• Home
  • News
    • Features
    • Latest/Upcoming Tech
    • Product Review
    • Tech Events
  • Technology
    • Computing
      • Hardware
      • Software
    • Mobile
      • Devices
    • Apps
      • Messaging App
  • Innovation
    • Startups
    • Smart Gadgets
    • Augmented Reality
    • Cloud Computing
  • Business
    • Internet Commerce
    • Tech Market
  • Tips & Tricks
  • Miscellaneous
    • Jobs / Career
    • Social Media
TheTechNews
  • Home
  • News
    • Features
    • Latest/Upcoming Tech
    • Product Review
    • Tech Events
  • Technology
    • Computing
      • Hardware
      • Software
    • Mobile
      • Devices
    • Apps
      • Messaging App
  • Innovation
    • Startups
    • Smart Gadgets
    • Augmented Reality
    • Cloud Computing
  • Business
    • Internet Commerce
    • Tech Market
  • Tips & Tricks
  • Miscellaneous
    • Jobs / Career
    • Social Media
Security

Hackers can fool the facial recognition system using the 3D faces based on Facebook photos

by Selene Kyle
-- August 21, 2016
Hackers can fool the facial recognition system using the 3D faces based on Facebook photos

Albeit facial recognition system is considered as one of the trusted methods for your computer to recognize you, it’s still not quite perfect and prone to make mistakes. A research team from the University of North Carolina proved that those security systems based on this facial recognition technology can be easily fooled by new attacks using VR-like, computer-rendered faces they built. Moreover, using only photos taken from the wealth of facial biometric data, indisputably known as Facebook, they made their 3D models and showed them to the security systems on a phone, tricking four out of five security systems they tested 55 percent to 85 percent of the time.

facial_recognition

Just like a stalker or digital identity thief, they collected 20 volunteers from online sources. Then they built 3D models of their faces, included some facial animations and tweaked their eyes to make them looking at the camera. They even rebuilt any missing parts, the shadows and texture of that area in case they could not find the subject’s full face. The most interesting part is, some of the volunteers were security researchers themselves, and of them, some were so active to protect their online privacy. However, they were able to dig up at least 3 photos of them online.

“Some vendors — most notably Microsoft with its Windows Hello software — already have commercial solutions that leverage alternative hardware. [In Hello’s case, that hardware is Tobii’s eye-tracking camera.] However, there is always a cost-benefit to adding hardware, and hardware vendors will need to decide whether there is enough demand from and benefit for consumers to add specialized components like IR cameras or structured light projectors,” said team member True Price during the team’s presentation at Usenix security conference.

The researchers have published their full paper on Wired, explaining their method and results.

ringid
Related Items3D modelFacebookfacial recognitionFeaturedHackerstalker
View Comments (1)
Security
August 21, 2016
Selene Kyle

Related Items3D modelFacebookfacial recognitionFeaturedHackerstalker

More in Security

securing_data_hackers_the_technews

Innovative Ideas for Protecting Data Privacy!

Emily ForbesJuly 12, 2020
Read More

Reasons Why Your Business Needs a VPN!

Emily ForbesJuly 9, 2020
Read More

What You Need to Know About Cybercriminals!

Emily ForbesJune 3, 2020
Read More
big-data-a-great-way-to-ensure-strong-authentication

Identity Management is Essential for Zero-Trust Security!

Emily ForbesApril 22, 2020
Read More

Complete Cybersecurity Solution for Business And Home

Emily ForbesApril 15, 2020
Read More
broadband_internet_connection_the_technews

VPN Speed Testing – How To Increase It?

Emily ForbesApril 14, 2020
Read More
stronger-network-security-the-tech-news

Why Security Audits are Important to Your Business

Emily ForbesApril 12, 2020
Read More
introducing-fbis-most-wanted-cybercriminals

What to Look at When Examining Different VPNs!

Emily ForbesApril 9, 2020
Read More
securing_data_hackers_the_technews

12 Expert Data Breach Prevention Tips!

Emily ForbesApril 4, 2020
Read More
Scroll for more
Tap

Join Our Newsletter

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

we respect your privacy and take protecting it seriously

Top News

  • sproutsio
    Is Automation the Future of Gardening?
    Environment & Natural ScienceJanuary 14, 2021
  • 5 Reasons Why Every Church Needs A Website!
    Tips & TricksJanuary 6, 2021
  • duplex
    Google Launches Question Hub!
    Latest/Upcoming TechJanuary 5, 2021
  • tech-startups
    5 Responsibilities of a Landlord you Need to Know!
    BusinessJanuary 4, 2021
  • wordpress_com_plugins_the_technews
    WordPress is Introducing Learn WordPress!
    Tips & TricksJanuary 3, 2021
  • What Every Business Owner Should Know About SEO!
    Tips & TricksDecember 18, 2020
  • Cybersecurity-Industry-02
    Best Static Code Analysis Software!
    SoftwareDecember 18, 2020
TheTechNews

A technology media that aims at the latest tech news, events, gadgets, tools, innovations, startups and many more.

    NEWS

  • Features
  • Latest/Upcoming Tech
  • Product Review
  • Tech Events
  • Technology
  • Innovation
  • Business

    Hardware & Software

  • Computing
  • Hardware
  • Software
  • Mobile
  • Devices
  • Messaging App
  • Tips & Tricks

    Others

  • Startups
  • Cloud Computing
  • Social Media
  • Internet Commerce

Copyright © 2016 www.thetechnews.com | Pages: ABOUT US | PRIVACY POLICY | TERMS OF USE | CONTACT US

The NSA was hacked, confirmed by the Snowden Documents
This is how NSA snooped on Cisco firewalls for years