SlideShare a Scribd company logo
1 of 8
Download to read offline
Catherine Zeng | HCDE 298 | Sp19
Ethnographic
Breaching
Experiment
Synopsis and
Perspectives-Sharing
https://www.facelytics.io/en/
Stage A: Flowchart
Stage A: Synopsis
From the video [1], the speaker analyzes what make a “man’s” face different from a “woman’s”, by dividing a face into three sections.
- For the upper third, female has more rounded hairline, and male has smaller forehead.
- For the middle third, female has thinner and higher eyebrows, male has brow ridges with deeper shadows, male has
slightly thicker noses, and male has slightly smaller eyes.
- For the bottom third, men has longer and squarer chin, men has thicker neck, female has plumper lips, male has more
facial hair, male has darker and rougher skin, and female has softer and more rounded jawline.
Using this video as reference for Stage A, I collected six face portraits from online resources, and
deliberately select people with different races so to minimize the variability of results due to factors
other than “gender”.
Then, using an App [2] on my iPhone, I photoshopped the six portraits with similar operations,
following the video analysis listed above.
Among the six portraits, the overall success rate is 33%. Grouped by “genders”, female success rate
is 0% and male success rate is 66.7%.
[1]: Looks Theory, “The Difference Between Men and Women's Faces", https://www.youtube.com/watch?v=GptPwoy-FzE, 2016.
[2]: MeiTuXiuXiu.
Stage B: Flowchart
Using these three arguments as reference for Stage B, I added stickers to the six face portraits
using this App [4] on my iPhone.
For “males”, I covered the heads with bunny hats, nose-bridge areas with glasses, and bottom
third of the faces with kiss stickers. For “females”, I covered the heads with cowboy hats, nose-
bridge areas with glasses, and bottom third of the faces with beards.
Among the six portraits, the overall success rate is 16.7%. Grouped by “genders”, female success
rate is 0% and male success rate is 33.3%.
Stage B: Synopsis
From the website [3], the editor analyzes the ways to deceive facial-recognition algorithms. Even though different from our goal—
which is to mix the genders instead of creating “anti-face” to disable the technology—there are still some valid arguments to be
shared in an attempt to confuse Facelytics during this experiment.
- First, obscure the shape of head.
- Second, obscure the nose-bridge area.
- Third, mask and modify facial area using hair or fashion accessories.
[3]: CV Dazzle, https://cvdazzle.com, 2017.
[4]: PicsArt.
Stage C: Flowchart
For this stage, I combined the strategies from both Stage A and B, using photoshopped
portraits with camouflage stickers. (Because the second and the sixth portraits already tricked
the system with success, these two portraits were ignored.)
Among the four portraits, only 50% succeeded to trick Facelytics.
Stage C: Synopsis
Perspectives-Sharing
Overall, it was a really interested experiment, especially after I learned more about Feminism HCI and Trans HCI from the
lectures, because I felt more relatable to the topic, and grew more interests during the experiment and data collection.
However, the lectures in class also made me feel slightly uncomfortable during the research. When I was trying to find the
portraits online to represent different genders, I kept thinking about why I was only considering two genders, and why I saw
and put each of the six portraits under one category of gender over others.
Also, when I added racial diversity into consideration, my original attempt was to find out whether there could be any bias in
this system—whether the results from this AI recognition would vary based on different races. After the trials, I was glad that I
did not see an convincing pattern representing such potential bias, yet I became a little uncertain if I would blur the focus of
the experiment from genders to something else.
(Because of limited words and space permitted for this assignment, I did not do Stage D that I had planned to. I have found
other two big groups of face portraits, one being all children and one being all elders, each with six individual portraits just like
the example above. With these data I could play around with Facelytics to see if there are any major differences of genders
recognitions among different age groups.)
Privacy and freedom from bias are not the main concern I have about this software, but the autonomy and identity are. Users
are not given their choices to decide, plan, and act the way they want to, and there are continuity and discontinuity over time
of how people understand who they are. This design is not universally usable because it is not inclusive and only accepts two
genders. It not only creates discomforts for those who identify themselves as other genders, but also produces misinformation
for and negative impacts on those who are in the process of learning and understanding genders, especially the younger
generation.

More Related Content

Similar to Ethnographic breaching experiment

A Deep Dive Into Pattern-Recognition (Facial Features) Techniques
A Deep Dive Into Pattern-Recognition (Facial Features) TechniquesA Deep Dive Into Pattern-Recognition (Facial Features) Techniques
A Deep Dive Into Pattern-Recognition (Facial Features) TechniquesIJSRED
 
Study on Automatic Age Estimation and Restoration for Verification of Human F...
Study on Automatic Age Estimation and Restoration for Verification of Human F...Study on Automatic Age Estimation and Restoration for Verification of Human F...
Study on Automatic Age Estimation and Restoration for Verification of Human F...IJSTA
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...IJERA Editor
 
Two Level Decision for Recognition of Human Facial Expressions using Neural N...
Two Level Decision for Recognition of Human Facial Expressions using Neural N...Two Level Decision for Recognition of Human Facial Expressions using Neural N...
Two Level Decision for Recognition of Human Facial Expressions using Neural N...IIRindia
 
DETECTING FACIAL EXPRESSION IN IMAGES
DETECTING FACIAL EXPRESSION IN IMAGESDETECTING FACIAL EXPRESSION IN IMAGES
DETECTING FACIAL EXPRESSION IN IMAGESJournal For Research
 
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...sipij
 
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...sipij
 
AngeloStekardisPoster edit
AngeloStekardisPoster editAngeloStekardisPoster edit
AngeloStekardisPoster editAngelo Stekardis
 
project-classified-333.pptx
project-classified-333.pptxproject-classified-333.pptx
project-classified-333.pptxJessesGus
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid AlgorithmIRJET Journal
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Sana Nasar
 
Soc 156 – Sociology of CommunicationReview Sheet – FinalShor.docx
Soc 156 – Sociology of CommunicationReview Sheet – FinalShor.docxSoc 156 – Sociology of CommunicationReview Sheet – FinalShor.docx
Soc 156 – Sociology of CommunicationReview Sheet – FinalShor.docxwhitneyleman54422
 
Machine Learning.pptx
Machine Learning.pptxMachine Learning.pptx
Machine Learning.pptxRehmatUllah46
 
Comparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition TechniquesComparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition Techniquesijtsrd
 
Emotion Recognition using Image Processing
Emotion Recognition using Image ProcessingEmotion Recognition using Image Processing
Emotion Recognition using Image Processingijtsrd
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital EyeIRJET Journal
 

Similar to Ethnographic breaching experiment (20)

Fl33971979
Fl33971979Fl33971979
Fl33971979
 
A Deep Dive Into Pattern-Recognition (Facial Features) Techniques
A Deep Dive Into Pattern-Recognition (Facial Features) TechniquesA Deep Dive Into Pattern-Recognition (Facial Features) Techniques
A Deep Dive Into Pattern-Recognition (Facial Features) Techniques
 
Study on Automatic Age Estimation and Restoration for Verification of Human F...
Study on Automatic Age Estimation and Restoration for Verification of Human F...Study on Automatic Age Estimation and Restoration for Verification of Human F...
Study on Automatic Age Estimation and Restoration for Verification of Human F...
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
Two Level Decision for Recognition of Human Facial Expressions using Neural N...
Two Level Decision for Recognition of Human Facial Expressions using Neural N...Two Level Decision for Recognition of Human Facial Expressions using Neural N...
Two Level Decision for Recognition of Human Facial Expressions using Neural N...
 
DETECTING FACIAL EXPRESSION IN IMAGES
DETECTING FACIAL EXPRESSION IN IMAGESDETECTING FACIAL EXPRESSION IN IMAGES
DETECTING FACIAL EXPRESSION IN IMAGES
 
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...
 
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...
 
AngeloStekardisPoster edit
AngeloStekardisPoster editAngeloStekardisPoster edit
AngeloStekardisPoster edit
 
project-classified-333.pptx
project-classified-333.pptxproject-classified-333.pptx
project-classified-333.pptx
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
 
Soc 156 – Sociology of CommunicationReview Sheet – FinalShor.docx
Soc 156 – Sociology of CommunicationReview Sheet – FinalShor.docxSoc 156 – Sociology of CommunicationReview Sheet – FinalShor.docx
Soc 156 – Sociology of CommunicationReview Sheet – FinalShor.docx
 
Machine Learning.pptx
Machine Learning.pptxMachine Learning.pptx
Machine Learning.pptx
 
Comparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition TechniquesComparative Studies for the Human Facial Expressions Recognition Techniques
Comparative Studies for the Human Facial Expressions Recognition Techniques
 
Emotion Recognition using Image Processing
Emotion Recognition using Image ProcessingEmotion Recognition using Image Processing
Emotion Recognition using Image Processing
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 

More from Yilin Zeng

Competitive Analysis
Competitive AnalysisCompetitive Analysis
Competitive AnalysisYilin Zeng
 
Contextual Inquiry
Contextual InquiryContextual Inquiry
Contextual InquiryYilin Zeng
 
Group Deliverable: Interviews & Personas
Group Deliverable: Interviews & PersonasGroup Deliverable: Interviews & Personas
Group Deliverable: Interviews & PersonasYilin Zeng
 
My User Research Deliverable
My User Research DeliverableMy User Research Deliverable
My User Research DeliverableYilin Zeng
 
project proposal
project proposalproject proposal
project proposalYilin Zeng
 
Mitsubachi Arduino code
Mitsubachi Arduino codeMitsubachi Arduino code
Mitsubachi Arduino codeYilin Zeng
 
Project: Mitsubachi
Project: MitsubachiProject: Mitsubachi
Project: MitsubachiYilin Zeng
 
Netflix Analysis
Netflix Analysis Netflix Analysis
Netflix Analysis Yilin Zeng
 
Seaborn graphing present
Seaborn graphing presentSeaborn graphing present
Seaborn graphing presentYilin Zeng
 
Inclusive design playbook
Inclusive design playbookInclusive design playbook
Inclusive design playbookYilin Zeng
 

More from Yilin Zeng (10)

Competitive Analysis
Competitive AnalysisCompetitive Analysis
Competitive Analysis
 
Contextual Inquiry
Contextual InquiryContextual Inquiry
Contextual Inquiry
 
Group Deliverable: Interviews & Personas
Group Deliverable: Interviews & PersonasGroup Deliverable: Interviews & Personas
Group Deliverable: Interviews & Personas
 
My User Research Deliverable
My User Research DeliverableMy User Research Deliverable
My User Research Deliverable
 
project proposal
project proposalproject proposal
project proposal
 
Mitsubachi Arduino code
Mitsubachi Arduino codeMitsubachi Arduino code
Mitsubachi Arduino code
 
Project: Mitsubachi
Project: MitsubachiProject: Mitsubachi
Project: Mitsubachi
 
Netflix Analysis
Netflix Analysis Netflix Analysis
Netflix Analysis
 
Seaborn graphing present
Seaborn graphing presentSeaborn graphing present
Seaborn graphing present
 
Inclusive design playbook
Inclusive design playbookInclusive design playbook
Inclusive design playbook
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Ethnographic breaching experiment

  • 1. Catherine Zeng | HCDE 298 | Sp19 Ethnographic Breaching Experiment Synopsis and Perspectives-Sharing https://www.facelytics.io/en/
  • 3. Stage A: Synopsis From the video [1], the speaker analyzes what make a “man’s” face different from a “woman’s”, by dividing a face into three sections. - For the upper third, female has more rounded hairline, and male has smaller forehead. - For the middle third, female has thinner and higher eyebrows, male has brow ridges with deeper shadows, male has slightly thicker noses, and male has slightly smaller eyes. - For the bottom third, men has longer and squarer chin, men has thicker neck, female has plumper lips, male has more facial hair, male has darker and rougher skin, and female has softer and more rounded jawline. Using this video as reference for Stage A, I collected six face portraits from online resources, and deliberately select people with different races so to minimize the variability of results due to factors other than “gender”. Then, using an App [2] on my iPhone, I photoshopped the six portraits with similar operations, following the video analysis listed above. Among the six portraits, the overall success rate is 33%. Grouped by “genders”, female success rate is 0% and male success rate is 66.7%. [1]: Looks Theory, “The Difference Between Men and Women's Faces", https://www.youtube.com/watch?v=GptPwoy-FzE, 2016. [2]: MeiTuXiuXiu.
  • 5. Using these three arguments as reference for Stage B, I added stickers to the six face portraits using this App [4] on my iPhone. For “males”, I covered the heads with bunny hats, nose-bridge areas with glasses, and bottom third of the faces with kiss stickers. For “females”, I covered the heads with cowboy hats, nose- bridge areas with glasses, and bottom third of the faces with beards. Among the six portraits, the overall success rate is 16.7%. Grouped by “genders”, female success rate is 0% and male success rate is 33.3%. Stage B: Synopsis From the website [3], the editor analyzes the ways to deceive facial-recognition algorithms. Even though different from our goal— which is to mix the genders instead of creating “anti-face” to disable the technology—there are still some valid arguments to be shared in an attempt to confuse Facelytics during this experiment. - First, obscure the shape of head. - Second, obscure the nose-bridge area. - Third, mask and modify facial area using hair or fashion accessories. [3]: CV Dazzle, https://cvdazzle.com, 2017. [4]: PicsArt.
  • 7. For this stage, I combined the strategies from both Stage A and B, using photoshopped portraits with camouflage stickers. (Because the second and the sixth portraits already tricked the system with success, these two portraits were ignored.) Among the four portraits, only 50% succeeded to trick Facelytics. Stage C: Synopsis
  • 8. Perspectives-Sharing Overall, it was a really interested experiment, especially after I learned more about Feminism HCI and Trans HCI from the lectures, because I felt more relatable to the topic, and grew more interests during the experiment and data collection. However, the lectures in class also made me feel slightly uncomfortable during the research. When I was trying to find the portraits online to represent different genders, I kept thinking about why I was only considering two genders, and why I saw and put each of the six portraits under one category of gender over others. Also, when I added racial diversity into consideration, my original attempt was to find out whether there could be any bias in this system—whether the results from this AI recognition would vary based on different races. After the trials, I was glad that I did not see an convincing pattern representing such potential bias, yet I became a little uncertain if I would blur the focus of the experiment from genders to something else. (Because of limited words and space permitted for this assignment, I did not do Stage D that I had planned to. I have found other two big groups of face portraits, one being all children and one being all elders, each with six individual portraits just like the example above. With these data I could play around with Facelytics to see if there are any major differences of genders recognitions among different age groups.) Privacy and freedom from bias are not the main concern I have about this software, but the autonomy and identity are. Users are not given their choices to decide, plan, and act the way they want to, and there are continuity and discontinuity over time of how people understand who they are. This design is not universally usable because it is not inclusive and only accepts two genders. It not only creates discomforts for those who identify themselves as other genders, but also produces misinformation for and negative impacts on those who are in the process of learning and understanding genders, especially the younger generation.