Telecommunications Science ›› 2020, Vol. 36 ›› Issue (11): 1-17.doi: 10.11959/j.issn.1000-0801.2020293

• Comprehensive Review •     Next Articles

Dependable identity recognition and authorization based on visual information

Chunlei PENG1,Xinbo GAO2(),Nannan WANG1,Jie LI1   

  1. 1 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
    2 Chongqing Key Laboratory of Image Cognition,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
  • Revised:2020-11-10 Online:2020-11-20 Published:2020-12-09
  • Supported by:
    The National Key Research and Development Program of China(2016QY01W0200);The National Key Research and Development Program of China(2018AAA0103202);The National Natural Science Foundation of China(61806152);The Key Research and Development Program of Shaanxi(2020ZDLGY08-08);The Natural Science Basic Research Plan in Shaanxi Province of China(2019JM-289)

Abstract:

Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.

Key words: identity recognition, visual information, dependable recognition, identity anonymization

CLC Number: 

No Suggested Reading articles found!