Is a face a face or a fake?

March 2018 Editor's Choice, Access Control & Identity Management, Integrated Solutions

Apple recently released its most ambitious product, the iPhone X, in celebration of the 10th anniversary of the release of the first iPhone. The iPhone X especially stands out with its introduction of Face ID, a face recognition technology to replace the fingerprint recognition (Touch ID).

According to Apple, Face ID will recognise a user’s face incorrectly only once in 1 million times, an immense improvement over the once in 50 000 times probability of Touch ID.

However, authentication through face recognition is actually as prone to spoofing as fingerprint-based methods. The press was quick to point out after Face ID was announced that it would be easy to recreate through 3D rendering the faces of well-known politicians or actors that are often exposed in photos or videos as there is a great amount of data available on them. 3D printers, which are used to build face structures, are also no longer hard to find. They can be commonly found in online shopping malls.

To prove such spoofing is possible, Bkav, a security company based in Vietnam succeeded in spoofing Face ID with a face mask it created. The mask’s face structure was created using a plastic mask and silicon, and an additional application of paper and makeup was enough to bypass authentication.

Then what about Suprema’s FaceStation 2, which also authenticates users with face recognition? Is its security also vulnerable to similar methods?

Advanced face recognition technology

FaceStation 2’s face recognition method functions differently from the iPhone X’s. The mask Bkav used to spoof Face ID has eyes, a nose, and a mouth constructed to resemble an actual person’s, but the remaining parts of the face are made of plastic. Through this information, it can be inferred that Face ID uses 3D modelling data and True Depth technology in its authentication process.

FaceStation 2, on the other hand, not only uses 140 near-infrared (NIR) LEDs to extract 3D modelling data, but also uses an algorithm to produce various numerical values from the infrared light reflected off the face. These values include those related to skin tone and skin texture values, which are helpful in distinguishing between similar faces. This special hardware and algorithm render the mask built by Bkav useless when tested against FaceStation 2’s authentication system.

FaceStation 2 also uses a matching score when executing face recognition. The matching score is a calculation of the match between a pre-registered face template and the actual face to be authenticated. The score helps guard FaceStation 2 against spoofing, as a low value is produced if the mask used in spoofing does not use a 3D model that exactly matches the actual face.

FaceStation 2 was recognised for its technological advancement at the 2017 Detektor International Awards, and was awarded the Best Product Award in the ID & Access category.

FaceStation 2 combines Suprema’s most advanced algorithm and hardware to provide a new contactless authentication experience, with a greater variety of features and increased performance.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
Intelligent analytics and the brains to match
September 2019, Bosch Building Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What if the brains behind our security cameras could be trained to improve their cognitive ability to pay attention, learn, and problem-solve according to specific rules and situations?

Read more...
AI-powered autonomous Drone-in-a-Box
September 2019 , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Organisations in the mining, energy and industrial, oil and gas, ports and terminals sectors can optimise security and business operations, whilst reducing risks and operational costs

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
Visitor management for estates
Access & Identity Management Handbook 2020, Powell Tronics , Residential Estate (Industry), Access Control & Identity Management
Residential estates and business parks around South Africa have installed access control systems that aim to streamline access for both pedestrians and vehicular traffic.

Read more...
2020 Residential Estate Security Conference in KZN
November 2019, Technews Publishing , Editor's Choice
Meeting the residential security challenges in 2020 and beyond: Hi-Tech Security Solutions will host the Residential Estate Security Conference 2020 in Durban on 12 March 2020.

Read more...
Sentian secures funding from Imfezeko
November 2019, Sentian , Editor's Choice
Cape Town based smart security technology developer Sentian has recently secured a round of funding from Imfezeko Investment Holdings.

Read more...
A brighter future
November 2019, NEC XON, Technews Publishing , Editor's Choice
NEC XON hosted its annual summit in October 2019 at Sun City under the banner of ‘Orchestrating a Brighter World’.

Read more...