Kingston College L3 Study Skills Assignment: Face Detection Research

Verified

Added on  2023/03/23

|2
|743
|61
Homework Assignment
AI Summary
This assignment, conducted as part of an L3 study skills unit at Kingston College, delves into the topic of face detection technology, specifically examining its safety and usability on smartphones. The student analyzes three sources: Baqeel and Saeed's research on face detection authentication, Venditti, Fleming, and Kugelmeyer's work on algorithmic surveillance, and deAgonia's explanation of Apple's Face ID. The assignment requires defining a hypothesis, specifying the scope of research, and conducting research using the provided sources. The student employs active reading and analyzing techniques to identify key points, evaluate implicit meanings, and address questions regarding the security, reliability, and functionality of facial recognition systems, including Apple's Face ID. The analysis considers the perspectives of smartphone manufacturers, usability issues, and potential risks associated with biometric data collection and algorithmic surveillance. The assignment emphasizes the development of research skills, source analysis, and synthesizing information to form conclusions regarding the use of face detection technology.
Document Page
Assignment Brief and Feedback form
(L3 study skills unit with single assignment)
Description of Assignment:
Source title with references
Baqeel, H. and Saeed, S., 2019, April. Face detection authentication on
Smartphones: End Users Usability Assessment Experiences. In 2019 International
Conference on Computer and Information Sciences (ICCIS) (pp. 1-6). IEEE.
The question(s) to which you were seeking answers
Is face detection technology is safe or not on Smartphone?
Explain which reading techniques you used, explaining why they were used
Active reading: I used this particular method to understand and evaluate the
research question.
Itemise the key points in the source, relevant to your question/s
Secure and reliable biometrics method
Face identification technique
Usability issues
Unlocking the phone
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
As per the author of this paper “The Smartphone manufacturers claim that this
technology is the most secure and reliable biometrics methods. This paper
investigates the usability aspects of face identification technique embedded in these
Smartphones”. By this statement, it is analyzed that new Smartphones by Apple
have used the facial features for recognizing the iPhone users. From this paper, the
survey has shown that half of the users are being satisfied with the face detection
technique.
Source title with references
Venditti, L.F., Fleming, J. and Kugelmeyer, K., 2019. Algorithmic Surveillance: A
Hidden Danger in Recognizing Faces.
The question(s) to which you were seeking answers
Why is it important to study facial recognition and bias?
Explain which reading techniques you used, explaining why they were used
Analyzing: I used this method to answer to the selected research question.
Itemise the key points in the source, relevant to your question/s
Algorithm surveillance
Facial recognition system
Neural network
Facial geometry
Human brain
Biometric data
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
As per the author of this paper “Biometric data collection includes a person’s “unique
physical, physiological, and behavioral characteristics” making this data potentially
dangerous if it falls into the wrong hands and is misused or violated”. By this
statement, it is seen that face recognition system is placed in such a way that it is not
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Assignment Brief and Feedback form
(L3 study skills unit with single assignment)
used by others and hacked by others so that no one can get access to it. In the
Smartphone network, data protection law is used to create the privacy law behind
usage of the phone devices.
Source title with references
deAgonia, M. (2017). Apple's Face ID [The iPhone X's facial recognition tech]
explained. [online] Computerworld. Available at:
https://www.computerworld.com/article/3235140/apples-face-id-the-iphone-xs-facial-
recognition-tech-explained.html [Accessed 12 Jun. 2019].
The question(s) to which you were seeking answers
What Face ID does and why it is more secure than Touch ID?
Explain which reading techniques you used, explaining why they were used
Explain: This technique helps to explain Face ID of Apple.
Itemise the key points in the source, relevant to your question/s
Apple’s cutting edge iPhone X Smartphone
Futuristic seeming tech
Tried-and-true fingerprint based touch ID
Face authentication
Facial recognition
Explain any examples of implicit meaning in the source, evaluating the effect
and purpose of implied meaning within it
As per the author of this paper Apple's Face ID system uses Apple's Machine
Learning algorithms and a "Neural engine" hardware component built into the A11
processor to analyze and recognize your face”. It keeps up-to-date with change into
the face appearances like growing of bread and wearing of the sunglasses. The
application is unlocked accessed by the Touch ID will be accessible by the Face ID.
There is protection of the recorded biometric data and defined as the authentication
system of the devices.
2
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]