Goto

Collaborating Authors

 verification system


Roblox's AI-Powered Age Verification Is a Complete Mess

WIRED

Roblox's AI-Powered Age Verification Is a Complete Mess Kids are being identified as adults--and vice versa--on Roblox, while age-verified accounts are already being sold online. Just days after launching, Roblox's much-hyped AI-powered age verification system is a complete mess. Roblox's face scanning system, which estimates peoples' ages before they can access the platform's chat functions, rolled out in the US and other countries around the world last week, after initially launching in a few locations in December. Roblox says it is implementing the system to allow users to safely chat with users of similar ages. But players are already in revolt because they can no longer chat to their friends, developers are demanding Roblox roll back the update, and crucially, experts say that not only is the AI mis-aging young players as adults and vice versa, the system does little to help address the problem it was designed to tackle: the flood of predators using the platform to groom young children.


AEGIS: Preserving privacy of 3D Facial Avatars with Adversarial Perturbations

Wolkiewicz, Dawid, Pechko, Anastasiya, Spurek, Przemysław, Syga, Piotr

arXiv.org Artificial Intelligence

The growing adoption of photorealistic 3D facial avatars, particularly those utilizing efficient 3D Gaussian Splatting representations, introduces new risks of online identity theft, especially in systems that rely on biometric authentication. While effective adversarial masking methods have been developed for 2D images, a significant gap remains in achieving robust, viewpoint-consistent identity protection for dynamic 3D avatars. To address this, we present AEGIS, the first privacy-preserving identity masking framework for 3D Gaussian Avatars that maintains the subject's perceived characteristics. Our method aims to conceal identity-related facial features while preserving the avatar's perceptual realism and functional integrity. AEGIS applies adversarial perturbations to the Gaussian color coefficients, guided by a pre-trained face verification network, ensuring consistent protection across multiple viewpoints without retraining or modifying the avatar's geometry. AEGIS achieves complete de-identification, reducing face retrieval and verification accuracy to 0%, while maintaining high perceptual quality (SSIM = 0.9555, PSNR = 35.52 dB). It also preserves key facial attributes such as age, race, gender, and emotion, demonstrating strong privacy protection with minimal visual distortion.


The Folly of AI for Age Verification

McIlroy-Young, Reid

arXiv.org Artificial Intelligence

In the near future a governmental body will be asked to allow companies to use AI for age verification. If they allow it the resulting system will both be easily circumvented and disproportionately misclassify minorities and low socioeconomic status users. This is predictable by showing that other very similar systems (facial recognition and remote proctoring software) have similar issues despite years of efforts to mitigate their biases. These biases are due to technical limitations both of the AI models themselves and the physical hardware they are running on that will be difficult to overcome below the cost of government ID-based age verification. Thus in, the near future, deploying an AI system for age verification is folly.


Exploiting Multiple Representations: 3D Face Biometrics Fusion with Application to Surveillance

La Cava, Simone Maurizio, Casula, Roberto, Concas, Sara, Orrù, Giulia, Tolosana, Ruben, Drahansky, Martin, Fierrez, Julian, Marcialis, Gian Luca

arXiv.org Artificial Intelligence

3D face reconstruction (3DFR) algorithms are based on specific assumptions tailored to the limits and characteristics of the different application scenarios. In this study, we investigate how multiple state-of-the-art 3DFR algorithms can be used to generate a better representation of subjects, with the final goal of improving the performance of face recognition systems in challenging uncontrolled scenarios. We also explore how different parametric and non-parametric score-level fusion methods can exploit the unique strengths of multiple 3DFR algorithms to enhance biometric recognition robustness. With this goal, we propose a comprehensive analysis of several face recognition systems across diverse conditions, such as varying distances and camera setups, intra-dataset and cross-dataset, to assess the robustness of the proposed ensemble method. The results demonstrate that the distinct information provided by different 3DFR algorithms can alleviate the problem of generalizing over multiple application scenarios. In addition, the present study highlights the potential of advanced fusion strategies to enhance the reliability of 3DFR-based face recognition systems, providing the research community with key insights to exploit them in real-world applications effectively. Although the experiments are carried out in a specific face verification setup, our proposed fusion-based 3DFR methods may be applied to other tasks around face biometrics that are not strictly related to identity recognition.


The Morning After: Nintendo Switch 2 US pre-orders (finally) open Thursday

Engadget

After that whole tariff tango, Nintendo is readying its North American pre-order system for the Switch 2. The original Switch 2 price will remain the same, 450, as will the original 500 for the Nintendo Switch 2 Mario Kart World bundle. However, some Switch 2 accessories will receive price adjustments due to "market conditions." There are some fine-print details attached to pre-ordering directly from Nintendo. You must be 18 years or older, sign in with your Nintendo account and register your interest in pre-ordering. Then, you'll get an invitation email when it's time to play your pre-order, and the invitation will be valid for 72 hours.


GenAI, the future of fraud and why you may be an easy target

FOX News

Don't let fraudsters create a false sense of urgency. If you receive a communication claiming to be from a financial institution, call that institution directly using the official number from its website.


Bilingual Text-dependent Speaker Verification with Pre-trained Models for TdSV Challenge 2024

Farokh, Seyed Ali

arXiv.org Artificial Intelligence

This paper presents our submissions to the Iranian division of the Text-dependent Speaker Verification Challenge (TdSV) 2024. TdSV aims to determine if a specific phrase was spoken by a target speaker. We developed two independent subsystems based on pre-trained models: For phrase verification, a phrase classifier rejected incorrect phrases, while for speaker verification, a pre-trained ResNet293 with domain adaptation extracted speaker embeddings for computing cosine similarity scores. In addition, we evaluated Whisper-PMFA, a pre-trained ASR model adapted for speaker verification, and found that, although it outperforms randomly initialized ResNets, it falls short of the performance of pre-trained ResNets, highlighting the importance of large-scale pre-training. The results also demonstrate that achieving competitive performance on TdSV without joint modeling of speaker and text is possible. Our best system achieved a MinDCF of 0.0358 on the evaluation subset and won the challenge.


Block Induced Signature Generative Adversarial Network (BISGAN): Signature Spoofing Using GANs and Their Evaluation

Amjad, Haadia, Goeller, Kilian, Seitz, Steffen, Knoll, Carsten, Bajwa, Naseer, Tetzlaff, Ronald, Malik, Muhammad Imran

arXiv.org Artificial Intelligence

Deep learning is actively being used in biometrics to develop efficient identification and verification systems. Handwritten signatures are a common subset of biometric data for authentication purposes. Generative adversarial networks (GANs) learn from original and forged signatures to generate forged signatures. While most GAN techniques create a strong signature verifier, which is the discriminator, there is a need to focus more on the quality of forgeries generated by the generator model. This work focuses on creating a generator that produces forged samples that achieve a benchmark in spoofing signature verification systems. We use CycleGANs infused with Inception model-like blocks with attention heads as the generator and a variation of the SigCNN model as the base Discriminator. We train our model with a new technique that results in 80% to 100% success in signature spoofing. Additionally, we create a custom evaluation technique to act as a goodness measure of the generated forgeries. Our work advocates generator-focused GAN architectures for spoofing data quality that aid in a better understanding of biometric data generation and evaluation.


PDAF: A Phonetic Debiasing Attention Framework For Speaker Verification

Baali, Massa, Aldoobi, Abdulhamid, Dhamyal, Hira, Singh, Rita, Raj, Bhiksha

arXiv.org Artificial Intelligence

ABSTRACT Speaker verification systems are crucial for authenticating identity through voice. Traditionally, these systems focus on comparing feature vectors, overlooking the speech's content. The lexical content L determines the phonetic structure a measure of the frequency or duration of phonemes, as a P, which in turn determines the acoustics A. Thus, any production crucial cue in speaker verification. A novel Phoneme-Debiasing Attention of a signal actually represents the draws of all three variables. Framework (PDAF) is introduced, integrating with existing Content-agnostic verification systems, however, only consider the attention frameworks to mitigate biases caused by phonetic dominance. This approach paves the way for more accurate and reliable identity authentication through voice.


Claim Verification in the Age of Large Language Models: A Survey

Dmonte, Alphaeus, Oruche, Roland, Zampieri, Marcos, Calyam, Prasad, Augenstein, Isabelle

arXiv.org Artificial Intelligence

The large and ever-increasing amount of data available on the Internet coupled with the laborious task of manual claim and fact verification has sparked the interest in the development of automated claim verification systems. Several deep learning and transformer-based models have been proposed for this task over the years. With the introduction of Large Language Models (LLMs) and their superior performance in several NLP tasks, we have seen a surge of LLM-based approaches to claim verification along with the use of novel methods such as Retrieval Augmented Generation (RAG). In this survey, we present a comprehensive account of recent claim verification frameworks using LLMs. We describe the different components of the claim verification pipeline used in these frameworks in detail including common approaches to retrieval, prompting, and fine-tuning. Finally, we describe publicly available English datasets created for this task.