject is correctly responding to determine liveness. If the user reacts correctly then the process can proceed. If the user fails to correctly response, then a spoof alert can be raised. This approach does impact on the user experience and speed of transaction as it requires involvement, but it can be quite effective in determining spoof attempts.


In biometrics, Liveness Detection is an AI computer system’s ability to determine that it is interfacing with a physically present human being and not an inanimate spoof artifact. Source: www.liveness.com


Passive or Non-intrusive Spoof:

From a customer experience point of view non-intrusive spoof is a far more attractive option. This requires no conscious participation of the subject or user throughout the transaction. This results in a far quicker and far superior experience for the user during the transaction. However, it is a far greater challenge to implement such an approach.


ICU – Intelligent Identification

ICU is our intelligent facial recognition and age verification device which transforms a simple USB camera into a complete solution to verify authorised users/entry; automate restricted access or allow contactless handsfree entry. Utilising our own AI algorithms developed over many years, ICU offers accurate (99.88%), precise and affordable facial recognition. It is easy to integrate and simple to use. Multi-layered spoof detection constantly monitors the user in front of the camera. Our specially trained algorithms can detect photographs and videos/images on mobile devices to prevent fraud attempts. Our spoof detection is non-intrusive and takes place in the background throughout the operation without affecting the user experience. Spoof alerts can be remotely monitored and remotely overridden if determined to be a genuine transaction.


And here is the techie bit. Frames are not treated as independent events, rather they are linked together to form a ‘transaction’. Defining a transaction allows ICU to obtain dynamic information in relation to the user which in turn enhances the power of the ICU device in detecting spoof. A Transaction is defined as the period of time (> 1 frame) that a single user is detected and either an approved action is performed, a spoof is alerted and/or when the same face is no longer detected. The detailed level of data or checks that ICU undergoes when authenticating a face is outlined here:

A transaction is initiated on a Face Detection event. This face is referred to as the Active face. A User Identification Matrix (UIM) is created and populated on each successive frame. Each parameter of the UIM can be utilised in conjunction with every other parameter to determine if the probability that the face is real or an attempted spoof. Our face consistency approach determines if new faces are detected and the nature of this new Imposter (spoof) face, trained algorithms are used to determine pose and other liveness indicators. We have also trained new algorithms to recognise photographs and the presentation of mobile devices. Averaging over several frames can be used to determine outlier events (where a data point that differs significantly from other observations) and reduce the occurrence of inaccurate results. Application aware processes can also be utilised to increase the efficacy of the approach. For example, in an age estimation task, if the Active face is underage and an Imposter face is overage then there is a greater weight to a potential spoof attempt. Similarly, for a exclusion event (where a particular customer is excluded from accessing a product i.e problem gamblers) if the Active face is excluded and the Imposter face is not, then again this presents as a high potential spoof. Having such an approach can aid in the cases of false positives and avoiding interrupting the customer experience to flag a spoof.

We believe that Facial Recognition and the use of the technology has the potential to have a great and positive impact on many sectors of society. Like all new technology there will be inertia to its adaptation due to many legitimate concerns such as data protection and robustness of the approach which we have covered in a previous facial recognition blog here. Legislation surrounding its proper use is necessary from Governing bodies while providers must ensure that the technology is robust and to an extent must work together to ensure that the technology is employed and distributed in a fair, open and trust worthy manner.



Sources

https://blog.innovative-technology.co.uk/facial-recognition-friend-or-foe/
https://www.aware.com/biometric-liveness-detection-spoof-detection/

https://www.liveness.com/

https://medium.com/datadriveninvestor/face-spoof-detection-e0d08fb246ea

http://cvlab.cse.msu.edu/project-face-anti.html

https://www.investopedia.com/terms/n/neuralnetwork.asp

https://rezaid.co.uk/top-5-trends-in-facial-recognition
/

Royal Flush Vape
by Biometrics Team 25 January 2024
As part of Royal Flush Vape's commitment and dedication in preventing youth access to vaping and vape-related products, they have recently taken the decision to implement Innovative Technology’s (ITL) age estimation technology across their chain of stores in the North West of England.
by Biometrics Team 21 July 2023
The use of biometric technology is an emerging way that retailers have access to invaluable consumer analytics to improve the retail experience. Customer intelligence is vital for retailers to see the type of customer visiting their stores, to help plan to attract different cohorts into their shop, organise staffing levels – or even determine effectiveness of new marketing drives. Read to discover the critical way consumer analytics, powered by biometric technology, can give retailers a more cohesive way to use customer intelligence. What can we learn from consumer analytics? Biometric data including estimated gender and age can be used to generate anonymous demographic data while maintaining customers’ privacy. The data can then be analysed to categorise consumer groups and analyse the effectiveness of targeting market campaigns to help continuously improve segmentation and refine marketing drives. This information enhances the understanding of customer habits and gives retailers more knowledge about customer-centric activities. For example, you may learn when women are more likely to shop, so you can tailor messaging or adverts on display at a certain time to provide a more relevant in-store experience. Innovative Technology has developed MyCheckr , an all-in-one device that anonymously captures consumer analytics without violating an individual’s privacy. Our analytics function enables retailers to see what customers are on their premises, categorise them into appropriate demographics and predict the timings they shop, helping business owners to tailor marketing campaigns accordingly. Not only do our devices help retain customer loyalty, but they can also help attract different cohorts. Being aware of timings in which customers shop is also helpful for scheduling rotas for shift workers effectively. The data may show a surge in customers at specific times and days, and managers can choose to assign more staff during that period to ensure quality customer service and reduced waiting times. Similarly, at times of the day when there are fewer customers, rotas can be planned to involve fewer staff members and reduce unnecessary expenditures. Consumer analytics as a measure of success As well as using biometric data to help you plan marketing strategies and campaigns, it can also be used to help measure the success of them. At Innovative Technology, we develop solutions that not only retrieve the data to help you decide on your next marketing strategy, but also provide answers to whether your efforts have been successful. Say, for example, that you’ve noticed fewer people aged 25-35 in your premises, and you’ve implemented a campaign to encourage more of this demographic. You’ll be able to tell whether your campaign is working by measuring if more 25-35 year olds are coming through your doors. You can then tailor the campaign accordingly, using consumer analytics as a continuous measure of how the activity is performing. An easy integration MyCheckr is a standalone device which requires no integration, simply plug in and get started straight away. The device processes data locally with instant results, without storing any information, so customer privacy is never at risk. No internet is required with all functions available offline, and there are no hidden costs or subscriptions. The new analytical features available on MyCheckr are intended to help retailers discover more about their customers in a completely anonymous way, ensuring that both parties are benefiting from the arrangement - customers know their data is protected, and businesses are able to drive marketing with AI-based consumer analytics. For further information, see our full range of products .
by Biometrics Team 10 July 2023
Innovative Technology have developed a biometric solution that brings a different type of sophistication to digital adverting at an affordable price.
person using current exchange machine
by Biometrics Team 4 July 2023
Discover how biometric technology is paving the way for AML and Player Protection compliance.
by Biometrics Team 3 July 2023
Vaping has seen a large surge in popularity in many countries over the past few years, with teenage use accelerating at an alarming rate. In the UK, a recent Serve Legal survey found a massive 42% of respondents had tried a vape before turning 18. Shops selling vapes to children under the legal age without conducting appropriate and effective age checks is a huge contributing factor. The latest biometric technology from Innovative Technology (ITL) can support retailers with the necessary tools to ensure accurate age checks are in place. Commenting on ITL’s age estimation technology, Dr Andrew O'Brien, Product Manager – Biometrics said, “Using biometric technology for age checks works by analysing the customer’s facial features to calculate their age. This can automate the age check process and offer servers an added layer of security and confidence when selling age-restricted products. As a society we want to protect the underage from accessing age restricted items, to do so we must support the retailers in performing age checks. Our biometric range of products are designed as tools to assist retailers and make the age check process effective and efficient”.
facial recognition
by biometrics team 30 June 2023
Biometric access control offers an enhanced security system for your business. Read this blog to learn how they work and their benefits.
digital biometric advertising
by Biometrics Team 16 June 2023
From printed ads to biometrically enhanced advertising, learn about the evolution of advertising and where it’s heading next
by Biometrics Team 8 June 2023
An in-depth look at how biometric technology can support the age check process. Vaping has seen a massive surge in popularity in many countries over the past few years, with teenage use accelerating. Shops selling vapes illegally without conducting appropriate and effective age checks is a contributing factor. This blog discusses just how big the problem is for our younger generation, and how with biometric technology, we can support retailers with the necessary tools to help stem and reverse this disturbing trend.
automated access control
by Biometrics Team 25 May 2023
What is automated access control and how can it open new doors for your business?
More posts
Share by: