2020
DOI: 10.1109/tts.2020.2992344
|View full text |Cite
|
Sign up to set email alerts
|

Demographic Bias in Biometrics: A Survey on an Emerging Challenge

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
126
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 184 publications
(132 citation statements)
references
References 108 publications
1
126
0
Order By: Relevance
“…Despite the high performance of face recognition, it is still prone to certain vulnerabilities towards operation scenarios and attacks. Examples of these vulnerabilities are presentation attack detection (spoofing) [6], [37], face morphing attacks [7], [8], and the inherited differential performance (bias between different demographic groups) [12], [50]. As this work focus on the privacy aspect of face recognition, the discussed related work will go deeper into this issue.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the high performance of face recognition, it is still prone to certain vulnerabilities towards operation scenarios and attacks. Examples of these vulnerabilities are presentation attack detection (spoofing) [6], [37], face morphing attacks [7], [8], and the inherited differential performance (bias between different demographic groups) [12], [50]. As this work focus on the privacy aspect of face recognition, the discussed related work will go deeper into this issue.…”
Section: Related Workmentioning
confidence: 99%
“…a camera or microphone, a database that stores information about the persons registered in the biometrics system, algorithms for processing the acquired characteristics, e.g. signal processing algorithms, and finally a decision system that compares the stored and the captured characteristics and decides whether they belong to the same person [2]. Success in the comparison of the biometrics trait grants access to a system or identifies an individual.…”
Section: Introductionmentioning
confidence: 99%
“…Professional screeners need to maintain safety by identifying such imposters, while still allowing lawful passengers through. Although technological advancements such as automatic face recognition systems (e.g., Taigman et al, 2014 ) and various methods of biometric scanning may seem like attractive alternatives to replace human screeners, such technologies face many of the same challenges as human recognizers (O’Toole et al, 2012 ; e.g., Tran et al, 2017 ), while also raising concerns about ethics, transparency, and accountability (Drozdowski et al, 2020 ). Therefore, the bulk of imposter detection duties has been and is being performed by humans.…”
Section: Introductionmentioning
confidence: 99%