M_Anwar

advertisement
Anwar 1
Muhammad Anwar
Mrs. Ali
Computers 10
15th September 2013
Face Recognition
Criterion A:
A facial recognition system is a basic computer application that identifies or verifies a
specific person by taking a digital image or a video frame. It does this by recognizing the
facial expression and details to identify who you really are. It is said to be that facial
recognition is the fastest biometric ever. This type of technology is considered a biometric,
which can also relate to finger recognition (finger scanning) – such as an example on the new
iPhone 5S. We can use facial recognition for everything; to lock your phone, protect your
own identity, to keep anyone away from your personal information, and etc. Some of the
social and ethical issues of the system is that there could not be any privacy of the individual
– security of data and information – as well as erosion of privacy from linking databases for
analysis. The stakeholders are the people (producers) that actually make the system for
people to use. The government use this system to keep everything safe, supermarkets in the
U.K use this system to tell from the buyer if they are old enough to buy cigarettes or alcohol.
The stakeholders can be affected if hackers can start hacking through the system and act like
they’re old enough to buy something or go into important information.
Biometrics is the technology of authenticating a person’s identity by verifying a
personal characteristic. Biometric devices grant users access to programs, systems, or rooms
by analyzing some biometric identifier (Schmidt 54 – 62). A biometric identifier is a physical
or behavioral characteristic. Examples include fingerprints facial features, hand geometry,
voice patterns, signatures, and eye patterns. In this case, we are talking about facial
recognition.
“A biometric device translates a personal characteristic into a digital code that
is compared with a digital code stored in the computer. If the digital code in
Anwar 2
the computer does not match the personal characteristic’s code, the computer
denies access to the individual (Carter).”
Criterion B:
The basic inputs of the system is still image and video stream. The outputs of the
system is the actual victim him/herself. The way that facial recognition works is that there are
four steps. In the first step, the camera or the video stream from the system, must first find the
face of the victim. Then in step two, the system detects the face position of the victim and
calculates that distance between the nose and eyes, and the nose and mouth and many other
parts on your face. In step three, the system then tries to find other aspects that are displaced
on your face, to get more detail on who your identity is. In the fourth step, the system then
sends the information to a data base with a specific algorithm that then decides whether the
victim is old/young or male/female. The diagram below also explains the process of facial
recognition.
https://developer.tizen.org/help/topic/org.tizen.native.appprogramming/html/images/uix_face_detector_recognizer_apis.png
Anwar 3
Criterion C:
Some of the impacts and issues that the system has on the society is identity theft.
One of the major issues of the system is that the system can bring up many different files on
yourself or other people that are innocent and don’t want to be robbed or jumped by the
person that is looking through your files. Another aspect that can be considered as a social or
ethical issue is the privacy of the individual – security of data and information or even the
erosion of privacy from linking databases for analysis. But the most social and ethical issue
that affects the entire system is, Identity Theft. Identity theft can have two sides, the
disadvantages and the advantages. Some of the obvious disadvantages is that, anyone who
tries to hack your identity, can grant access through all your files, history, and many personal
information such as your credit card number or copying your passport and trying to cover up
there identity by taking yours. But yet there could still be some advantages to Identity Theft.
Some of which, is that the person that gets there identity stolen can get a fresh start and have
their life erased or getting your identity stolen can also let you become more responsible on
how to keep your information and identity safe and to teach you a lesson.
Criterion D:
There could be many solutions towards Identity theft, especially since there are more
than 47 different types of identity theft including, identity cloning, credit ID theft, medical ID
theft, employee ID theft, tax ID theft, and etc. All these still happen a lot more often now a
days.
“Integrated and dynamic identity theft solutions are necessary to address many
of today’s identity theft challenges such as identity crimes, data security
breaches and disclosure of personal information….. The personal information
lifecycle presents many phases which if not properly managed can lead to
identity obesity as well as security and privacy disasters requiring identity
protection solutions….. Integrated identity theft solutions and identity
protection services can provide a full protection of personal information
through proper risk assessment, gap analysis, implementation of controls
where needed, monitoring, awareness and training. A complete identity
protection is needed to prevent identity theft, data loss and disclosure, as well
as detect and resolve identity fraud on a timely basis (Copyright © 2006-2013
by Henrix LLC legal notice).”
Anwar 4
In essence, we can help stop our identity being stolen by managing our stuff and always
updating our record information and maybe even apply a fire wall to your information and all
your records so that no one would be able to steal you identity. A Firewall basically helps
protect your computer and keeps any destructive forces away from your property. A different
way to solve identity theft is that if you had your credit card hacked or other personal
information that was accessed, some companies can be forced to be disclosed, or force financial
institutions to enhance their authentication procedures. But sometimes these solutions don’t
help. Sometimes criminals imitate or mimic legitimate users to financial institutions. That
means that if you wanted to solve this problem any solution can’t involve the account holders.
There is no final solution to identity theft but there will be one solution that is a combination
of all types of different solutions to solve this problem.
Anwar 5
Citations
"Artec Group: Walk through Identification." - Artecid.com. N.P., N.D. Web. 17 Oct. 2013.
<http://www.artecid.com/?gclid=CPi5wofjnboCFYy_3godkjsAWA>.
Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. 3rd ed. Upper
Saddle River, NJ: Prentice Hall, 1997. Print. Pg. 112, 287, 297-298.
Carter, Donnell W., and Louis C. Juarez. Securing Confidential Data Entered into a
Computer. Boston: Thomas Publishing, 2005.
Computers and Biometrics. Shelly Cashman Series®. Course Technology. 3 Oct. 2005.
http://www.scsite.com/wd2003/pr2/wc.htm.
"Facial Recognition." FindBIOMETRICS. N.P., N.D. Web. 16 Sept. 2013.
<http://findbiometrics.com/solutions/facial-recognition/>.
"Facial Recognition System." Wikipedia. Wikimedia Foundation, 13 Sept. 2013. Web. 16
Sept. 2013. <http://en.wikipedia.org/wiki/Facial_recognition_system>.
Henrix. "Identity Theft Solutions." Identity Theft Solutions. Identity Management Institute,
2006. Web. 16 Oct. 2013. <http://www.identity-theft-awareness.com/identity-theftsolutions.html>.
"How Do Facial Recognition Programs Work?" Computer Vision. N.P., N.D. Web. 21 Sept.
2013. <http://stackoverflow.com/questions/4978630/how-do-facial-recognitionprograms-work>.
"How Firewalls Work." HowStuffWorks. N.P., N.D. Web. 17 Oct. 2013.
<http://www.howstuffworks.com/firewall.htm>.
"ID Theft Solutions USA - Home Page." ID Theft Solutions USA - Home Page. N.P., N.D.
Web. 17 Oct. 2013. <http://www.idtheftsolutionsusa.com/>.
Schmidt, Karl J. “Biometrics and Authenticating Computer Users.” Computers and the
Internet Aug. 2005: 54-62.
Anwar 6
Schneier, Bruce. "Solving Identity Theft." Forbes. Forbes Magazine, N.D. Web. 17 Oct.
2013. <http://www.forbes.com/2007/01/19/identity-theft-security-tech-securitycz_bs_0122identity.html>.
"What Is Face Detection and Recognition Clock in System with Access Attendance Machine
Facial Timesheets and Time in Software on Attendance Tracking Programs
Dubai."What Is Face Detection and Recognition Clock in System with Access
Attendance Machine Facial Timesheets and Time in Software on Attendance Tracking
Programs Dubai. N.P., N.D. Web. 15 Sept. 2013.
<http://www.heyce.com/pro009.php?id=41>.
Download