1. The authors propose a pan shot face unlock method for mobile device authentication using biometric face information and sensor data from built-in sensors of the device.
2. The approach uses grayscale 2D images with frontal and profile face detection, and different support vector machines and neural networks for face recognition.
3. The authors evaluate the toolchain using the newly created 2013 Hagenberg stereo vision pan shot face database, which includes 30 people with 20 pan shots for each person and recording device. Current results indicate that the approach to face recognition is sufficient for further usage in this research, but face detection is still error-prone for the mobile use case, decreasing the overall performance.
The article "Towards pan shot face unlock: Using biometric face information from different perspectives to unlock mobile devices" proposes a new approach to mobile device authentication using biometric face information from a 180-degree pan shot of the user's head. The authors introduce the 2013 Hagenberg stereo vision pan shot face database and evaluate their pan shot face unlock toolchain, including face detection and recognition using different classifiers.
The article provides a comprehensive review of previous approaches to face detection and recognition, highlighting the standard approach of Viola and Jones as well as Eigenfaces for benchmarking newer approaches. However, the article does not explore potential biases or limitations of these approaches.
The authors acknowledge that current results indicate that the approach to face recognition is sufficient for further usage in this research. However, they note that face detection is still error-prone for the mobile use case, which decreases the overall performance of the toolchain. The article does not provide evidence or explanations for why this may be the case.
The authors also note that their approach does not target high-security systems at present but is intended for personal devices in frequent use. They suggest that improving the security level of their approach may be possible using techniques such as fuzzy cryptography but is currently out of scope.
Overall, while the article provides valuable insights into a new approach to mobile device authentication using biometric face information from different perspectives, it could benefit from exploring potential biases or limitations in previous approaches and providing more evidence or explanations for its own findings.