Face Recognition Technologies

Designing Systems that Protect Privacy and Prevent Bias

Douglas Yeung, Rebecca Balebako, Carlos Ignacio Gutierrez Gaviria, Michael Chaykowsky

ResearchPublished May 14, 2020

The objective of face recognition technologies (FRTs) is to efficiently detect and recognize people captured on camera. Although these technologies have many practical security-related purposes, advocacy groups and individuals have expressed apprehensions about their use. The research reported here was intended to highlight for policymakers the high-level privacy and bias implications of FRT systems. In the report, the authors describe privacy as a person's ability to control information about them. Undesirable bias consists of the inaccurate representation of a group of people based on characteristics, such as demographic attributes. Informed by a literature review, the authors propose a heuristic with two dimensions: consent status (with or without consent) and comparison type (one-to-one or some-to-many). This heuristic can help determine a proposed FRT's level of privacy and accuracy. The authors then use more in-depth case studies to identify "red flags" that could indicate privacy and bias concerns: complex FRTs with unexpected or secondary use of personal or identifying information; use cases in which the subject does not consent to image capture; lack of accessible redress when errors occur in image matching; the use of poor training data that can perpetuate human bias; and human interpretation of results that can introduce bias and require additional storage of full-face images or video. This report is based on an exploratory project and is not intended to comprehensively introduce privacy, bias, or FRTs. Future work in this area could include examinations of existing systems, reviews of their accuracy rates, and surveys of people's expectations of privacy in government use of FRTs.

Key Findings

Every system requires a trade-off between accuracy and privacy

  • Systems that obtain the subject's consent are more accurate than those that do not.
  • Systems that match one subject image with one stored image, such as device authentication and mug shots, perform verification.
  • Systems that check one or more subject images against multiple images, such as social media identity verification and surveillance cameras, perform identification.
  • The most-accurate systems also have the lowest privacy risk: systems that obtain the subject's consent for one-on-one verification. One example would be passport authentication at a border.
  • Medium-accuracy systems with low privacy risk include visa screenings; those with high privacy risk include detainee identification.
  • The least accurate systems have high privacy risk and include face-in-a-crowd airport surveillance.

No unified set of rules governs the use of face recognition technologies

  • Multiple laws and regulations create a disjointed policy environment, limiting the extent to which privacy and bias concerns can be mitigated for these implementations.

Recommendations

  • For any technology that gathers personally identifiable information, such as facial characteristics, in public settings, strive to protect those data, use anonymization or other means to reduce the amount of those data available, and establish rigorous user protocols to limit unauthorized access.
  • Carefully consider the composition and size of either training or targeting data sets to discern the potential for skewing face recognition algorithms.
  • Design blacklists that avoid bias, and identify thresholds that produce acceptable rates of false-positive facial matches in security-related applications.

Order a Print Copy

Format
Paperback
Page count
88 pages
List Price
$28.00
Buy link
Add to Cart

Topics

Document Details

  • Availability: Available
  • Year: 2020
  • Print Format: Paperback
  • Paperback Pages: 88
  • Paperback Price: $28.00
  • Paperback ISBN/EAN: 978-1-9774-0455-8
  • DOI: https://doi.org/10.7249/RR4226
  • Document Number: RR-4226-RC

Citation

RAND Style Manual
Yeung, Douglas, Rebecca Balebako, Carlos Ignacio Gutierrez Gaviria, and Michael Chaykowsky, Face Recognition Technologies: Designing Systems that Protect Privacy and Prevent Bias, Homeland Security Operational Analysis Center operated by the RAND Corporation, RR-4226-RC, 2020. As of September 11, 2024: https://www.rand.org/pubs/research_reports/RR4226.html
Chicago Manual of Style
Yeung, Douglas, Rebecca Balebako, Carlos Ignacio Gutierrez Gaviria, and Michael Chaykowsky, Face Recognition Technologies: Designing Systems that Protect Privacy and Prevent Bias. Homeland Security Operational Analysis Center operated by the RAND Corporation, 2020. https://www.rand.org/pubs/research_reports/RR4226.html. Also available in print form.
BibTeX RIS

This independent research was conducted using internal funding generated from operations of the Homeland Security Research Division (HSRD) and within the HSRD Acquisition and Development Program.

This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.