2020
DOI: 10.1109/access.2020.3006051
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Bias in Facial Analysis Systems: A Systematic Review

Abstract: Recent studies have demonstrated that most commercial facial analysis systems are biased against certain categories of race, ethnicity, culture, age and gender. The bias can be traced in some cases to the algorithms used and in other cases to insufficient training of algorithms, while in still other cases bias can be traced to insufficient databases. To date, no comprehensive literature review exists which systematically investigates bias and discrimination in the currently available facial analysis software. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
41
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(41 citation statements)
references
References 41 publications
(78 reference statements)
0
41
0
Order By: Relevance
“…Over a half of a decade later, there has been at least one significant contribution in conventional FR each year ever since (i.e., 2015 [14], 2016 [15], 2017 [8], 2018 [7], 2019 [16], and even 2020, the year of facial masks [17]). Scholars provide details on deep learning advances in FR technology as a part of recent surveys [18], [19], with another focused on bias specific to FR [20].…”
Section: Bias In Frmentioning
confidence: 99%
“…Over a half of a decade later, there has been at least one significant contribution in conventional FR each year ever since (i.e., 2015 [14], 2016 [15], 2017 [8], 2018 [7], 2019 [16], and even 2020, the year of facial masks [17]). Scholars provide details on deep learning advances in FR technology as a part of recent surveys [18], [19], with another focused on bias specific to FR [20].…”
Section: Bias In Frmentioning
confidence: 99%
“…Many biometrics exist to provide authentication for users while in a public setting [1], such as personal identification numbers, passwords, cards, keys, and tokens [2]. However, those methods can become compromised, lost, duplicated, stolen, or challenging to recall [2].…”
Section: Introductionmentioning
confidence: 99%
“…Many users want authentication in a public setting and most likely, using a mobile device leads to unconstructed environments [6] and non-controlled changes [11]. These changes lead to limitations on nonlinear variations [11], making data acquisition difficult [1]. This problem has persisted for over fifty years [6] and often contributes to differing results that cannot be replicated [10].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations