SlideShare a Scribd company logo
1 of 16
Internship Challenge Presentation:
User Authentication System only using image data:
Combination of face image recognition and hand tracking
Author: Mitsuhiko Nozawa
Date: 2021/06/21
Agenda
1. Overview - brief explanation about application
2. What is Authentication System?
3. Proposed Method
4. Experiment result
5. Problem of Proposed Method
6. Future Work
Theme:
❏ User Authentication System with Face Recognition and Hands Tracking
Application function:
❏ Using face image, verify whether user is registered or not
❏ After that, receive password by hands tracking and do authentication
Use case:
❏ Office entrance, etc...
motivation:
❏ Face recognition is researched very active, but I felt that real-world application in authentication
system seemed is not so prevailed.
❏ Inspired from ReID
Overview (brief explanation about my app)
1 2 3
4 5 6
7 8 9
Role
❏ judge if a person is part of a particular group
Prevailed form
❏ ID・Password
❏ Card Key
❏ Biometric Authentication
Why do you need it?
❏ Demand for restricting the use to registrants only
❏ For example, the company has a lot of confidential information, and if There are no restrictions of
entering office, the information will be leaked.
Problem
❏ ID・Password:management cost per each member
❏ Card Key :risk of lost, a little contact
What is Authentication System ?
Biometric Authentication
❏ Do authentication with biological unique feature by each person
❏ ex) Vein authentication, Fingerprint authentication、Face authentication
❏ Used for unlocking smartphones
Among them, Face authentication has become major recently.
❏ FaceID of iPhone
❏ FaceID is used in smart phone application of financial institution
But for those face authentication, 3D features(depth) got from sensor camera are used.
And sensor camera is expensive compared to normal camera.
What is Authentication System ?
Initial my application Idea:
❏ Face Authentication System only using image data got from normal camera
Advantage:
❏ no risk of lost, comparably inexpensive, completely contactless
Threat:Spoofing
❏ picture, movie, dummy from 3D printer(This breaks iphone’s FaceID)
❏ It is very difficult to solve this problem in only image data situation (a cat and mouse game)
・I gave up doing authentication only using face image, and determined to use other unique information
❏ eye tracking:risk of spoofing from movie
❏ gesture:it seems difficult to recognize complex gesture
❏ password input from hand tracking → algorithm is easy, easier method is better
Conclusive my application Idea:
❏ Face recognition and Hands Tracking Password Authentication System only using image data
Proposed Method(Application Idea)
Face Recognition
❏ Get features of input user and registered users from pretrained feature extractor
❏ Calculate cosine similarities of each pairs of input user and registered users
❏ If maximum similarity exceeds threshold, input user is regarded as registered user who has maximum one
❏ Otherwise input user is regarded as not registered
❏ Training of feature extractor:Deep Metric Learning (arcface)
Proposed Method(Implementation)
registered_user1_embedding
registered_user2_embedding
...
registered_userN_embedding
feature
extractor
input_user
embedding
input
image
max_sim
user
calculate similarity
Learning the mapping from input data to feature vectors in a multidimensional space
It is desired that similar inputs are mapped close to each other and dissimilar inputs are mapped far away.
About Metric Learning
backbone model x
W W
W x
T
normaliz
e
normaliz
e
W x
T
softmax
matmul
(emb_size, 1)
(emb_size, class_num)
(class_num, 1)
Y
Cross
Entropy
cosine similarities of input data mapping(x)
and features of each classes(W)
the mapping of input data in a
multidimensional space
Hand Tracking Password Authentication
❏ I have no time to originally construct model…
❏ So, I use MediaPipe Hands library created by google
❏ First, create circle mask which has one character in input image
❏ Get coordinate of index finger location from model
❏ If the coordinate is in particular circle, return its character
Proposed Method(Implementation)
Hand and Hand Skeleton detecting model created by Google.
This model is assumed to work in mobile device, so fast and light.
This model has 2 stages to output final results
1. Detect Palm from input image and crop image using bounding box
2. from cropped image, predict 21 hand skeleton point
I use number 8. INDEX_FINGER_TIP to create password.
About MediaPipe Hands
reference: https://google.github.io/mediapipe/solutions/hands.html
Proposed Method - Overall View
input
image
registered user
features
feature
extract
calculate
similarity
Face Recognition
Phase
Hand Tracking Phase
detect
hand
match?
input
passwor
d
passwor
d
match?
Authenticated!
Y
N
Y
N
data flow
control flow
Training feature extractor for face recognition
Dataset:
❏ CASIA WebFace(for train):10,575 identities 494,414 images
❏ LFW(for test):5749 identities 13,233 images
Metric
❏ Calculate AUC from all image pairs ( 2-combinations of a set N , match or not)
Training Strategy
❏ All images are cropped (112, 112) by using MTCNN face detector
❏ Batch size is 512
❏ ResNet50 is adopted as backbone model
❏ 5% of training data is used for validation data
Experiment
Experiment Results
I can’t perfectly reproduce the experiment results of paper
Possible causes:
❏ need more data
❏ program has bug
❏ backbone model is not sufficient
optimizer lr scheduling loss function AUC
exp_000 SGD 0.1 Multi Step [20, 28] Cross Entropy -(too bad)
exp_001 Adam 5e-4 Multi Step [20, 28] Cross Entropy 0.827
exp_002 Adam 5e-4 no scheduling Cross Entropy 0.616
exp_003 Adam 5e-4 no scheduling Class Weighted Cross Entropy 0.633
● Hand Tracking Password Authentication takes long time
❏ The more users that use it at the same time, the more the cost increases.
● Other people can watch Password while the user is using the system
❏ keep private from other people to watch when using application...
● The input user wearing a mask, glasses and so on 😷
❏ save multiple image per user
❏ use data augmentation to wear such ornaments to input user when registering
Problems of Application
● I proposed user authentication system only using image data with face recognition and hands tracking
● This application solve some existing problems
❏ risk of lost
❏ sensor camera cost of face recognition
❏ spoofing
● But there are 2 severe problems
❏ Time cost of password input
❏ Password exposure
● So if you don't have a lot of users and you can keep private from other people, the application will work
well.
Conclusion - Future Work
Arcface
Deng, Jiankang, et al. "ArcFace: Additive Angular Margin Loss for Deep Face Recognition." 2019 IEEE/CVF
Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2019.
MediaPipe Hands
Zhang, Fan, et al. "MediaPipe Hands: On-device Real-time Hand Tracking." arXiv preprint arXiv:2006.10214
(2020).
Reference

More Related Content

Similar to May internship challenge: User Authentication System only using image data: Combination of face image recognition and hand tracking

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionFuturice
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Suman Mia
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Image_recognition.pptx
Image_recognition.pptxImage_recognition.pptx
Image_recognition.pptxjohn6938
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET-  	  Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET-  	  Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET- Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET Journal
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 

Similar to May internship challenge: User Authentication System only using image data: Combination of face image recognition and hand tracking (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Image_recognition.pptx
Image_recognition.pptxImage_recognition.pptx
Image_recognition.pptx
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET-  	  Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET-  	  Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 

More from Ridge-i, Inc.

Unsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewUnsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewRidge-i, Inc.
 
Continual Learning Introduction
Continual Learning IntroductionContinual Learning Introduction
Continual Learning IntroductionRidge-i, Inc.
 
Introduction to Few shot learning
Introduction to Few shot learningIntroduction to Few shot learning
Introduction to Few shot learningRidge-i, Inc.
 
May internship challenge: Font Generator
May internship challenge: Font GeneratorMay internship challenge: Font Generator
May internship challenge: Font GeneratorRidge-i, Inc.
 
How to learn with non-reliable labels?
How to learn with non-reliable labels?How to learn with non-reliable labels?
How to learn with non-reliable labels?Ridge-i, Inc.
 
How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)Ridge-i, Inc.
 
May internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls AppMay internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls AppRidge-i, Inc.
 

More from Ridge-i, Inc. (8)

Unsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewUnsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overview
 
Continual Learning Introduction
Continual Learning IntroductionContinual Learning Introduction
Continual Learning Introduction
 
Introduction to Few shot learning
Introduction to Few shot learningIntroduction to Few shot learning
Introduction to Few shot learning
 
Explainable AI
Explainable AIExplainable AI
Explainable AI
 
May internship challenge: Font Generator
May internship challenge: Font GeneratorMay internship challenge: Font Generator
May internship challenge: Font Generator
 
How to learn with non-reliable labels?
How to learn with non-reliable labels?How to learn with non-reliable labels?
How to learn with non-reliable labels?
 
How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)
 
May internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls AppMay internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls App
 

Recently uploaded

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

May internship challenge: User Authentication System only using image data: Combination of face image recognition and hand tracking

  • 1. Internship Challenge Presentation: User Authentication System only using image data: Combination of face image recognition and hand tracking Author: Mitsuhiko Nozawa Date: 2021/06/21
  • 2. Agenda 1. Overview - brief explanation about application 2. What is Authentication System? 3. Proposed Method 4. Experiment result 5. Problem of Proposed Method 6. Future Work
  • 3. Theme: ❏ User Authentication System with Face Recognition and Hands Tracking Application function: ❏ Using face image, verify whether user is registered or not ❏ After that, receive password by hands tracking and do authentication Use case: ❏ Office entrance, etc... motivation: ❏ Face recognition is researched very active, but I felt that real-world application in authentication system seemed is not so prevailed. ❏ Inspired from ReID Overview (brief explanation about my app) 1 2 3 4 5 6 7 8 9
  • 4. Role ❏ judge if a person is part of a particular group Prevailed form ❏ ID・Password ❏ Card Key ❏ Biometric Authentication Why do you need it? ❏ Demand for restricting the use to registrants only ❏ For example, the company has a lot of confidential information, and if There are no restrictions of entering office, the information will be leaked. Problem ❏ ID・Password:management cost per each member ❏ Card Key :risk of lost, a little contact What is Authentication System ?
  • 5. Biometric Authentication ❏ Do authentication with biological unique feature by each person ❏ ex) Vein authentication, Fingerprint authentication、Face authentication ❏ Used for unlocking smartphones Among them, Face authentication has become major recently. ❏ FaceID of iPhone ❏ FaceID is used in smart phone application of financial institution But for those face authentication, 3D features(depth) got from sensor camera are used. And sensor camera is expensive compared to normal camera. What is Authentication System ?
  • 6. Initial my application Idea: ❏ Face Authentication System only using image data got from normal camera Advantage: ❏ no risk of lost, comparably inexpensive, completely contactless Threat:Spoofing ❏ picture, movie, dummy from 3D printer(This breaks iphone’s FaceID) ❏ It is very difficult to solve this problem in only image data situation (a cat and mouse game) ・I gave up doing authentication only using face image, and determined to use other unique information ❏ eye tracking:risk of spoofing from movie ❏ gesture:it seems difficult to recognize complex gesture ❏ password input from hand tracking → algorithm is easy, easier method is better Conclusive my application Idea: ❏ Face recognition and Hands Tracking Password Authentication System only using image data Proposed Method(Application Idea)
  • 7. Face Recognition ❏ Get features of input user and registered users from pretrained feature extractor ❏ Calculate cosine similarities of each pairs of input user and registered users ❏ If maximum similarity exceeds threshold, input user is regarded as registered user who has maximum one ❏ Otherwise input user is regarded as not registered ❏ Training of feature extractor:Deep Metric Learning (arcface) Proposed Method(Implementation) registered_user1_embedding registered_user2_embedding ... registered_userN_embedding feature extractor input_user embedding input image max_sim user calculate similarity
  • 8. Learning the mapping from input data to feature vectors in a multidimensional space It is desired that similar inputs are mapped close to each other and dissimilar inputs are mapped far away. About Metric Learning backbone model x W W W x T normaliz e normaliz e W x T softmax matmul (emb_size, 1) (emb_size, class_num) (class_num, 1) Y Cross Entropy cosine similarities of input data mapping(x) and features of each classes(W) the mapping of input data in a multidimensional space
  • 9. Hand Tracking Password Authentication ❏ I have no time to originally construct model… ❏ So, I use MediaPipe Hands library created by google ❏ First, create circle mask which has one character in input image ❏ Get coordinate of index finger location from model ❏ If the coordinate is in particular circle, return its character Proposed Method(Implementation)
  • 10. Hand and Hand Skeleton detecting model created by Google. This model is assumed to work in mobile device, so fast and light. This model has 2 stages to output final results 1. Detect Palm from input image and crop image using bounding box 2. from cropped image, predict 21 hand skeleton point I use number 8. INDEX_FINGER_TIP to create password. About MediaPipe Hands reference: https://google.github.io/mediapipe/solutions/hands.html
  • 11. Proposed Method - Overall View input image registered user features feature extract calculate similarity Face Recognition Phase Hand Tracking Phase detect hand match? input passwor d passwor d match? Authenticated! Y N Y N data flow control flow
  • 12. Training feature extractor for face recognition Dataset: ❏ CASIA WebFace(for train):10,575 identities 494,414 images ❏ LFW(for test):5749 identities 13,233 images Metric ❏ Calculate AUC from all image pairs ( 2-combinations of a set N , match or not) Training Strategy ❏ All images are cropped (112, 112) by using MTCNN face detector ❏ Batch size is 512 ❏ ResNet50 is adopted as backbone model ❏ 5% of training data is used for validation data Experiment
  • 13. Experiment Results I can’t perfectly reproduce the experiment results of paper Possible causes: ❏ need more data ❏ program has bug ❏ backbone model is not sufficient optimizer lr scheduling loss function AUC exp_000 SGD 0.1 Multi Step [20, 28] Cross Entropy -(too bad) exp_001 Adam 5e-4 Multi Step [20, 28] Cross Entropy 0.827 exp_002 Adam 5e-4 no scheduling Cross Entropy 0.616 exp_003 Adam 5e-4 no scheduling Class Weighted Cross Entropy 0.633
  • 14. ● Hand Tracking Password Authentication takes long time ❏ The more users that use it at the same time, the more the cost increases. ● Other people can watch Password while the user is using the system ❏ keep private from other people to watch when using application... ● The input user wearing a mask, glasses and so on 😷 ❏ save multiple image per user ❏ use data augmentation to wear such ornaments to input user when registering Problems of Application
  • 15. ● I proposed user authentication system only using image data with face recognition and hands tracking ● This application solve some existing problems ❏ risk of lost ❏ sensor camera cost of face recognition ❏ spoofing ● But there are 2 severe problems ❏ Time cost of password input ❏ Password exposure ● So if you don't have a lot of users and you can keep private from other people, the application will work well. Conclusion - Future Work
  • 16. Arcface Deng, Jiankang, et al. "ArcFace: Additive Angular Margin Loss for Deep Face Recognition." 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2019. MediaPipe Hands Zhang, Fan, et al. "MediaPipe Hands: On-device Real-time Hand Tracking." arXiv preprint arXiv:2006.10214 (2020). Reference