Is a face a face or a fake?

March 2018 Editor's Choice, Access Control & Identity Management, Integrated Solutions

Apple recently released its most ambitious product, the iPhone X, in celebration of the 10th anniversary of the release of the first iPhone. The iPhone X especially stands out with its introduction of Face ID, a face recognition technology to replace the fingerprint recognition (Touch ID).

According to Apple, Face ID will recognise a user’s face incorrectly only once in 1 million times, an immense improvement over the once in 50 000 times probability of Touch ID.

However, authentication through face recognition is actually as prone to spoofing as fingerprint-based methods. The press was quick to point out after Face ID was announced that it would be easy to recreate through 3D rendering the faces of well-known politicians or actors that are often exposed in photos or videos as there is a great amount of data available on them. 3D printers, which are used to build face structures, are also no longer hard to find. They can be commonly found in online shopping malls.

To prove such spoofing is possible, Bkav, a security company based in Vietnam succeeded in spoofing Face ID with a face mask it created. The mask’s face structure was created using a plastic mask and silicon, and an additional application of paper and makeup was enough to bypass authentication.

Then what about Suprema’s FaceStation 2, which also authenticates users with face recognition? Is its security also vulnerable to similar methods?

Advanced face recognition technology

FaceStation 2’s face recognition method functions differently from the iPhone X’s. The mask Bkav used to spoof Face ID has eyes, a nose, and a mouth constructed to resemble an actual person’s, but the remaining parts of the face are made of plastic. Through this information, it can be inferred that Face ID uses 3D modelling data and True Depth technology in its authentication process.

FaceStation 2, on the other hand, not only uses 140 near-infrared (NIR) LEDs to extract 3D modelling data, but also uses an algorithm to produce various numerical values from the infrared light reflected off the face. These values include those related to skin tone and skin texture values, which are helpful in distinguishing between similar faces. This special hardware and algorithm render the mask built by Bkav useless when tested against FaceStation 2’s authentication system.

FaceStation 2 also uses a matching score when executing face recognition. The matching score is a calculation of the match between a pre-registered face template and the actual face to be authenticated. The score helps guard FaceStation 2 against spoofing, as a low value is produced if the mask used in spoofing does not use a 3D model that exactly matches the actual face.

FaceStation 2 was recognised for its technological advancement at the 2017 Detektor International Awards, and was awarded the Best Product Award in the ID & Access category.

FaceStation 2 combines Suprema’s most advanced algorithm and hardware to provide a new contactless authentication experience, with a greater variety of features and increased performance.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...