Face ID Literature Review

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Fac

ID Rauan Kumarbekov
Outline
Heading

Article 1

Article 2

Article 3

Article 4

Article 5

Conclusion

References
Definition:

Heading
Face ID is Apple’s newest form of biometric security. Instead of using a fingerprint,
as with Touch ID, Face ID uses the owner’s face captured using the front-facing
camera on iPhone X and newer devices.
How it works?

(1) Face ID is enabled through a TrueDepth front-facing camera on the iPhone X,


which has multiple components. A Dot Projector projects more than 30,000 invisible
dots onto your face to map its structure.The dot map is then read by an infrared
camera and the structure of your face is relayed to the A11 Bionic chip in the iPhone
X and transformed into a mathematical model. The A11 chip then compares your
facial structure to the facial scan stored in the iPhone X during the setup process.
Creator:
Face id was created by Apple inc. Initially released in November 2017 with
the iPhone X, it has since been updated and introduced to several new iPhone models,
and all iPad Pro models
Make life easier:
The probability that a random person in the
population could look at your iPhone or iPad
Pro and unlock it using Face ID is less than 1
in 1,000,000 with a single enrolled
appearance whether or not you're wearing a
mask
Face ID also adapts to changes in your
appearance over time, so it will continue to
recognize you as you grow a beard or grow
your hair longer. Face ID works with hats,
beards, glasses, scarves, and other accessories
that partially obscure the face. According to
Apple, this is because the A11 Bionic chip in
the iPhone X uses machine learning and a
neural engine to recognize changes in your
appearance
Change:
At the first time, Face Id was not perfect, there
were a lot of bugs, there was a lot of criticism.
But with the release of new versions of

Heading(2)
devices, a lot of things have been fixed. And
now Face Id has improved well
User Perception of Apple’s Face ID (David
Mainenti)
Research problems/questions:
How does facial biometric How do privacy concerns,
authentication functionally specifically related to facial
influence user’s intentions to use biometric authentication,
a particular handheld influence user’s intentions to
smartphone device? use a particular handheld
smartphone device?
Method:
Qualitative research (subject experiment)
240 subjects of all gender
18-24 year old age group

Finding:
This research provide insights on user acceptance, mobile user authentication, and facial recognition technology by
empirically proposing to test its contribution to the user mobile experience. The study consider the variable of privacy
concerns, and explain the effects of new interaction techniques and its potential adoption by users.
INTEGRATING FACE-ID INTO INTERACTIVE PERSON-ID
LEARNING SYSTEM(STEPHAN KONN, HARTWIG HOLZAPFEL,
HAZIM K. EKENEL, ALEX WAIBEL)
Research problems/questions:
To present an approach for extensible person identification based on
visual processing, as one component of an interactive system able to
interactively acquire information about persons

Method:
Qualitative research(exploring ideas and formulating a
theory or hypothesis)

Finding:
The presented method of computing sequence hypotheses
shows significant improvement over single image
hypotheses. Additionally, the face recognition system
provides a sequence confidence which is a reliable measure
for other modules on the robot. Moreover, the system is able
to easily incorporate new samples into its database.
Research problems/questions: Method: Finding:
This work provides insights into Quantitative research(survey) This study shows that age, gender, and
the significance of gender, age, Participants: 4591 culture significantly influence the
education, and culture on the selection of phone unlocking
selection of Face-ID authentication methods in Saudi
Arabia. Saudi females and older Saudis
are less inclined to use Face-ID in
comparison to other authentication
methods. Study observed that there
were differences in usage among the
different regions. For instance, the use
of Face-ID is common in the capital,
but the percentage of Face-ID use
decreases as you move away from the
capital.
FACE ID: A 3D COMPUTER GRAPHICS APPLICATION FOR
FORENSIC MEDICINE(ANURADHA K. MADUGALLA, ROSHAN N. RAJAPAKSE,
ISHARIU. AMARASINGHE, VINAVI H. PADMATHILAKE, ANUJA T.DHARMARATNE, DAMITHA
SANDARUWAN)

Research Method: Finding:


problems/questions: Qualitative research The aim of this research is
• Analyzing Skull to introduce these
• Obtaining the 3D technologies to the local
model of the Skull forensic experts, who are
currently without any means
of conducting a
reconstruction
ADVHAT: REAL-WORLD ADVERSARIAL ATTACK ON ARCFACE
FACE ID SYSTEM(STEPAN KOMKOV, ALEKSANDR PETIUSHKO)

Research Method: Finding:


problems/questions:

This paper propose a novel Qualitative They have proposed a


easily reproducible research(exploring ideas novel method to attack the
technique to attack the best and formulating a Face ID system called
public Face ID system theory or hypothesis) AdvHat. Their method can
ArcFace in different be easily reproducible as
shooting conditions. well as it can efficiently
attack the best public Face
ID model in different
shooting conditions.
Conclusion
All these works are
relevant to this day.
Thanks to them, we Multifunctional
understand that Face
ID
Bright future

Reliable
References:
1. User perceptions of Apple's face id final - researchgate.net. (n.d.). Retrieved October 2, 2022, from
https://www.researchgate.net/profile/David-Mainenti/publication/321795099_User_Perceptions_of_Apple
%27s_Face_ID/links/5a31f871458515afb6d97834/User-Perceptions-of-Apples-Face-ID.pdf
2. Understanding the link between gender, age, and culture with face-ID as ... (n.d.). Retrieved October 2, 2022,
from
https://www.researchgate.net/publication/349144963_Understanding_the_Link_Between_Gender_Age_and_Cult
ure_with_Face-ID_as_Smartphone_Authentication_Method_in_Saudi_Arabia
3. Understanding the link between gender, age, and culture with face-ID as ... (n.d.). Retrieved October 2, 2022,
from
https://www.researchgate.net/publication/349144963_Understanding_the_Link_Between_Gender_Age_and_Cult
ure_with_Face-ID_as_Smartphone_Authentication_Method_in_Saudi_Arabia
4. FaceID: A 3D computer graphic application for Forensic Medicine. (n.d.). Retrieved October 2, 2022, from
https://www.researchgate.net/profile/Roshan-Rajapakse/publication/
306228768_Face_ID_A_3D_Computer_Graphics_Application_for_Forensic_Medicine/links/
583f193f08ae61f75dc788dd/Face-ID-A-3D-Computer-Graphics-Application-for-Forensic-Medicine.pdf
5. AdvHat: Real-world adversarial attack on Arcface Face ID system. (n.d.). Retrieved October 2, 2022, from
https://www.researchgate.net/publication/335395203_AdvHat_Real-
world_adversarial_attack_on_ArcFace_Face_ID_system

You might also like