SlideShare a Scribd company logo
1 of 3
Download to read offline
C&T RF Antennas Inc
www.ctrfantennas.com rfproducts1@ctrfantennas.com
Please Contact us for more information, thank you.
 Jasmine Lu (86)17322110281
What is the security risk of face recognition?
Written By Calio Huang
On December 12, 2019, Fortune Magazine reported that Kneron, an artificial intelligence
company in San Diego, USA, has used high-definition 3D masks and photos to deceive China,
including WeChat, Alipay, and Chinese train stations. As a result, some discussions on the security
of face recognition have been initiated.
3D mask cracking face recognition is more a test behavior than a real risk
From the perspective of authentication technology, multiple dimensions are often constrained
together to verify one's identity at the same time. Our mobile payment actually has triple
protection. First, people don't give their phones to other people, they will be protected; second,
they usually set a power-on password. The protection provided by these power-on passwords is
very strong. Like Apple's privacy protection mechanism, even the FBI and CIA have no way. All
these levels have passed, and finally, it is WeChat and Alipay's face recognition. Behind this, there
are protection measures such as information about potential behaviors, common locations, and
time, and restrictions on payment amounts. Therefore, in this crack, the first few levels are
cooperated by the user, and then directly enter the test face recognition. Therefore, from the
perspective of security, it is more a test behavior than actual risk. Therefore, from the practical
level of practical life, consumers need not worry too much.
However, some thoughtful thoughts that have been expanded from this may wish to "concern" a
little.
Previously, a zoo in Hangzhou wanted to change the previous fingerprint admission certification
to face recognition certification. A professor at Zhejiang University of Science and Technology
who had already applied for an annual card brought the park to court because the reason was
that you did n’t ask for my opinion. By default, we all agreed to provide you with facial
information? The park was still quite confused at first, why do you think the fingerprint phone
number is not a big problem, but when it comes to "face recognition" everyone exclaims "my
privacy data has been stolen ".
Face recognition has higher data protection needs
The difference in public attitude is intuitive, because face recognition technology is the latest,
and people generally have more doubts about new things. However, from an objective point of
view, the risk of face recognition is far better than phone numbers and even higher than
C&T RF Antennas Inc
www.ctrfantennas.com rfproducts1@ctrfantennas.com
Please Contact us for more information, thank you.
 Jasmine Lu (86)17322110281
fingerprints, irises, voiceprints, etc. that are also biological information.
The password is leaked. You only need to change the password, but the fingerprint and face
information cannot be changed. Once it is stolen and consciously stolen, the stolen person has no
other way except to change other security methods. Therefore, facial information is more
sensitive.
In addition, the appearance of deep fake technology allows face information to be used to
"replace the head" and port it to other videos. Deepfake is a combination of "deep machine
learning" and "fake photo". It is a successful application of deep learning models in the field of
image synthesis and replacement. Not long ago, the sensational "ZAO" face-changing APP storm
was based on deep fake technology. Therefore, for ordinary people, face recognition will bring a
completely new risk: Generally speaking, a password leak will only lose what is protected by the
password, but the spread of face information is likely to affect life.
Therefore, the European Union ’s data protection law, the “General Data Protection Regulation”
(“GDPR”) stipulates that facial images constitute “biometric data” under special types of personal
data, and are therefore subject to restrictions compared to ordinary personal data. Higher
protection requirements.
China National Internet Information Office, "Administrative Regulations for Network Audio and
Video Information Services" issued on November 29 also stipulates that from January 1 next year,
AI fake videos must not be released at will. There are four main provisions on AI fake audio and
video in the new regulations: "Perform security assessments in accordance with relevant national
regulations", "Identify in a prominent way" non-authentic audio information, shall not use AI fake
technology to release false news, and deploy AI fake audio and video Identification techniques
and sound rumor removal mechanisms.
The struggle between security and cracking security is the law of natural science
However, although face recognition is more sensitive, it also has its own advantages.
First, face recognition has great convenience.
In fact, to a large extent, face recognition is not a technology based on security considerations.
The passwords we usually use, such as payment passwords and bank card passwords, are hidden
in the user's mind, and there is no possibility of being stolen. If it is based on asymmetric RSA,
symmetric AES, and other encryption algorithms, as long as the password is slightly more
complicated, not simple words, mixed characters, letters, and numbers are basically unbreakable.
Therefore, in some very strict security scenarios, character passwords are used.
Of course, it may also be stolen when entering the password, but in contrast, the human face
cannot be hidden, and it is displayed in public places. Searchable on social networking sites.
Therefore, face recognition is not a completely security-based invention. However, on the other
hand, people's needs are diverse, and safety is not always number one, as many people think. For
example, for the convenience of travel, people will buy battery cars under budget constraints. If
this safety compromise is helpless, there are still people who spend more than 100,000 to buy
motorcycles instead of buying out of a hobby car. Therefore, safety is not the overriding
requirement, and convenience is also important. Therefore, in scenarios where both security and
convenience are required, face recognition is a very good solution. It still has great development
prospects in micropayments, company access control, home access control, time and attendance,
C&T RF Antennas Inc
www.ctrfantennas.com rfproducts1@ctrfantennas.com
Please Contact us for more information, thank you.
 Jasmine Lu (86)17322110281
and smart home. of.
Second, face recognition has a wider range of objects. Face recognition, fingerprint recognition,
and other biological security measures, compared to password recognition and other schemes,
based on their own biological characteristics, also have some of their own unique advantages.
For example, if the password is to be impersonated, just tell others. But face recognition and
fingerprint recognition are even more difficult to counterfeit. The original owner of the face and
fingerprints cannot always be present at any time. Therefore, face recognition not only prevents
others from infringing on their rights but also protects the owner of the face to a certain extent.
For example, the face recognition of Didi Shunfeng and the courier is the platform to prevent
cheating.
Making face-changing videos and recognizing face-changing is like a cat-and-mouse game. One
foot tall and one foot tall, the contradiction between safety and cracking security has always
existed. The struggle between the two began with the invention of mechanical locks by humans.
From a deeper level, security and freedom are always a contradiction. When the security reaches
the extreme, freedom will inevitably be lost, and security cannot be maintained. Therefore,
counterfeiting of face recognition is itself a law of social development and even natural science.

More Related Content

Similar to What is the security risk of face recognition -C&T RF Antennas Inc

facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
gulfam ali
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
domenicacullison
 
Fingerpay
FingerpayFingerpay
Fingerpay
Anand B
 

Similar to What is the security risk of face recognition -C&T RF Antennas Inc (20)

Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
 
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
AI and IoT - A New Era of Cybercrimes | Cyberroot Risk Advisory (CR Group)
 
Frs
FrsFrs
Frs
 
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx356 Part II • Predictive AnalyticsMachine LearningFace re.docx
356 Part II • Predictive AnalyticsMachine LearningFace re.docx
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Fingerpay
FingerpayFingerpay
Fingerpay
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security Threats
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Your Smart Devices Could Be Killing You!
Your Smart Devices Could Be Killing You!Your Smart Devices Could Be Killing You!
Your Smart Devices Could Be Killing You!
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 

More from Antenna Manufacturer Coco

More from Antenna Manufacturer Coco (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdf
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
 
What is LPWAN.pdf
What is LPWAN.pdfWhat is LPWAN.pdf
What is LPWAN.pdf
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
Internal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdfInternal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdf
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdf
 
What is DTU.pdf
What is DTU.pdfWhat is DTU.pdf
What is DTU.pdf
 
What is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdfWhat is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdf
 
New Technology in Farming Applications.pdf
New Technology in Farming Applications.pdfNew Technology in Farming Applications.pdf
New Technology in Farming Applications.pdf
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdf
 
Wifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdfWifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdf
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdf
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

What is the security risk of face recognition -C&T RF Antennas Inc

  • 1. C&T RF Antennas Inc www.ctrfantennas.com rfproducts1@ctrfantennas.com Please Contact us for more information, thank you.  Jasmine Lu (86)17322110281 What is the security risk of face recognition? Written By Calio Huang On December 12, 2019, Fortune Magazine reported that Kneron, an artificial intelligence company in San Diego, USA, has used high-definition 3D masks and photos to deceive China, including WeChat, Alipay, and Chinese train stations. As a result, some discussions on the security of face recognition have been initiated. 3D mask cracking face recognition is more a test behavior than a real risk From the perspective of authentication technology, multiple dimensions are often constrained together to verify one's identity at the same time. Our mobile payment actually has triple protection. First, people don't give their phones to other people, they will be protected; second, they usually set a power-on password. The protection provided by these power-on passwords is very strong. Like Apple's privacy protection mechanism, even the FBI and CIA have no way. All these levels have passed, and finally, it is WeChat and Alipay's face recognition. Behind this, there are protection measures such as information about potential behaviors, common locations, and time, and restrictions on payment amounts. Therefore, in this crack, the first few levels are cooperated by the user, and then directly enter the test face recognition. Therefore, from the perspective of security, it is more a test behavior than actual risk. Therefore, from the practical level of practical life, consumers need not worry too much. However, some thoughtful thoughts that have been expanded from this may wish to "concern" a little. Previously, a zoo in Hangzhou wanted to change the previous fingerprint admission certification to face recognition certification. A professor at Zhejiang University of Science and Technology who had already applied for an annual card brought the park to court because the reason was that you did n’t ask for my opinion. By default, we all agreed to provide you with facial information? The park was still quite confused at first, why do you think the fingerprint phone number is not a big problem, but when it comes to "face recognition" everyone exclaims "my privacy data has been stolen ". Face recognition has higher data protection needs The difference in public attitude is intuitive, because face recognition technology is the latest, and people generally have more doubts about new things. However, from an objective point of view, the risk of face recognition is far better than phone numbers and even higher than
  • 2. C&T RF Antennas Inc www.ctrfantennas.com rfproducts1@ctrfantennas.com Please Contact us for more information, thank you.  Jasmine Lu (86)17322110281 fingerprints, irises, voiceprints, etc. that are also biological information. The password is leaked. You only need to change the password, but the fingerprint and face information cannot be changed. Once it is stolen and consciously stolen, the stolen person has no other way except to change other security methods. Therefore, facial information is more sensitive. In addition, the appearance of deep fake technology allows face information to be used to "replace the head" and port it to other videos. Deepfake is a combination of "deep machine learning" and "fake photo". It is a successful application of deep learning models in the field of image synthesis and replacement. Not long ago, the sensational "ZAO" face-changing APP storm was based on deep fake technology. Therefore, for ordinary people, face recognition will bring a completely new risk: Generally speaking, a password leak will only lose what is protected by the password, but the spread of face information is likely to affect life. Therefore, the European Union ’s data protection law, the “General Data Protection Regulation” (“GDPR”) stipulates that facial images constitute “biometric data” under special types of personal data, and are therefore subject to restrictions compared to ordinary personal data. Higher protection requirements. China National Internet Information Office, "Administrative Regulations for Network Audio and Video Information Services" issued on November 29 also stipulates that from January 1 next year, AI fake videos must not be released at will. There are four main provisions on AI fake audio and video in the new regulations: "Perform security assessments in accordance with relevant national regulations", "Identify in a prominent way" non-authentic audio information, shall not use AI fake technology to release false news, and deploy AI fake audio and video Identification techniques and sound rumor removal mechanisms. The struggle between security and cracking security is the law of natural science However, although face recognition is more sensitive, it also has its own advantages. First, face recognition has great convenience. In fact, to a large extent, face recognition is not a technology based on security considerations. The passwords we usually use, such as payment passwords and bank card passwords, are hidden in the user's mind, and there is no possibility of being stolen. If it is based on asymmetric RSA, symmetric AES, and other encryption algorithms, as long as the password is slightly more complicated, not simple words, mixed characters, letters, and numbers are basically unbreakable. Therefore, in some very strict security scenarios, character passwords are used. Of course, it may also be stolen when entering the password, but in contrast, the human face cannot be hidden, and it is displayed in public places. Searchable on social networking sites. Therefore, face recognition is not a completely security-based invention. However, on the other hand, people's needs are diverse, and safety is not always number one, as many people think. For example, for the convenience of travel, people will buy battery cars under budget constraints. If this safety compromise is helpless, there are still people who spend more than 100,000 to buy motorcycles instead of buying out of a hobby car. Therefore, safety is not the overriding requirement, and convenience is also important. Therefore, in scenarios where both security and convenience are required, face recognition is a very good solution. It still has great development prospects in micropayments, company access control, home access control, time and attendance,
  • 3. C&T RF Antennas Inc www.ctrfantennas.com rfproducts1@ctrfantennas.com Please Contact us for more information, thank you.  Jasmine Lu (86)17322110281 and smart home. of. Second, face recognition has a wider range of objects. Face recognition, fingerprint recognition, and other biological security measures, compared to password recognition and other schemes, based on their own biological characteristics, also have some of their own unique advantages. For example, if the password is to be impersonated, just tell others. But face recognition and fingerprint recognition are even more difficult to counterfeit. The original owner of the face and fingerprints cannot always be present at any time. Therefore, face recognition not only prevents others from infringing on their rights but also protects the owner of the face to a certain extent. For example, the face recognition of Didi Shunfeng and the courier is the platform to prevent cheating. Making face-changing videos and recognizing face-changing is like a cat-and-mouse game. One foot tall and one foot tall, the contradiction between safety and cracking security has always existed. The struggle between the two began with the invention of mechanical locks by humans. From a deeper level, security and freedom are always a contradiction. When the security reaches the extreme, freedom will inevitably be lost, and security cannot be maintained. Therefore, counterfeiting of face recognition is itself a law of social development and even natural science.