The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study

被引:4
作者
Abdul-Al, Mohamed [1 ]
Kumi Kyeremeh, George [1 ]
Qahwaji, Rami [1 ]
Ali, Nazar T. [2 ]
Abd-Alhameed, Raed A. [1 ,3 ]
机构
[1] Univ Bradford, Fac Engn & Digital Technol, Bradford BD7 1DP, England
[2] Khalifa Univ, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
[3] Al Farqadein Univ Coll, Basrah 61004, Iraq
关键词
Face recognition; Biometrics; Security; Accuracy; Feature extraction; Thermal analysis; Surveys; Ethics; Databases; Quantum computing; Facial recognition (FR); multi-modal face recognition; security biometrics; identity verification; Sejong face database; deep learning techniques; convolutional neural networks; cross-modality analysis; visible; infrared; thermal; thermal-visible face recognition; presentation attacks; facial disguises; biometric authentication; dataset analysis; algorithmic advancements; machine learning models; FACE-RECOGNITION; NEURAL-NETWORK; LEVEL FUSION; FUZZY EXTRACTORS; SYSTEMS; DATABASE; SCHEME;
D O I
10.1109/ACCESS.2024.3486552
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This survey provides an insightful overview of recent advancements in facial recognition technology, mainly focusing on multi-modal face recognition and its applications in security biometrics and identity verification. Central to this study is the Sejong Face Database, among other prominent datasets, which facilitates the exploration of intricate aspects of facial recognition, including hidden and heterogeneous face recognition, cross-modality analysis, and thermal-visible face recognition. This paper delves into the challenges of accurately identifying faces under various conditions and disguises, emphasising its significance in security systems and sensitive sectors like banking. The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. The paper also discusses the impact of quantum computing on encryption techniques and the potential of post-quantum cryptographic methods to secure biometric systems. This survey is a critical resource for understanding current research and prospects in biometric authentication, balancing technological advancements with ethical and privacy concerns in an increasingly digital society.
引用
收藏
页码:179010 / 179038
页数:29
相关论文
共 122 条
[1]  
Abdullah M., 2022, PROC IEEE INT C CONS, P1
[2]  
Aggarwal S, 2012, 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P586, DOI 10.1109/PDGC.2012.6449886
[3]   One-Shot Synthetic Disguised Face Generation to improve Robustness against Disguise Attacks [J].
Ahmad, Mobeen ;
Abdullah, Muhammad ;
Han, Dongil .
2022 37TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2022), 2022, :1038-1041
[4]   Generating Synthetic Disguised Faces with Cycle-Consistency Loss and an Automated Filtering Algorithm [J].
Ahmad, Mobeen ;
Cheema, Usman ;
Abdullah, Muhammad ;
Moon, Seungbin ;
Han, Dongil .
MATHEMATICS, 2022, 10 (01)
[5]   Classical and modern face recognition approaches: a complete review [J].
Ali, Waqar ;
Tian, Wenhong ;
Din, Salah Ud ;
Iradukunda, Desire ;
Khan, Abdullah Aman .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (03) :4825-4880
[6]  
Alkadi A. M., 2023, P ADV SCI ENG TECHN, P1
[7]  
Allinson N, 1998, Face Recognition: From Theory to Applications, P446, DOI DOI 10.1007/978-3-642-72201-1_25
[8]  
Alvarez F. H., 2009, P INT C SEC MAN, P1
[9]   A crypto-biometric scheme based on iris-templates with fuzzy extractors [J].
Alvarez Marino, R. ;
Hernandez Alvarez, F. ;
Hernandez Encinas, L. .
INFORMATION SCIENCES, 2012, 195 :91-102
[10]  
[Anonymous], 2009, Postquantum cryptography, DOI 10.1007/978-3-540-88702-74