We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byRonald Dack
Modified over 2 years ago
Face Processing in Social Networking Services NTIA Privacy Multistakeholder Process: Commercial Facial Recognition Technology March 25, 2014 Olga Raskin Manager, Identity Research Copyright © 2014 IBG, A Novetta Solutions Company
Copyright © 2014 IBG, A Novetta Solutions Company – 2 IBG has conducted independent biometric testing since 1996 Hundreds of thousands of man-hours in biometric research, design, and integration (e.g. fingerprint, face, iris recognition) Expertise in emerging modalities, sensors, and software Cutting-edge expertise in virtual, online, and electronic identity technologies, concepts, and platforms Extensive commercial and government customer base IBG at a Glance
Copyright © 2014 IBG, A Novetta Solutions Company – 3 IBG evaluates online face processing technologies, capabilities, and performance While online face processing is the largest commercial use of biometrics, its performance and capabilities are not well-understood Background
Copyright © 2014 IBG, A Novetta Solutions Company – 4 Face Processing Functions Detection –Automated location of one or more faces in an image Cropping –Extraction and presentation of an image’s facial region Recognition –Search of a face image against enrolled face images to identify potential matches Grouping –Automated organization of face images into sets based on appearance similarity Tagging –Automated or facilitated process of assigning names to faces in online photos
Copyright © 2014 IBG, A Novetta Solutions Company – 5 Face Processing Myth: Image Quality Myth Face recognition requires high-quality images Reality SNS face processing systems can detect and match low-quality faces Profiles, faces with low inter-ocular distance, bad lighting Faces acquired through different classes of camera Future Matching and detection technologies should continue to improve (though other factors are involved)
Copyright © 2014 IBG, A Novetta Solutions Company – 6 Face Processing Myth: Online Face Searches Myth You can conduct a “global” face search against the whole Internet Reality No, you cannot Most online face images are not searchable (private, not shared) Searches are within one’s contacts / friends Sites that offer 1:N searches against public images lack identity data Future Facebook, Google have shown no interest in enabling open searches Other entities are surely saving every public and/or accessible face image for future use
Copyright © 2014 IBG, A Novetta Solutions Company – 7 Relevant Face Processing Technologies Facebook –By far the largest “consumer” usage of biometrics –Rich social graph available to deliver improved tag suggestions Google+ –Google's SNS, for which face processing was activated in December 2011 –Potential for expansion of face processing to services such as search, Android, location, and YouTube PittPatt –Founded in 2004 by members of the Carnegie Mellon University Robotics Institute –Acquired by Google in 2011; no longer in development –Used by government agencies to process low-quality images
Copyright © 2014 IBG, A Novetta Solutions Company – 8 Milestones in Online Face Processing
Copyright © 2014 IBG, A Novetta Solutions Company – 9 Dataset Processing IBG created software that automates photo submission and results parsing for and Facebook / Google+ –Otherwise the process is manual, burdensome, and error-prone SOCIAL-ID: photos collected by IBG as well as from public sources SOCIAL-GT: customized testing software that interacts with online face processing sites and services; used by analysts for adjudication
Copyright © 2014 IBG, A Novetta Solutions Company – 10 Face Grouping Performance Correct grouping rates are similar for the three services PittPatt has a slightly lower error rate than Facebook or Google+ For datasets with a pronounced primary identity, approximately 19 out of 20 groupings will be correct
Copyright © 2014 IBG, A Novetta Solutions Company – 11 Face Grouping Performance Google+ correctly groups 500-600 more Primary Subject faces than PittPatt and Facebook, respectively, while incorrectly grouping only 60-70 more faces
Copyright © 2014 IBG, A Novetta Solutions Company – 12 Conclusions Searches are predominantly in-network Online face processing services can achieve correct grouping rates above 90% on challenging images –Not reliant on frontal poses, neutral expressions, even illumination, etc. Online face processing is improving –Algorithms may be tuned based on user input (e.g. tagging/grouping confirmations) –Possible enhancements to core face processing technologies
Copyright © 2014 IBG, A Novetta Solutions Company – 13 Contact Information Olga Raskin IBG, A Novetta Solutions Company email@example.com
Dr. Marc Valliant, VP & CTO
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
1 05 December 2008 Still Face Challenge Problem Multiple Biometric Grand Challenge Preliminary Results of Version 1.
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
Yahoo! Acquires Inktomi March 19 th, Yahoo!
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
$18.75 /seat Multi-seat Computer System with Audio Integration George & Vickie Rock Design Team 4 Spring 2010 MSU Brings the Internet to Africa Design.
Compiled by Celeste The following slides are DIRECT QUOTE from source: R. Kelly Rainer, Jr. & Hugh Watson, (2012). Management Information Systems, John.
1 Copyright © 2008 Accenture All Rights Reserved. U.S. Insurance Company Mergers & Acquisitions Services; Product/Policy/Billing Trans Services Client.
Biometrics: Ear Recognition
Large-Scale Cost-sensitive Online Social Network Profile Linkage.
10 Privacy Settings Every Facebook User Should Know.
CONCRETE SOFTWARE SOLUTIONS PVT. LTD. A leading Digital Marketing Firm In India.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
WEB 2.0 PATTERNS Carolina Marin. Content Introduction The Participation-Collaboration Pattern The Collaborative Tagging Pattern.
THE BUSINESS RESEARCH COMPANY TECHNOLOGY CASE STUDIES.
05 December 2008 Video Challenge Problem Multiple Biometric Grand Challenge Preliminary Results of Version 1.
Interactive Mirror System based on Personal Purchase Information Donghyun Kim 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim * 1,* Dept of.
SNS Marketing By Chloe Jefferson TCOM What is SNS Marketing? Social networking site marketing is the process of gaining website traffic or attention.
Facial Recognition https://store.theartofservice.com/the-facial-recognition-toolkit.html.
FROM SOCIAL TO EDUCATION USES By: Elite Educators.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Social Media & The Chaplain. Social Media Social Media Is Consumer generated media it is media that is designed to be shared, sharing means that it is.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
OUTLINE I.Biometrics: What Is It? II.Why Ear Biometrics? III.Ear Biometrics IV.How A Biometric System Works V.Conclusion.
What does it mean to us?. History Biometrics Defined Modern Day Applications Spoofing Future of Biometrics.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Presented By Bhargav (08BQ1A0435). Images play an important role in todays information because A single image represents a thousand words. Google's.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Christine Laham, Fahed Abdu, David Dezano,Shelly Kim.
At a glance… Introduction How Biometric Systems Work ? Popular Biometric Methodologies Multibiometrics Applications Benefits Demerits
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Socialize Your Brand & Connect With Real People Social Media Optimization.
Karthiknathan Srinivasan Sanchit Aggarwal
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Big Data: Every Word Managing Data Data Mining TerminologyData Collection CrowdsourcingSecurity & Validation Universal Translation Monolingual Dictionaries.
Training course “Stay Tuned Online” Djakovo, Croatia of September 2015 #StayTunedOnline
By: Brad Brosig. Introduction Types of Biometric Security The Installation Process Biometric Authentication Errors The Necessity of Mobile Device.
Use of Electronic and Internet advertising options Standard 3.4.
Creating and Protecting your Personal Brand with Social Media ISM FLORIDA GULF COAST April 18, 2013
Big Data Privacy Issues in Public Social Media Reporter ： Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Mining Discriminative Components With Low-Rank and Sparsity Constraints for Face Recognition Qiang Zhang, Baoxin Li Computer Science and Engineering Arizona.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
MOODLE IS A COURSE MANAGEMENT SYSTEM DESIGNED TO HELP EDUCATORS WHO WANT TO CREATE QUALITY ONLINE COURSES. THE SOFTWARE IS USED ALL OVER THE WORLD BY UNIVERSITIES,
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
© 2017 SlidePlayer.com Inc. All rights reserved.