https://fareastgizmos.com/wp-content/uploads/2020/09/fujitsu_technology_block-facial-authentication-fraud.jpg

Fujitsu Develops Technology to Block Facial Authentication Fraud Using Conventional Cameras

Fujitsu today announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera. The newly developed technologies include forgery feature extraction based on telltale signs of spoofing using photographs, and technology for judging forgery based on variations in image quality due to capture environment.

 Conventional technologies rely on expensive, dedicated devices like near-infrared cameras to identify telltale signs of forgery, or the user is required to move their face from side to side, which remains difficult to duplicate with a forgery. This leads to increased costs, however, and the need for additional user interaction slows the authentication process. To tackle these challenges, Fujitsu has developed a forgery feature extraction technology that detects the subtle differences between an authentic image and a forgery, as well as a forgery judgment technology that accounts for variations in appearance due to the capture environment.

READ  Sony AI and avatarin to Jointly Develop Next Generation Remote Control Robots

Fujitsu’s new technology ultimately makes it possible to prevent impersonation with forgeries using only face images taken at the time of authentication, enhancing security without sacrificing the convenience of face authentication and contributing to the DX (digital transformation) of operations with improved personal authentication technologies. While biometric authentication continues to grow in popularity, many risks remain. In some cases, when facial images are disclosed on the Internet via SNS, etc., the possibility emerges that the image may become the target of malicious users if stolen due to the loss of an ID card with a facial photograph, etc-because of the prevalence of such images, this makes facial authentication more vulnerable than other authentication methods, such as finger prints or palm veins.

READ  LG Unveils Versatile Camera Module CAM Plus