Article count:16428 Read by:87919360

Hottest Technical Articles
Exclusive: A senior executive of NetEase Games was taken away for investigation due to corruption
OPPO is going global, and moving forward
It is reported that Xiaohongshu is testing to directly direct traffic to personal WeChat; Luckin Coffee is reported to enter the US and hit Starbucks with $2, but the official declined to comment; It is reported that JD Pay will be connected to Taobao and Tmall丨E-commerce Morning News
Yu Kai of Horizon Robotics stands at the historical crossroads of China's intelligent driving
Lei Jun: Don't be superstitious about BBA, domestic brands are rising in an all-round way; Big V angrily criticized Porsche 4S store recall "sexy operation": brainless and illegal; Renault returns to China and is building a research and development team
A single sentence from an overseas blogger caused an overseas product to become scrapped instantly. This is a painful lesson. Amazon, Walmart, etc. began to implement a no-return and refund policy. A "civil war" broke out between Temu's semi-hosted and fully-hosted services.
Tmall 3C home appliances double 11 explosion: brands and platforms rush to
Shareholders reveal the inside story of Huayun Data fraud: thousands of official seals were forged, and more than 3 billion yuan was defrauded; Musk was exposed to want 14 mothers and children to live in a secret family estate; Yang Yuanqing said that Lenovo had difficulty recruiting employees when it went overseas in the early days
The app is coming! Robin Li will give a keynote speech on November 12, and the poster reveals a huge amount of information
It is said that Zhong Shanshan asked the packaged water department to sign a "military order" and the entire department would be dismissed if the performance did not meet the standard; Ren Zhengfei said that it is still impossible to say that Huawei has survived; Bilibili reported that employees manipulated the lottery丨Leifeng Morning News
Account Entry

Your face, 5 cents

Latest update time:2020-07-15
    Reads:


There is no absolute security, and Rome was not built in a day.


1


"I suddenly feel so sad. It turns out that my handsome face is only worth 50 cents!"

Yesterday, a piece of news became a hot topic on Weibo. A Xinhua News Agency reporter found that there was a large amount of facial information being sold in packages on the online black market, and the price was only 0.5 yuan per copy.

The jaw-dropping thing is far from this. On a certain online trading platform, by searching for specific keywords, you can also find a store selling "photo activation" tools.

Someone asked: What is "photo activation"?

For example, when you buy a financial product, your phone will prompt you to perform a "face recognition" authentication operation. This operation is roughly divided into two steps:

1. You are required to point your mobile phone camera at yourself and take a static photo of the front for system review.

2. The system requires you to point the camera at yourself again and follow the instructions to blink, shake your head, open your mouth, etc. to complete the recognition.

The purpose of these two steps can be explained in plain words as follows: the machine is judging that you are you.

Here comes the point. By using the "Photo Activation" tool, others can use your static photos to perform dynamic actions such as "blinking, opening mouth, nodding", etc.

Interestingly, if the buyer does not know how to operate this "photo activation" tool, the seller also provides a teaching service that provides the software and tutorial for 35 yuan, and the buyer will receive a teaching link after payment.

An IEEE Fellow mentioned in an interview with AI Gold Rush that the implementation of this type of "technology" is actually not difficult. 3D printed molds can deceive most three-dimensional face recognition systems; videos generated by GAN can deceive most two-dimensional face recognition systems.

2


Some people might be terrified when reading this, and they might even break out in a cold sweat. Others might ask: Even if we buy this facial information, what can we do?

This issue needs to be discussed in two situations:

1. If only your facial information is leaked, this is not a big problem;

2. If, in addition to your facial information, sensitive data including your ID number, bank card number, mobile phone number, etc. is also leaked, you need to be vigilant at all times.

With this fake facial information, criminals can exploit system loopholes to deceive the facial recognition machines of some platforms and then carry out illegal activities such as false registration and telecommunications network fraud.

In an interview with Xinhua News Agency, a seller even boasted, " As long as you are proficient in using the toolbox, you can also use this facial data to help unblock frozen WeChat and Alipay accounts. "

This means that when you are living a peaceful life, the money in your WeChat and Yu'ebao may have been transferred away; when you are having fun outside, your home's fingerprint lock may have been opened and the treasure you placed in the express cabinet may have been taken away.

In addition to the toolbox, at the end of last year, according to a report by Fortune magazine, Kneron, an artificial intelligence company in San Diego, USA, used a special 3D mask to successfully deceive several famous facial recognition payment systems in the world and completed the shopping payment process.

The team also claims that they even entered train stations in China using the same method.

Kneron CEO Liu Juncheng said this shows that facial recognition technology does not meet security standards, which will pose a threat to user privacy.

"If facial recognition is so unsafe, let's use fingerprint recognition instead!"

Sorry to tell you, there may be problems.

Last September, an expert from an industry association stated that if the lens is close enough when taking a photo, the "scissor hands" photo can restore the fingerprint information of the person in the photo through photo magnification technology and artificial intelligence enhancement technology.

"Basically, photos of the hand gesture taken within 1.5 meters can restore 100% of the fingerprints, photos taken within 1.5 meters to 3 meters can restore 50% of the fingerprints, and only photos taken over 3 meters away are difficult to extract fingerprints."

After the fingerprint is extracted, it is made into a fingerprint film using professional materials, which can be used by criminals in various channels that use fingerprint technology to identify identity, such as fingerprint door locks, fingerprint payments, etc.

Once this statement was put forward, it continued to ferment and was listed on the Weibo hot search list many times.

3


"Are we going to be invisible forever?"

Having read this far, many of my friends will probably sigh to the sky.

In fact, there is no need to worry too much. If you want to crack information at this level of financial security, not only will you run the risk of being arrested, but the procedure is also extremely complicated.

For example, before making the 3D mask mentioned above:

  • First, you need to use a high-precision 3D scanner to scan the face and obtain three-dimensional data;

  • Secondly, a high-precision 3D printer is needed to print out the main structure of the human head;

  • Most importantly, millimeter-level restoration of facial features is required, including high-level restoration of skin color.

On the device side, if a user has activated face payment, if he wants to use other mobile phones for facial recognition payment or transfer, he must re-activate face payment using the payment password.

In addition, when logging in using other mobile phones, you also need to perform login identity authentication, which means you need a login password.

In other words, if you want to use a 3D mask to steal credit cards, you must meet several conditions at the same time:

1. Collect high-precision 3D models of Alipay users’ heads;

2. Complete the production of masks with millimeter-level precision regardless of cost, and strive for perfection;

3. Get the user’s mobile phone if the Alipay user has activated face-scanning payment, or directly obtain the Alipay user’s login password and payment password.

Obviously, in actual operation, this method of stealing credit cards is not feasible.

Regarding the issue of fingerprint recognition security, industry expert Jiu Di Shui said, "There is no need to worry at all."

He mentioned that fingerprints are the raised lines on the epidermis. Since human fingerprints are the result of the combined effects of genetics and the environment, everyone has fingerprints, but they are different.

Since the repetition rate of fingerprints is extremely small, about one in 15 billion, it is called a human ID card.

If you stretch out your hand and observe carefully, you can find that tiny fingerprints can also be divided into three types: some concentric circles or spiral lines look like whirlpools in water, which are called bucket-shaped lines; some lines are like winnowing baskets with one side open, which are called dustpan-shaped lines; some lines are shaped like a bow, which are called bow-shaped lines.

In addition to the different overall shapes, the number and length of each person's fingerprint patterns are also different.

If you enlarge the fingerprint, you can find different detailed features on the fingerprint, which are divided into 9 types: divergence; combination; small eye; small dot; end point; short stick; hook; small bridge; starting point.

At present, all scientific and technological achievements based on fingerprint recognition, whether it is fingerprint matching at the crime scene, Alipay fingerprint payment, or mobile phone fingerprint unlocking, all utilize these 9 detailed features on the fingerprint.

Generally, after humans reach adulthood, the structure and shape of fingerprints remain basically unchanged, and the detailed features of the fingerprints on each finger remain unchanged.

The size, shape, and two-dimensional coordinates of detailed features are relatively fixed, which is also the premise for people to do fingerprint matching. If the detailed features of a fingerprint cannot be seen clearly, then this fingerprint will be called a "waste fingerprint" and cannot be used in any field.

There are many ways to extract fingerprints at a crime scene, the most common ones include powder brushing, reagent development, multi-band light source and other methods.

After these fingerprints appear, they need to be photographed and fixed. The equipment used for taking photos is mostly high-resolution fine-eye lenses, which are expensive. In addition to the lenses, special light sources must be used to take clear enough photos.

At the same time, when taking fingerprints, a scale must be placed, and after multiple focusing, ultra-close-up shooting is required to obtain a clear fingerprint image sample for comparison.

Finally, during the comparison process, the fingerprint must be magnified large enough and clear enough to observe the detailed features, which is also the key to fingerprint identification.

In summary, four conclusions can be drawn:

1. When you use a mobile phone to take a picture of your fingerprint, even at a very close distance, you cannot capture the detailed features of the fingerprint. The principle of current fingerprint locks and fingerprint recognition devices is to recognize the 9 detailed features on the fingerprint. If the detailed features are not clearly captured, it will not cause any threat.

2. Detailed features need to be captured with a special lens, but this lens must be close to the object being photographed, and if necessary, it needs to be focused multiple times with the help of a special light source, otherwise the picture will not be clear at all; and it is useless to obtain only one or two detailed features on the finger. The fingerprint recognition on the mobile phone needs to record the detailed features of most fingerprints before it can be used.

3. Fingerprint photos without scale are useless. If the detailed features of the fingerprint are placed on a plane, not only its individual shape needs to be recorded, but also its two-dimensional coordinates at a fixed position (because the fingerprints of adults basically remain unchanged, so the detailed features are also relatively fixed).

For example, the nth line in the fingerprint has a "small eye" feature, and its distance to the XX line is how far. As long as the data is biased, it cannot be identified.

4. Fingerprint matching is a relatively complicated process that requires the use of special instruments and the participation of professionals.

4


The frequent occurrence of such information security incidents reminds people to do two things:

1. Always pay attention to the security of your personal privacy data;

2. Large technology companies need to be more responsible.

At the same time, for AI technologies including facial recognition, we should perhaps also give them some opportunities for trial and error and correction.

The wheel of time rolls forward, science and technology continue to advance, and everywhere we look are the results of human technological excellence.

People are always afraid of unknown things, but they cannot escape their temptation because they are greedy. Because of greed, human beings are always exploring and developing.

Everything exists dialectically, and rapid development will bring unexpected changes. But there is nothing wrong with technology itself, and we cannot throw the baby out with the bathwater or deny everything because of individual events.

Just like facial recognition, the implementation of this technology has brought people infinite convenience and excellent experience.

After all, there is no absolute security, and Rome was not built in a day.


Previous recommendations




Latest articles about

Database "Suicide Squad" 
Exclusive: Yin Shiming takes over as President of Google Cloud China 
After more than 150 days in space, the US astronaut has become thin and has a cone-shaped face. NASA insists that she is safe and healthy; it is reported that the general manager of marketing of NetEase Games has resigned but has not lost contact; Yuanhang Automobile has reduced salaries and laid off employees, and delayed salary payments 
Exclusive: Google Cloud China's top executive Li Kongyuan may leave, former Microsoft executive Shen Bin is expected to take over 
Tiktok's daily transaction volume is growing very slowly, far behind Temu; Amazon employees exposed that they work overtime without compensation; Trump's tariff proposal may cause a surge in the prices of imported goods in the United States 
OpenAI's 7-year security veteran and Chinese executive officially announced his resignation and may return to China; Yan Shuicheng resigned as the president of Kunlun Wanwei Research Institute; ByteDance's self-developed video generation model is open for use丨AI Intelligence Bureau 
Seven Swordsmen 
A 39-year-old man died suddenly while working after working 41 hours of overtime in 8 days. The company involved: It is a labor dispatch company; NetEase Games executives were taken away for investigation due to corruption; ByteDance does not encourage employees to call each other "brother" or "sister" 
The competition pressure on Douyin products is getting bigger and bigger, and the original hot-selling routines are no longer effective; scalpers are frantically making money across borders, and Pop Mart has become the code for wealth; Chinese has become the highest-paid foreign language in Mexico丨Overseas Morning News 
ByteDance has launched internal testing of Doubao, officially entering the field of AI video generation; Trump's return may be beneficial to the development of AI; Taobao upgrades its AI product "Business Manager" to help Double Eleven丨AI Intelligence Bureau 

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号