Abstract
Face recognition (FR) has been widely used in many areas nowadays. However, the existing mainstream vision-based facial recognition has limitations such as vulnerability to spoofing attacks, sensitivity to lighting conditions, and high risk of privacy leakage, etc. To address these problems, in this paper we take a sparkly different approach and propose RFaceID, a novel RFID-based face recognition system. RFaceID only needs the users to shake their faces in front of the RFID tag matrix for a few seconds to get their faces recognized. Through theoretical analysis and experiment validations, the feasibility of the RFID-based face recognition is studied. Multiple data processing and data augmentation techniques are proposed to minimize the negative impact of environmental noises and user dynamics. A deep neural network (DNN) model is designed to characterize both the spatial and temporal feature of face shaking events. We implement the system and extensive evaluation results show that RFaceID achieves a high face recognition accuracy at 93.1% for 100 users, which shows the potential of RFaceID for future facial recognition applications.
- Giuseppe Amato, Fabrizio Falchi, Claudio Gennaro, Fabio Valerio Massoli, Nikolaos Passalis, Anastasios Tefas, Alessandro Trivilini, and Claudio Vairo. 2019. Face Verification and Recognition for Digital Forensics and Information Security. In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). 1--6. https://doi.org/10.1109/ISDFS.2019.8757511Google ScholarCross Ref
- Hind Baqeel and Saqib Saeed. 2019. Face detection authentication on Smartphones: End Users Usability Assessment Experiences. In 2019 International Conference on Computer and Information Sciences (ICCIS). 1--6. https://doi.org/10.1109/ICCISci.2019.8716452Google ScholarCross Ref
- Ivana Chingovska, Nesli Erdogmus, André Anjos, and Sébastien Marcel. 2016. Face Recognition Systems Under Spoofing Attacks. Springer International Publishing, Cham, 165--194. https://doi.org/10.1007/978-3-319-28501-6_8Google ScholarCross Ref
- Eduardo Costa, Ana Lorena, ACPLF Carvalho, and Alex Freitas. 2007. A review of performance evaluation measures for hierarchical classifiers. In Evaluation methods for machine learning II: Papers from the AAAI-2007 workshop. 1--6.Google Scholar
- Daniel Mark Dobkin. 2012. The RF in RFID: UHF RFID in Practice. (2012).Google Scholar
- Xiaoyi Fan, Wei Gong, and Jiangchuan Liu. 2018. TagFree Activity Identification with RFIDs. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 1, Article 7 (March 2018), 23 pages. https://doi.org/10.1145/3191739Google ScholarDigital Library
- X. Fan, F. Wang, W. Gong, L. Zhang, and J. Liu. 2018. Multiple Object Activity Identification Using RFIDs: A Multipath-Aware Deep Learning Solution. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). 545--555. https://doi.org/10.1109/ICDCS.2018.00060Google ScholarCross Ref
- G. Forestier, F. Petitjean, H. A. Dau, G. I. Webb, and E. Keogh. 2017. Generating Synthetic Time Series to Augment Sparse Datasets. In 2017 IEEE International Conference on Data Mining (ICDM). 865--870. https://doi.org/10.1109/ICDM.2017.106Google ScholarCross Ref
- Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).Google Scholar
- J. Han, C. Qian, X. Wang, D. Ma, J. Zhao, P. Zhang, W. Xi, and Z. Jiang. 2014. Twins: Device-free object tracking using passive tags. In IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. 469--476. https://doi.org/10.1109/INFOCOM.2014.6847970Google ScholarCross Ref
- Impinj. 2010. R420 readers. (2010). Retrieved June 16,2020. https://www.impinj.com/library.Google Scholar
- Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 37), Francis Bach and David Blei (Eds.). PMLR, Lille, France, 448--456. http://proceedings.mlr.press/v37/ioffe15.htmlGoogle Scholar
- Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).Google Scholar
- A. Krizhevsky, I. Sutskever, and G. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In NIPS.Google Scholar
- Xinyu Li, Yanyi Zhang, Ivan Marsic, Aleksandra Sarcevic, and Randall S. Burd. 2016. Deep Learning for RFID-Based Activity Recognition. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (Stanford, CA, USA) (SenSys '16). Association for Computing Machinery, New York, NY, USA, 164--175. https://doi.org/10.1145/2994551.2994569Google ScholarDigital Library
- Jian Liu, Hongbo Liu, Yingying Chen, Yan Wang, and Chen Wang. 2020. Wireless Sensing for Human Activity: A Survey. IEEE Communications Surveys Tutorials 22, 3 (2020), 1629--1645. https://doi.org/10.1109/COMST.2019.2934489Google ScholarCross Ref
- Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, and Kui Ren. 2019. Lightweight privacy-preserving ensemble classification for face recognition. IEEE Internet of Things Journal 6, 3 (2019), 5778--5790.Google ScholarCross Ref
- M. Schuster and K. K. Paliwal. 1997. Bidirectional recurrent neural networks. IEEE Transactions on Signal Processing 45, 11 (1997), 2673--2681. https://doi.org/10.1109/78.650093Google ScholarDigital Library
- Daniel Sáez Trigueros, Li Meng, and Margaret Hartnett. 2018. Face Recognition: From Traditional to Deep Learning Methods. arXiv:1811.00116 [cs.CV]Google Scholar
- Leung Tsang, Jin Au Kong, and Robert T Shin. 1985. Theory of microwave remote sensing. (1985).Google Scholar
- Weiye Xu, Jianwei Liu, Shimin Zhang, Yuanqing Zheng, Feng Lin, Jinsong Han, Fu Xiao, and Kui Ren. 2021. RFace: Anti-Spoofing Facial Authentication Using COST RFID. In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications.Google Scholar
- Lei Yang, Qiongzheng Lin, Xiangyang Li, Tianci Liu, and Yunhao Liu. 2015. See Through Walls with COTS RFID System!. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (Paris, France) (MobiCom '15). Association for Computing Machinery, New York, NY, USA, 487--499. https://doi.org/10.1145/2789168.2790100Google ScholarDigital Library
- Lin-Lin Zhang, Jing Xu, Daim Jung, Tabe Ekouka, and Ha-Kyun Kim. 2021. The Effects of Facial Recognition Payment Systems on Intention to Use in China. Journal of Advanced Researches and Reports 1, 1 (2021), 33--40.Google ScholarCross Ref
- C. Zhao, Z. Li, T. Liu, H. Ding, J. Han, W. Xi, and R. Gui. 2019. RF-Mehndi: A Fingertip Profiled RF Identifier. In IEEE INFOCOM 2019 -IEEE Conference on Computer Communications. 1513--1521. https://doi.org/10.1109/INFOCOM.2019.8737419Google ScholarDigital Library
Index Terms
- RFaceID: Towards RFID-based Facial Recognition
Recommendations
Real-time face detection and recognition using hybrid-information extracted from face space and facial features
This paper describes both face detection using the eigenface space and face recognition using neural networks. Real-time face detection from face images was performed in two steps. In the first step, a normalized skin color map based on the Gaussian ...
Face Recognition Employing DMWT Followed by FastICA
Face recognition becomes a challenging topic in several fields since images of faces are varied by changing illuminations, facial rotations, facial expressions, etc. In this paper, two dimensional discrete multiwavelet transform (2D DMWT) and fast ...
Data augmentation for face recognition
Recently, Deep Convolution Neural Networks (DCNNs) have shown outstanding performance in face recognition. However, the supervised training process of DCNN requires a large number of labeled samples which are expensive and time consuming to collect. In ...
Comments