{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

Facing the Facts to Keep Our Biometrics Secure

A lot of makeup, a wig, and a fake mustache—all for science

NIST researcher Mei Lee Ngan disguised herself to look like the TV character Ron Swanson and was unable to unlock her phone with this disguise. Credit: NIST

Mei Lee Ngan
Tue, 10/29/2024 - 12:03
  • Comment
  • RSS

Social Sharing block

  • Print
Body

I once transformed my face to look like Ron Swanson—for science.

ADVERTISEMENT

I never thought disguising myself with wigs and makeup would be part of my job, but as a NIST facial recognition researcher I sometimes do just that. To make myself look like the gruff character from the show Parks and Recreation, I applied a lot of makeup, a wig, and a fake mustache.

With that look, I could no longer unlock my cellphone with my own face.

This is an example of what we facial recognition researchers call a “presentation attack.” A presentation attack is often used when someone is trying to look like someone else or to not be seen as themselves. A presentation attacker wants to fake someone else’s face or look like anyone but themselves to avoid being picked up by facial recognition technology. 

Although my Ron Swanson experiment was innocent, people thwarting facial recognition technology can have scary results.

For example, an attacker could copy a person’s identity by using that person’s photo to bypass facial recognition to gain access to the victim’s phone or bank account.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us