-
When Handcrafted Features and Deep Features Meet Mismatched Training and Test Sets for Deepfake Detection
Authors:
Ying Xu,
Sule Yildirim Yayilgan
Abstract:
The accelerated growth in synthetic visual media generation and manipulation has now reached the point of raising significant concerns and posing enormous intimidations towards society. There is an imperative need for automatic detection networks towards false digital content and avoid the spread of dangerous artificial information to contend with this threat. In this paper, we utilize and compare…
▽ More
The accelerated growth in synthetic visual media generation and manipulation has now reached the point of raising significant concerns and posing enormous intimidations towards society. There is an imperative need for automatic detection networks towards false digital content and avoid the spread of dangerous artificial information to contend with this threat. In this paper, we utilize and compare two kinds of handcrafted features(SIFT and HoG) and two kinds of deep features(Xception and CNN+RNN) for the deepfake detection task. We also check the performance of these features when there are mismatches between training sets and test sets. Evaluation is performed on the famous FaceForensics++ dataset, which contains four sub-datasets, Deepfakes, Face2Face, FaceSwap and NeuralTextures. The best results are from Xception, where the accuracy could surpass over 99\% when the training and test set are both from the same sub-dataset. In comparison, the results drop dramatically when the training set mismatches the test set. This phenomenon reveals the challenge of creating a universal deepfake detection system.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute
Authors:
Mohamed Abomhara,
Sule Yildirim Yayilgan,
Marina Shalaginova,
Zoltan Szekely
Abstract:
This paper discusses concerns pertaining to the absoluteness of the right to privacy regarding the use of biometric data for border control. The discussion explains why privacy cannot be absolute from different points of view, including privacy versus national security, privacy properties conflicting with border risk analysis, and Privacy by Design (PbD) and engineering design challenges.
This paper discusses concerns pertaining to the absoluteness of the right to privacy regarding the use of biometric data for border control. The discussion explains why privacy cannot be absolute from different points of view, including privacy versus national security, privacy properties conflicting with border risk analysis, and Privacy by Design (PbD) and engineering design challenges.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
How to Do It Right: A Framework for Biometrics Supported Border Control
Authors:
Mohamed Abomhara,
Sule Yildirim Yayilgan,
Anne Hilde Nymoen,
Marina Shalaginova,
Zoltan Szekely,
Ogerta Elezaj
Abstract:
Complying with the European Union (EU) perspective on human rights goes or should go together with handling ethical, social and legal challenges arising due to the use of biometrics technology as border control technology. While there is no doubt that the biometrics technology at European borders is a valuable element of border control systems, these technologies lead to issues of fundamental righ…
▽ More
Complying with the European Union (EU) perspective on human rights goes or should go together with handling ethical, social and legal challenges arising due to the use of biometrics technology as border control technology. While there is no doubt that the biometrics technology at European borders is a valuable element of border control systems, these technologies lead to issues of fundamental rights and personal privacy, among others. This paper discusses various ethical, social and legal challenges arising due to the use of biometrics technology in border control. First, a set of specific challenges and values affected were identified and then, generic considerations related to mitigation of these issues within a framework is provided. The framework is expected to meet the emergent need for supplying interoperability among multiple information systems used for border control.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE
Authors:
Mohamed Abomhara,
Sule Yildirim Yayilgan
Abstract:
Biometric recognition is a highly adopted technology to support different kinds of applications, ranging from security and access control applications to low enforcement applications. However, such systems raise serious privacy and data protection concerns. Misuse of data, compromising the privacy of individuals and/or authorized processing of data may be irreversible and could have severe consequ…
▽ More
Biometric recognition is a highly adopted technology to support different kinds of applications, ranging from security and access control applications to low enforcement applications. However, such systems raise serious privacy and data protection concerns. Misuse of data, compromising the privacy of individuals and/or authorized processing of data may be irreversible and could have severe consequences on the individual's rights to privacy and data protection. This is partly due to the lack of methods and guidance for the integration of data protection and privacy by design in the system development process. In this paper, we present an example of privacy and data protection best practices to provide more guidance for data controllers and developers on how to comply with the legal obligation for data protection. These privacy and data protection best practices and considerations are based on the lessons learned from the SMart mobILity at the European land borders (SMILE) project.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders
Authors:
Mohamed Abomhara,
Sule Yildirim Yayilgan,
Livinus Obiora Nweke,
Zoltan Szekely
Abstract:
Advances in technology have a substantial impact on every aspect of our lives, ranging from the way we communicate to the way we travel. The Smart mobility at the European land borders (SMILE) project is geared towards the deployment of biometric technologies to optimize and monitor the flow of people at land borders. However, despite the anticipated benefits of deploying biometric technologies in…
▽ More
Advances in technology have a substantial impact on every aspect of our lives, ranging from the way we communicate to the way we travel. The Smart mobility at the European land borders (SMILE) project is geared towards the deployment of biometric technologies to optimize and monitor the flow of people at land borders. However, despite the anticipated benefits of deploying biometric technologies in border control, there are still divergent views on the use of such technologies by two primary stakeholders travelers and border authorities. In this paper, we provide a comparison of travelers and border authorities views on the deployment of biometric technologies in border management. The overall goal of this study is to enable us to understand the concerns of travelers and border guards in order to facilitate the acceptance of biometric technologies for a secure and more convenient border crossing. Our method of inquiry consisted of in person interviews with border guards (SMILE project end users), observation and field visits (to the Hungarian-Romanian and Bulgarian-Romanian borders) and questionnaires for both travelers and border guards. As a result of our investigation, two conflicting trends emerged. On one hand, border guards argued that biometric technologies had the potential to be a very effective tool that would enhance security levels and make traveler identification and authentication procedures easy, fast and convenient. On the other hand, travelers were more concerned about the technologies representing a threat to fundamental rights, personal privacy and data protection.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Data Privacy in IoT Equipped Future Smart Homes
Authors:
Athar Khodabakhsh,
Sule Yildirim Yayilgan
Abstract:
Smart devices are becoming inseparable from daily lives and are improving fast for providing intelligent services and remote monitoring and control. In order to provide personalized and customized services more personal data collection is required. Consequently, intelligent services are becoming intensely personal and they raise concerns regarding data privacy and security. In this paper data priv…
▽ More
Smart devices are becoming inseparable from daily lives and are improving fast for providing intelligent services and remote monitoring and control. In order to provide personalized and customized services more personal data collection is required. Consequently, intelligent services are becoming intensely personal and they raise concerns regarding data privacy and security. In this paper data privacy requirements in a smart home environment equipped with "Internet of Things" are described and privacy challenges for data and models are addressed.
△ Less
Submitted 11 August, 2020;
originally announced August 2020.