skip to main content
research-article

RFaceID: Towards RFID-based Facial Recognition

Published:30 December 2021Publication History
Skip Abstract Section

Abstract

Face recognition (FR) has been widely used in many areas nowadays. However, the existing mainstream vision-based facial recognition has limitations such as vulnerability to spoofing attacks, sensitivity to lighting conditions, and high risk of privacy leakage, etc. To address these problems, in this paper we take a sparkly different approach and propose RFaceID, a novel RFID-based face recognition system. RFaceID only needs the users to shake their faces in front of the RFID tag matrix for a few seconds to get their faces recognized. Through theoretical analysis and experiment validations, the feasibility of the RFID-based face recognition is studied. Multiple data processing and data augmentation techniques are proposed to minimize the negative impact of environmental noises and user dynamics. A deep neural network (DNN) model is designed to characterize both the spatial and temporal feature of face shaking events. We implement the system and extensive evaluation results show that RFaceID achieves a high face recognition accuracy at 93.1% for 100 users, which shows the potential of RFaceID for future facial recognition applications.

References

  1. Giuseppe Amato, Fabrizio Falchi, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas, Alessandro Trivilini, and Claudio Vairo. 2019. Face Verification and Recognition for Digital Forensics and Information Security. In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). 1--6. https://doi.org/10.1109/ISDFS.2019.8757511Google ScholarGoogle ScholarCross RefCross Ref
  2. Hind Baqeel and Saqib Saeed. 2019. Face detection authentication on Smartphones: End Users Usability Assessment Experiences. In 2019 International Conference on Computer and Information Sciences (ICCIS). 1--6. https://doi.org/10.1109/ICCISci.2019.8716452Google ScholarGoogle ScholarCross RefCross Ref
  3. Ivana Chingovska, Nesli Erdogmus, André Anjos, and Sébastien Marcel. 2016. Face Recognition Systems Under Spoofing Attacks. Springer International Publishing, Cham, 165--194. https://doi.org/10.1007/978-3-319-28501-6_8Google ScholarGoogle ScholarCross RefCross Ref
  4. Eduardo Costa, Ana Lorena, ACPLF Carvalho, and Alex Freitas. 2007. A review of performance evaluation measures for hierarchical classifiers. In Evaluation methods for machine learning II: Papers from the AAAI-2007 workshop. 1--6.Google ScholarGoogle Scholar
  5. Daniel Mark Dobkin. 2012. The RF in RFID: UHF RFID in Practice. (2012).Google ScholarGoogle Scholar
  6. Xiaoyi Fan, Wei Gong, and Jiangchuan Liu. 2018. TagFree Activity Identification with RFIDs. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 1, Article 7 (March 2018), 23 pages. https://doi.org/10.1145/3191739Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. X. Fan, F. Wang, W. Gong, L. Zhang, and J. Liu. 2018. Multiple Object Activity Identification Using RFIDs: A Multipath-Aware Deep Learning Solution. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). 545--555. https://doi.org/10.1109/ICDCS.2018.00060Google ScholarGoogle ScholarCross RefCross Ref
  8. G. Forestier, F. Petitjean, H. A. Dau, G. I. Webb, and E. Keogh. 2017. Generating Synthetic Time Series to Augment Sparse Datasets. In 2017 IEEE International Conference on Data Mining (ICDM). 865--870. https://doi.org/10.1109/ICDM.2017.106Google ScholarGoogle ScholarCross RefCross Ref
  9. Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).Google ScholarGoogle Scholar
  10. J. Han, C. Qian, X. Wang, D. Ma, J. Zhao, P. Zhang, W. Xi, and Z. Jiang. 2014. Twins: Device-free object tracking using passive tags. In IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. 469--476. https://doi.org/10.1109/INFOCOM.2014.6847970Google ScholarGoogle ScholarCross RefCross Ref
  11. Impinj. 2010. R420 readers. (2010). Retrieved June 16,2020. https://www.impinj.com/library.Google ScholarGoogle Scholar
  12. Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 37), Francis Bach and David Blei (Eds.). PMLR, Lille, France, 448--456. http://proceedings.mlr.press/v37/ioffe15.htmlGoogle ScholarGoogle Scholar
  13. Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).Google ScholarGoogle Scholar
  14. A. Krizhevsky, I. Sutskever, and G. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In NIPS.Google ScholarGoogle Scholar
  15. Xinyu Li, Yanyi Zhang, Ivan Marsic, Aleksandra Sarcevic, and Randall S. Burd. 2016. Deep Learning for RFID-Based Activity Recognition. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (Stanford, CA, USA) (SenSys '16). Association for Computing Machinery, New York, NY, USA, 164--175. https://doi.org/10.1145/2994551.2994569Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, and Chen Wang. 2020. Wireless Sensing for Human Activity: A Survey. IEEE Communications Surveys Tutorials 22, 3 (2020), 1629--1645. https://doi.org/10.1109/COMST.2019.2934489Google ScholarGoogle ScholarCross RefCross Ref
  17. Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, and Kui Ren. 2019. Lightweight privacy-preserving ensemble classification for face recognition. IEEE Internet of Things Journal 6, 3 (2019), 5778--5790.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Schuster and K. K. Paliwal. 1997. Bidirectional recurrent neural networks. IEEE Transactions on Signal Processing 45, 11 (1997), 2673--2681. https://doi.org/10.1109/78.650093Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Daniel Sáez Trigueros, Li Meng, and Margaret Hartnett. 2018. Face Recognition: From Traditional to Deep Learning Methods. arXiv:1811.00116 [cs.CV]Google ScholarGoogle Scholar
  20. Leung Tsang, Jin Au Kong, and Robert T Shin. 1985. Theory of microwave remote sensing. (1985).Google ScholarGoogle Scholar
  21. Weiye Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin, Jinsong Han, Fu Xiao, and Kui Ren. 2021. RFace: Anti-Spoofing Facial Authentication Using COST RFID. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications.Google ScholarGoogle Scholar
  22. Lei Yang, Qiongzheng Lin, Xiangyang Li, Tianci Liu, and Yunhao Liu. 2015. See Through Walls with COTS RFID System!. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (Paris, France) (MobiCom '15). Association for Computing Machinery, New York, NY, USA, 487--499. https://doi.org/10.1145/2789168.2790100Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lin-Lin Zhang, Jing Xu, Daim Jung, Tabe Ekouka, and Ha-Kyun Kim. 2021. The Effects of Facial Recognition Payment Systems on Intention to Use in China. Journal of Advanced Researches and Reports 1, 1 (2021), 33--40.Google ScholarGoogle ScholarCross RefCross Ref
  24. C. Zhao, Z. Li, T. Liu, H. Ding, J. Han, W. Xi, and R. Gui. 2019. RF-Mehndi: A Fingertip Profiled RF Identifier. In IEEE INFOCOM 2019 -IEEE Conference on Computer Communications. 1513--1521. https://doi.org/10.1109/INFOCOM.2019.8737419Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. RFaceID: Towards RFID-based Facial Recognition

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 4
      Dec 2021
      1307 pages
      EISSN:2474-9567
      DOI:10.1145/3508492
      Issue’s Table of Contents

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 December 2021
      Published in imwut Volume 5, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader