A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems

A Meta-Analysis of Privacy: Ethical and Security Aspects of Facial Recognition Systems

Balakrishnan Unny R., Nityesh Bhatt
Copyright: © 2022 |Pages: 22
DOI: 10.4018/IJISP.285580
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Facial recognition systems use advanced computing to capture facial information and compare the same with proprietary databases for validation. The emergence of data capturing intermediaries and open access image repositories have compounded the need for a holistic perspective for handling the privacy and security challenges associated with FRS. The study presents the results of a bibliometric analysis conducted on the topic of privacy, ethical and security aspects of FRS. This study presents the level of academic discussion on the topic using bibliometric performance analysis. The results of the bibliographic coupling analysis to identify the research hotspots are also presented. The results also include the systematic literature review of 148 publications that are distributed across seven themes. Both the bibliometric and systematic analysis showed that privacy and security in FRS requires a holistic perspective that cuts across privacy, ethical, security, legal, policy and technological aspects.
Article Preview
Top

Introduction

Facial recognition systems like other biometric systems have become ubiquitous and have touched various aspects of the human-computer interaction in this digital age. Facial recognition systems (FRS), when used in collaboration with advanced computing including artificial intelligence, provide a multitude of opportunities which encompass security, feature detection, emotional status identification, law enforcement, personal payment systems amongst others (Shein, 2011; Truong, Diep, & Zelinka, 2020). Additionally, the technology convergence in the smartphone has led to the development of “data-hungry” apps that have cut across national borders (O’Flaherty, 2019) and thus more avenues for data collections for FRS have opened up. These trends are compounded by the lack of awareness, security misconceptions and concerns of the end-user (Piccolotto & Maller, 2014; Zimmermann & Gerber, 2017). FRS have long relied upon building facial image databases that are proprietary in nature that took extensive resources to build and maintain. However, with the advent of social media and other publicly accessible image repositories, the resource level challenges in building the FRS have been significantly reduced. Additionally; data collection, storage and analysis intermediaries have emerged who can provide “FRS-as-a-service” thereby bringing down the barriers for adoption as well. However, the recent data breach of a prominent US firm (Clearview AI) has thrown light upon the systematic risks of “FRS-as-a-service” (O’Flaherty, 2020; Valinsky, 2019).

FRS is a specialized version of image recognition systems that can be built either to identify the face as a whole or extract features from the image thereby identifying the face using the extracted features (Abbass & Ibrahim, 2013; Bansal, Agarwal, Sharma, & Gupta, 2013). The facial image in 3D or 2D is captured using a camera and is then compared with the face database to judge whether the face is recognised or not. The generalised steps involved in facial recognition are presented in Figure 1.

Figure 1.

Generalised Steps in Facial Recognition Systems

IJISP.285580.f01

There have been significant researches conducted to improve the effectiveness and efficiency of facial recognition at every step identified in Figure 1. The advances in detection of the image include feature level detection like eye detection (Bianchini & Sarti, 2006) and innovative functions like liveness and emotion detection (Nishanth & Rao, 2019; Reney & Tripathi, 2015; T. Wang, Yang, Lei, Liao, & Li, 2013; Yin et al., 2017). Image processing advancements include functions like correcting face alignment (L. Zhang, Allebach, Lin, & Wang, 2015), head position variations (Biswas, Aggarwal, Flynn, & Bowyer, 2013; Shiau, Pu, & Leu, 2010; Shinwari, Kosunen, Alariki, & Naji, 2019; C. Wang & Brandstein, 2000; L. Zhang et al., 2015) and lighting fluctuations (Doi, Sato, & Chihara, 1998).

The improvements in the “matching” step include the use of machine learning and other algorithmic developments to improve the performance even in compromised environmental scenarios (Biswas, Bowyer, & Flynn, 2010; Hirano, Ikeda, & Nakamura, 2003; Li, Lu, & Li, 2017; Megreya, 2018; X. Wang & Guan, 2018). Similar, algorithmic improvements have been identified in the “verification step” as well (Alfarsi, Jabbar, Tawafak, Alsidiri, & Alsinani, 2019; Payne, Solheim, & Castain, 1993; Peng & Shen, 2013; Ramanathan & Chellappa, 2005; Taheri, Mozaffari, & Keshavarzi, 2015).

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing