Research Article
Open access
Published on 13 September 2024
Download pdf
Zhu,D. (2024).Which factors most strongly influence the popularity of facial recognition software on mobile device?.Advances in Engineering Innovation,11,15-23.
Export citation

Which factors most strongly influence the popularity of facial recognition software on mobile device?

Dongheng Zhu *,1,
  • 1 Suzhou No. 1 High School

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2977-3903/11/2024110

Abstract

Facial scanning is becoming more common as the commercial use of facial recognition technology expands. Face recognition technology, can be widely used in public security, finance, subway, airport and other important fields of natural identification. Now, the technology has also been applied to the routine outbreak control and prevention, through the form of "face recognition" to bring more convenient, safer and more accurate experience. However, with the development of technology, the drawbacks of facial recognition are gradually revealed, and people's opinions on the technology are mixed. As facial recognition is widely used in the market, protecting users' privacy information and data is becoming an increasingly important issue. In this article, this paper will discuss the different factors contributing to the popularity of facial recognition among people from five aspects, respectively from the aspects of devices and people. This paper was covered a number of parts in this article to explore what factors influence the popularity of facial recognition, racially biased, Accuracy of identification, public acceptance, Personal experience with technology, public perception of face recognition technology and Alternatives to FRS. The conclusion is that the factors which most strongly impact on FR is accuracy.

Keywords

facial recognition, mobile device, facial scanning

[1]. Devue, C., Wride, A., & Grimshaw, G. M. (2019). New insights on real-world human face recognition. Journal of Experimental Psychology: General, 148(6), 994-1007. https://doi.org/10.1037/xge0000493

[2]. Martinez-Martin, N. (2019). What are important ethical implications of using facial recognition technology in health care? Proceedings of IEEE, 107(2), 318-326. https://doi.org/10.1109/JPROC.2019.2890038

[3]. Ishii, H., Fukumi, M., & Akamatsu, N. (1996). Face detection based on skin color information in visual scenes by neural networks. Proceedings of IEEE International Conference on Image Processing (ICIP), 3, 112-115. https://doi.org/10.1109/ICIP.1996.559612

[4]. Braje, W. L., Kersten, D., Tarr, M. J., & Troje, N. F. (2010). Illumination effects in face recognition. Attention, Perception, & Psychophysics, 72(8), 1954-1963. https://doi.org/10.3758/BF03330623

[5]. Anwarul, S., & Dahiya, S. (2018). A comprehensive review on face recognition methods and factors affecting facial recognition accuracy. Proceedings of the 8th International Conference on Pattern Recognition Systems, 379-388. https://doi.org/10.1007/978-3-030-29407-6_36

[6]. Zhang, S. (2014). Research on face recognition algorithm under different posture. Journal of Chengdu Electromechanical College, 25(1), 25-29. Retrieved from http://www.cdmd.cnki.com.cn

[7]. Tom, S. (2019). The best algorithms struggle to recognize Black faces equally. Wired. Retrieved from https://www.wired.com/story/best-algorithms-struggle-recognize-black-faces-equally/

[8]. Gates, K. A. (2011). Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance. New York, NY: NYU Press. https://www.jstor.org/stable/j.ctt9qg8xd

[9]. Riaz, A. M., & Ibrar, H. (2022). Analyzing and comparing public perception of facial recognition, iris verification, and fingerprints-based authentication systems. 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT), 641-646. https://doi.org/10.1109/CoDIT55151.2022.9803965

[10]. Lewis, P. G. (2019). Moral foundations in the 2015-16 U.S. presidential primary debates: The positive and negative moral vocabulary of partisan elites. Social Sciences, 8(8), 233. https://doi.org/10.3390/socsci8080233

[11]. Baumann, J. (2000). SAGEM points a finger at GSM. Retrieved from https://www.sagem.com

[12]. Peng, S., Yu, S., & Yang, A. (2014). Smartphone malware and its propagation modeling: A survey. IEEE Communications Surveys and Tutorials, 16(2), 925-941. https://doi.org/10.1109/SURV.2013.070813.00214

[13]. Daugman, J. G. (1993). High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11), 1148-1161. https://doi.org/10.1109/34.244676

[14]. Daugman, J. (2004). How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 21-30. https://doi.org/10.1109/TCSVT.2003.818350

[15]. Kong, A., Zhang, D., & Kamel, M. (2009). A survey of palmprint recognition. Pattern Recognition, 42(7), 1408-1418. https://doi.org/10.1016/j.patcog.2008.10.011

[16]. Zhang, D., Zuo, W., & Yue, F. (2011). A comparative study of palmprint recognition algorithms. ACM Computing Surveys, 44(1), Article 2. https://doi.org/10.1145/2071389.2071391

[17]. Baumann, J. Voice recognition. Retrieved from http://www.hitl.washington.edu/scivw/EVE/I.D.2.d.VoiceRecognition.htm

[18]. Clarke, N. L., Furnell, S. M., Lines, B. M., & Reynolds, P. L. (2003). Keystroke dynamics on a mobile handset: A feasibility study. Information Management and Computer Security, 11(4), 161-166. https://doi.org/10.1108/09685220310489526

[19]. Buchoux, A., & Clarke, N. L. (2008). Deployment of keystroke analysis on a smartphone. Proceedings of the 6th Australian Information Security Management Conference, 1-7. https://doi.org/10.4225/75/57b55a56b876a

[20]. Yang, J. (2012). Trends and forecast for 2013 touch panel market. DigiTimes. Retrieved from http://www.digitimes.com/news/a20121228RS401.html

[21]. Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293. https://doi.org/10.1109/COMST.2014.2386915

[22]. Beranek, B. (2013). Voice biometrics: Success stories, success factors and what’s next. Biometric Technology Today, 7(10), 9-11. https://doi.org/10.1016/S0969-4765(13)70128-0

[23]. Cai, Z., Shen, C., Wang, M., Song, Y., & Wang, J. (2012). Mobile authentication through touch-behavior features. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 386-393.

[24]. Chen, X., Tian, J., Su, Q., Yang, X., & Wang, F.-Y. (2005). A secured mobile phone based on embedded fingerprint recognition systems. Proceedings of the IEEE International Conference on Intelligent Systems and Informatics (SISY), 549-553. https://doi.org/10.1007/11427995_57

[25]. Clarke, N. L., & Furnell, S. M. (2007). Authenticating mobile phone users using keystroke analysis. International Journal of Information Security, 6(1), 1-14. https://doi.org/10.1007/s10207-006-0006-6

Cite this article

Zhu,D. (2024).Which factors most strongly influence the popularity of facial recognition software on mobile device?.Advances in Engineering Innovation,11,15-23.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content

About volume

Journal:Advances in Engineering Innovation

Volume number: Vol.11
ISSN:2977-3903(Print) / 2977-3911(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).