Shrimpton, SL (2018) Facial creation: using compositing to conceal identity. Doctoral thesis, Liverpool John Moores University.
|
Text
2018ShrimptonPhD.pdf - Published Version Download (5MB) | Preview |
|
Text
2018ShrimptonPhDInternal.pdf - Submitted Version Restricted to Repository staff only Download (7MB) |
||
|
Text
2018ShrimptonPhDAppendix A.pdf - Supplemental Material Download (165kB) | Preview |
|
|
Text
2018ShrimptonPhDAppendix B.pdf - Supplemental Material Download (175kB) | Preview |
|
|
Text
2018ShrimptonPhDAppendix C.pdf - Supplemental Material Download (265kB) | Preview |
|
|
Text
2018ShrimptonPhDAppendix D.pdf - Supplemental Material Download (79kB) | Preview |
|
|
Text
2018ShrimptonPhDAppendix E.pdf - Supplemental Material Download (1MB) | Preview |
|
|
Text
2018ShrimptonPhDAppendix F.pdf - Supplemental Material Download (242kB) | Preview |
|
Text
2018ShrimptonPhDInternalAppendix G.pdf - Supplemental Material Restricted to Repository staff only Download (1MB) |
||
Text
2018ShrimptonPhDInternalAppendix H.pdf - Supplemental Material Restricted to Repository staff only Download (1MB) |
||
Text
2018ShrimptonPhDInternalAppendix I.pdf - Supplemental Material Restricted to Repository staff only Download (497kB) |
||
Text
2018ShrimptonPhDInternalAppendix J.pdf - Supplemental Material Restricted to Repository staff only Download (1MB) |
||
Text
2018ShrimptonPhDInternalPermissions.pdf - Supplemental Material Restricted to Repository staff only Download (239kB) |
Abstract
This study focused on the creation of new faces by compositing features from donor face photographs together that provide a way to generate new face identities. However, does the act of compositing conceal the identity of the donor faces? Two applications of these created faces require donor face identities to remain concealed: Covert social media profiles provide a way for investigating authorities to survey online criminal activity and, as such, a false online identity, including face image, is required. Compositing features/face parts from various donor face photographs could be used to generate new face identities. Face donor photographs are also used for the ‘texturing’ of facial depictions to reconstruct an image of how a person might appear. This study investigated whether compositing unknown face features onto known familiar faces (celebrities and lecturers) was sufficient to conceal identity in a face recognition task paradigm. A first experiment manipulated individual features to establish a feature saliency hierarchy. The results of this informed the order of feature replacement for the second experiment, where features were replaced in a compound manner to establish how much of a face needs to be replaced to conceal identity. In line with previous literature, the eyes and hair were found to be highly salient, with the eyebrows and nose the least. As expected, the more features that are replaced, the less likely the face was to be recognised. A theoretical criterion point from old to new identity was found for the combined data (celebrity and lecturer) where replacing at least two features resulted in a significant decrease in recognition. Which feature was being replaced was found to have more of an effect during the middle part of feature replacement, around the criterion point, where the eyes were more important to be replaced than the mouth. Celebrities represented a higher level of familiarity and, therefore, may be a more stringent set of results for practical use, but with less power than the combined data to detect changes. This would suggest that at least three features (half the face) need to be replaced before recognition significantly decreases, especially if this includes the more salient features in the upper half of the face. However, once all six features were replaced, identity was not concealed 100% of the time, signifying that feature replacement alone was not sufficient to conceal identity. It is completely possible that residual configural and contrast information was facilitating recognition, and, therefore, it is likely that manipulations, such as these, are also needed in order to conceal identity.
Item Type: | Thesis (Doctoral) |
---|---|
Uncontrolled Keywords: | compositing; face recognition; facial identification |
Subjects: | N Fine Arts > N Visual arts (General) For photography, see TR Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Art & Design |
Date Deposited: | 05 Jul 2018 13:59 |
Last Modified: | 09 Sep 2022 14:54 |
DOI or ID number: | 10.24377/LJMU.t.00008919 |
Supervisors: | Wilkinson, C, Frowd, C and Rowland, C |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/8919 |
View Item |