SlideShare a Scribd company logo
Internship Challenge Presentation:
User Authentication System only using image data:
Combination of face image recognition and hand tracking
Author: Mitsuhiko Nozawa
Date: 2021/06/21
Agenda
1. Overview - brief explanation about application
2. What is Authentication System?
3. Proposed Method
4. Experiment result
5. Problem of Proposed Method
6. Future Work
Theme:
❏ User Authentication System with Face Recognition and Hands Tracking
Application function:
❏ Using face image, verify whether user is registered or not
❏ After that, receive password by hands tracking and do authentication
Use case:
❏ Office entrance, etc...
motivation:
❏ Face recognition is researched very active, but I felt that real-world application in authentication
system seemed is not so prevailed.
❏ Inspired from ReID
Overview (brief explanation about my app)
1 2 3
4 5 6
7 8 9
Role
❏ judge if a person is part of a particular group
Prevailed form
❏ ID・Password
❏ Card Key
❏ Biometric Authentication
Why do you need it?
❏ Demand for restricting the use to registrants only
❏ For example, the company has a lot of confidential information, and if There are no restrictions of
entering office, the information will be leaked.
Problem
❏ ID・Password:management cost per each member
❏ Card Key :risk of lost, a little contact
What is Authentication System ?
Biometric Authentication
❏ Do authentication with biological unique feature by each person
❏ ex) Vein authentication, Fingerprint authentication、Face authentication
❏ Used for unlocking smartphones
Among them, Face authentication has become major recently.
❏ FaceID of iPhone
❏ FaceID is used in smart phone application of financial institution
But for those face authentication, 3D features(depth) got from sensor camera are used.
And sensor camera is expensive compared to normal camera.
What is Authentication System ?
Initial my application Idea:
❏ Face Authentication System only using image data got from normal camera
Advantage:
❏ no risk of lost, comparably inexpensive, completely contactless
Threat:Spoofing
❏ picture, movie, dummy from 3D printer(This breaks iphone’s FaceID)
❏ It is very difficult to solve this problem in only image data situation (a cat and mouse game)
・I gave up doing authentication only using face image, and determined to use other unique information
❏ eye tracking:risk of spoofing from movie
❏ gesture:it seems difficult to recognize complex gesture
❏ password input from hand tracking → algorithm is easy, easier method is better
Conclusive my application Idea:
❏ Face recognition and Hands Tracking Password Authentication System only using image data
Proposed Method(Application Idea)
Face Recognition
❏ Get features of input user and registered users from pretrained feature extractor
❏ Calculate cosine similarities of each pairs of input user and registered users
❏ If maximum similarity exceeds threshold, input user is regarded as registered user who has maximum one
❏ Otherwise input user is regarded as not registered
❏ Training of feature extractor:Deep Metric Learning (arcface)
Proposed Method(Implementation)
registered_user1_embedding
registered_user2_embedding
...
registered_userN_embedding
feature
extractor
input_user
embedding
input
image
max_sim
user
calculate similarity
Learning the mapping from input data to feature vectors in a multidimensional space
It is desired that similar inputs are mapped close to each other and dissimilar inputs are mapped far away.
About Metric Learning
backbone model x
W W
W x
T
normaliz
e
normaliz
e
W x
T
softmax
matmul
(emb_size, 1)
(emb_size, class_num)
(class_num, 1)
Y
Cross
Entropy
cosine similarities of input data mapping(x)
and features of each classes(W)
the mapping of input data in a
multidimensional space
Hand Tracking Password Authentication
❏ I have no time to originally construct model…
❏ So, I use MediaPipe Hands library created by google
❏ First, create circle mask which has one character in input image
❏ Get coordinate of index finger location from model
❏ If the coordinate is in particular circle, return its character
Proposed Method(Implementation)
Hand and Hand Skeleton detecting model created by Google.
This model is assumed to work in mobile device, so fast and light.
This model has 2 stages to output final results
1. Detect Palm from input image and crop image using bounding box
2. from cropped image, predict 21 hand skeleton point
I use number 8. INDEX_FINGER_TIP to create password.
About MediaPipe Hands
reference: https://google.github.io/mediapipe/solutions/hands.html
Proposed Method - Overall View
input
image
registered user
features
feature
extract
calculate
similarity
Face Recognition
Phase
Hand Tracking Phase
detect
hand
match?
input
passwor
d
passwor
d
match?
Authenticated!
Y
N
Y
N
data flow
control flow
Training feature extractor for face recognition
Dataset:
❏ CASIA WebFace(for train):10,575 identities 494,414 images
❏ LFW(for test):5749 identities 13,233 images
Metric
❏ Calculate AUC from all image pairs ( 2-combinations of a set N , match or not)
Training Strategy
❏ All images are cropped (112, 112) by using MTCNN face detector
❏ Batch size is 512
❏ ResNet50 is adopted as backbone model
❏ 5% of training data is used for validation data
Experiment
Experiment Results
I can’t perfectly reproduce the experiment results of paper
Possible causes:
❏ need more data
❏ program has bug
❏ backbone model is not sufficient
optimizer lr scheduling loss function AUC
exp_000 SGD 0.1 Multi Step [20, 28] Cross Entropy -(too bad)
exp_001 Adam 5e-4 Multi Step [20, 28] Cross Entropy 0.827
exp_002 Adam 5e-4 no scheduling Cross Entropy 0.616
exp_003 Adam 5e-4 no scheduling Class Weighted Cross Entropy 0.633
● Hand Tracking Password Authentication takes long time
❏ The more users that use it at the same time, the more the cost increases.
● Other people can watch Password while the user is using the system
❏ keep private from other people to watch when using application...
● The input user wearing a mask, glasses and so on 😷
❏ save multiple image per user
❏ use data augmentation to wear such ornaments to input user when registering
Problems of Application
● I proposed user authentication system only using image data with face recognition and hands tracking
● This application solve some existing problems
❏ risk of lost
❏ sensor camera cost of face recognition
❏ spoofing
● But there are 2 severe problems
❏ Time cost of password input
❏ Password exposure
● So if you don't have a lot of users and you can keep private from other people, the application will work
well.
Conclusion - Future Work
Arcface
Deng, Jiankang, et al. "ArcFace: Additive Angular Margin Loss for Deep Face Recognition." 2019 IEEE/CVF
Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2019.
MediaPipe Hands
Zhang, Fan, et al. "MediaPipe Hands: On-device Real-time Hand Tracking." arXiv preprint arXiv:2006.10214
(2020).
Reference

More Related Content

Similar to May internship challenge: User Authentication System only using image data: Combination of face image recognition and hand tracking

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
IJERA Editor
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
Kejti Cela
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)
Suman Mia
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
Image_recognition.pptx
Image_recognition.pptxImage_recognition.pptx
Image_recognition.pptx
john6938
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET-  	  Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET-  	  Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET Journal
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 

Similar to May internship challenge: User Authentication System only using image data: Combination of face image recognition and hand tracking (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Image_recognition.pptx
Image_recognition.pptxImage_recognition.pptx
Image_recognition.pptx
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET-  	  Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET-  	  Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 

More from Ridge-i, Inc.

Unsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewUnsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overview
Ridge-i, Inc.
 
Continual Learning Introduction
Continual Learning IntroductionContinual Learning Introduction
Continual Learning Introduction
Ridge-i, Inc.
 
Introduction to Few shot learning
Introduction to Few shot learningIntroduction to Few shot learning
Introduction to Few shot learning
Ridge-i, Inc.
 
Explainable AI
Explainable AIExplainable AI
Explainable AI
Ridge-i, Inc.
 
May internship challenge: Font Generator
May internship challenge: Font GeneratorMay internship challenge: Font Generator
May internship challenge: Font Generator
Ridge-i, Inc.
 
How to learn with non-reliable labels?
How to learn with non-reliable labels?How to learn with non-reliable labels?
How to learn with non-reliable labels?
Ridge-i, Inc.
 
How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)
Ridge-i, Inc.
 
May internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls AppMay internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls App
Ridge-i, Inc.
 

More from Ridge-i, Inc. (8)

Unsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overviewUnsupervised Video Anomaly Detection: A brief overview
Unsupervised Video Anomaly Detection: A brief overview
 
Continual Learning Introduction
Continual Learning IntroductionContinual Learning Introduction
Continual Learning Introduction
 
Introduction to Few shot learning
Introduction to Few shot learningIntroduction to Few shot learning
Introduction to Few shot learning
 
Explainable AI
Explainable AIExplainable AI
Explainable AI
 
May internship challenge: Font Generator
May internship challenge: Font GeneratorMay internship challenge: Font Generator
May internship challenge: Font Generator
 
How to learn with non-reliable labels?
How to learn with non-reliable labels?How to learn with non-reliable labels?
How to learn with non-reliable labels?
 
How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)How to learn with non-reliable labels? (Japanese version)
How to learn with non-reliable labels? (Japanese version)
 
May internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls AppMay internship challenge: Estimating Distance between Two Balls App
May internship challenge: Estimating Distance between Two Balls App
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

May internship challenge: User Authentication System only using image data: Combination of face image recognition and hand tracking

  • 1. Internship Challenge Presentation: User Authentication System only using image data: Combination of face image recognition and hand tracking Author: Mitsuhiko Nozawa Date: 2021/06/21
  • 2. Agenda 1. Overview - brief explanation about application 2. What is Authentication System? 3. Proposed Method 4. Experiment result 5. Problem of Proposed Method 6. Future Work
  • 3. Theme: ❏ User Authentication System with Face Recognition and Hands Tracking Application function: ❏ Using face image, verify whether user is registered or not ❏ After that, receive password by hands tracking and do authentication Use case: ❏ Office entrance, etc... motivation: ❏ Face recognition is researched very active, but I felt that real-world application in authentication system seemed is not so prevailed. ❏ Inspired from ReID Overview (brief explanation about my app) 1 2 3 4 5 6 7 8 9
  • 4. Role ❏ judge if a person is part of a particular group Prevailed form ❏ ID・Password ❏ Card Key ❏ Biometric Authentication Why do you need it? ❏ Demand for restricting the use to registrants only ❏ For example, the company has a lot of confidential information, and if There are no restrictions of entering office, the information will be leaked. Problem ❏ ID・Password:management cost per each member ❏ Card Key :risk of lost, a little contact What is Authentication System ?
  • 5. Biometric Authentication ❏ Do authentication with biological unique feature by each person ❏ ex) Vein authentication, Fingerprint authentication、Face authentication ❏ Used for unlocking smartphones Among them, Face authentication has become major recently. ❏ FaceID of iPhone ❏ FaceID is used in smart phone application of financial institution But for those face authentication, 3D features(depth) got from sensor camera are used. And sensor camera is expensive compared to normal camera. What is Authentication System ?
  • 6. Initial my application Idea: ❏ Face Authentication System only using image data got from normal camera Advantage: ❏ no risk of lost, comparably inexpensive, completely contactless Threat:Spoofing ❏ picture, movie, dummy from 3D printer(This breaks iphone’s FaceID) ❏ It is very difficult to solve this problem in only image data situation (a cat and mouse game) ・I gave up doing authentication only using face image, and determined to use other unique information ❏ eye tracking:risk of spoofing from movie ❏ gesture:it seems difficult to recognize complex gesture ❏ password input from hand tracking → algorithm is easy, easier method is better Conclusive my application Idea: ❏ Face recognition and Hands Tracking Password Authentication System only using image data Proposed Method(Application Idea)
  • 7. Face Recognition ❏ Get features of input user and registered users from pretrained feature extractor ❏ Calculate cosine similarities of each pairs of input user and registered users ❏ If maximum similarity exceeds threshold, input user is regarded as registered user who has maximum one ❏ Otherwise input user is regarded as not registered ❏ Training of feature extractor:Deep Metric Learning (arcface) Proposed Method(Implementation) registered_user1_embedding registered_user2_embedding ... registered_userN_embedding feature extractor input_user embedding input image max_sim user calculate similarity
  • 8. Learning the mapping from input data to feature vectors in a multidimensional space It is desired that similar inputs are mapped close to each other and dissimilar inputs are mapped far away. About Metric Learning backbone model x W W W x T normaliz e normaliz e W x T softmax matmul (emb_size, 1) (emb_size, class_num) (class_num, 1) Y Cross Entropy cosine similarities of input data mapping(x) and features of each classes(W) the mapping of input data in a multidimensional space
  • 9. Hand Tracking Password Authentication ❏ I have no time to originally construct model… ❏ So, I use MediaPipe Hands library created by google ❏ First, create circle mask which has one character in input image ❏ Get coordinate of index finger location from model ❏ If the coordinate is in particular circle, return its character Proposed Method(Implementation)
  • 10. Hand and Hand Skeleton detecting model created by Google. This model is assumed to work in mobile device, so fast and light. This model has 2 stages to output final results 1. Detect Palm from input image and crop image using bounding box 2. from cropped image, predict 21 hand skeleton point I use number 8. INDEX_FINGER_TIP to create password. About MediaPipe Hands reference: https://google.github.io/mediapipe/solutions/hands.html
  • 11. Proposed Method - Overall View input image registered user features feature extract calculate similarity Face Recognition Phase Hand Tracking Phase detect hand match? input passwor d passwor d match? Authenticated! Y N Y N data flow control flow
  • 12. Training feature extractor for face recognition Dataset: ❏ CASIA WebFace(for train):10,575 identities 494,414 images ❏ LFW(for test):5749 identities 13,233 images Metric ❏ Calculate AUC from all image pairs ( 2-combinations of a set N , match or not) Training Strategy ❏ All images are cropped (112, 112) by using MTCNN face detector ❏ Batch size is 512 ❏ ResNet50 is adopted as backbone model ❏ 5% of training data is used for validation data Experiment
  • 13. Experiment Results I can’t perfectly reproduce the experiment results of paper Possible causes: ❏ need more data ❏ program has bug ❏ backbone model is not sufficient optimizer lr scheduling loss function AUC exp_000 SGD 0.1 Multi Step [20, 28] Cross Entropy -(too bad) exp_001 Adam 5e-4 Multi Step [20, 28] Cross Entropy 0.827 exp_002 Adam 5e-4 no scheduling Cross Entropy 0.616 exp_003 Adam 5e-4 no scheduling Class Weighted Cross Entropy 0.633
  • 14. ● Hand Tracking Password Authentication takes long time ❏ The more users that use it at the same time, the more the cost increases. ● Other people can watch Password while the user is using the system ❏ keep private from other people to watch when using application... ● The input user wearing a mask, glasses and so on 😷 ❏ save multiple image per user ❏ use data augmentation to wear such ornaments to input user when registering Problems of Application
  • 15. ● I proposed user authentication system only using image data with face recognition and hands tracking ● This application solve some existing problems ❏ risk of lost ❏ sensor camera cost of face recognition ❏ spoofing ● But there are 2 severe problems ❏ Time cost of password input ❏ Password exposure ● So if you don't have a lot of users and you can keep private from other people, the application will work well. Conclusion - Future Work
  • 16. Arcface Deng, Jiankang, et al. "ArcFace: Additive Angular Margin Loss for Deep Face Recognition." 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2019. MediaPipe Hands Zhang, Fan, et al. "MediaPipe Hands: On-device Real-time Hand Tracking." arXiv preprint arXiv:2006.10214 (2020). Reference