scholarly journals More human than human: a Turing test for photographed faces

Author(s):  
Jet Gabrielle Sanders ◽  
Yoshiyuki Ueda ◽  
Sakiko Yoshikawa ◽  
Rob Jenkins

Abstract Background Recent experimental work has shown that hyper-realistic face masks can pass for real faces during live viewing. However, live viewing embeds the perceptual task (mask detection) in a powerful social context that may influence respondents’ behaviour. To remove this social context, we assessed viewers’ ability to distinguish photos of hyper-realistic masks from photos of real faces in a computerised two-alternative forced choice (2AFC) procedure. Results In experiment 1 (N = 120), we observed an error rate of 33% when viewing time was restricted to 500 ms. In experiment 2 (N = 120), we observed an error rate of 20% when viewing time was unlimited. In both experiments we saw a significant performance cost for other-race comparisons relative to own-race comparisons. Conclusions We conclude that viewers could not reliably distinguish hyper-realistic face masks from real faces in photographic presentations. As well as its theoretical interest, failure to detect synthetic faces has important implications for security and crime prevention, which often rely on facial appearance and personal identity being related.

2018 ◽  
Vol 566 (1) ◽  
pp. 21-29 ◽  
Author(s):  
Adam Andrzejewski

The publication focuses on the connection between humans' personal identity and activity on social networks. Facebook and Instagram are a kind of (cyber-communication) sphere in which we are able to communicate with everyone who belongs to these (cyber-)communities. It allows us to publish our photos, memories, current activities, and videos while simultaneously allowing the portal’s other users to observe our life and expression of our Self. In this (cyber-)social space, people are able to create their image and (cyber-)identity in a psychological and social context, encounter a variety of (personal) experiences, but also gain popularity – sometimes at all cost, at the expense of their health and life. The following issues are discussed in the publication: 1. (People's cyber-)identity created on the social networks: Facebook and Instagram. 2. Self-esteem depending on the number of "likes." 3. "Ultimate selfie" - the popularity for which you pay with your life.


Image processing is a field that is widely used in medical science to identify various cancers or tumors. Diagnosing liver cancer is not an easy task and is usually performed by doctors and diagnosed manually. Filtering technique should be used precisely by not compromising the sensitive information. Most of the technique may distort the actual information that causes false alarm rate. A liver is an uneven or bit complex in structure where there are various spots may be considered as tumor that provokes the system towards invalid turing test. This paper proposes a system that would be able to recognize cancer automatically from a tomographical image along with high precision that stabilize the system with less processing time. Here the objective of the system is to obtain the result using Sobel operator that retains edges and eroding the unwanted areas and preceding high accuracy with less error rate. System also intended to extract the impaired area that has been affected by liver cancer. System acquired the better precision rate as compare to the previously implemented systems with minimal error rate.


2021 ◽  
Author(s):  
Yuqian Xu ◽  
Tom Fangyun Tan ◽  
Serguei Netessine

Operational risk has been among the three most significant types of risks in the financial services industry, and its management is mandated by Basel II regulations. To inform better labor decisions, this paper studies how workload affects banks’ operational risk event occurrence. To achieve this goal, we use a unique data set from a commercial bank in China that contains 1,441 operational risk events over 16 months. We find that workload has a U-shaped impact on operational risk error rate. More specifically, the error rate of operational risk events decreases first, as workload increases, and then increases. Furthermore, when workload is low, employees tend to make performance-seeking risks; however, when workload is high, employees tend to exhibit quality degradation due to cognitive multitasking. Based on the causal relationship between workload and operational risk events from the empirical analysis, we discuss staffing policies among branches aimed at reducing operational risk losses. We find that employing a flexible staffing rule can significantly reduce the number of operational risk events by 3.2%–10% under different scenarios. In addition, this significant performance improvement can be achieved by adding even a little bit of flexibility to the process by allowing employees to either switch their business lines in the same branch or switch branches within the same business lines on a quarterly basis. This paper was accepted by Vishal Gaur, operations management.


2020 ◽  
Vol 10 (3) ◽  
pp. 1120
Author(s):  
Durkhyun Cho ◽  
Jin Han Lee ◽  
Il Hong Suh

We live in an era of privacy concerns. As smart devices such as smartphones, service robots and surveillance cameras spread, preservation of our privacy becomes one of the major concerns in our daily life. Traditionally, the problem was resolved by simple approaches such as image masking or blurring. While these provide effective ways to remove identities from images, there are certain limitations when it comes to a matter of recognition from the processed images. For example, one may want to get ambient information from scenes even when privacy-related information such as facial appearance is removed or changed. To address the issue, our goal in this paper is not only to modify identity from faces but also keeps facial attributes such as color, pose and facial expression for further applications. We propose a novel face de-identification method based on a deep generative model in which we design the output vector from an encoder to be disentangled into two parts: identity-related part and the rest representing facial attributes. We show that by solely modifying the identity-related part from the latent vector, our method effectively modifies the facial identity to a completely new one while the other attributes that are loosely related to personal identity are preserved. To validate the proposed method, we provide results from experiments that measure two different aspects: effectiveness of personal identity modification and facial attribute preservation.


2020 ◽  
Author(s):  
Jim Albert Charlton Everett ◽  
Joshua August Skorburg ◽  
Julian Savulescu

Recent research has begun treating the perennial philosophical question, “what makes a person the same over time?” as an empirical question. A long tradition in philosophy holds that psychological continuity and connectedness of memories are at the heart of personal identity. More recent experimental work, following Strohminger & Nichols (2014), has suggested that persistence of moral character, more than memories, is perceived as essential for personal identity. While there is a growing body of evidence supporting these findings, a critique by Starmans & Bloom (2018) suggests that this research program conflates personal identity with mere similarity. To address this criticism, we explore how loss of someone’s morality or memories influence perceptions of identity change, and perceptions of moral duties towards the target of the change. We present participants with a classic ‘body switch’ thought experiment and after assessing perceptions of identity persistence, we present a moral dilemma, asking participants to imagine that one of the patients must die (Study 1) or be left alone in a care home for the rest of their life (Study 2). Our results highlight the importance of the continuity of moral character, suggesting lay intuitions are tracking (something like) personal identity, not just mere similarity.


2017 ◽  
Vol 9 (1) ◽  
Author(s):  
Rachel Thomas

Photo-lithographs, paper.My research is interested in how definitions and labels pertaining to mental illness permeate into a broader social context. I discovered that when an individual has been marked with a particular diagnosis, two distinct identities are formed as a means of protection from stigma. Using David Hume’s theory of Personal Identity, I concluded that each of these identities served a specific purpose for the individual and, while they fluctuated depending on the situation, stayed isolated from one another. The two identities consisted of a fortuitous public and socially acceptable façade, and a private, vulnerability indulged form beneath.


Author(s):  
Sheng Chen

Adaptive beamforming is capable of separating user signals transmitted on the same carrier frequency, and thus provides a practical means of supporting multiusers in a space-division multiple-access scenario. Moreover, for the sake of further improving the achievable bandwidth efficiency, high-throughput quadrature amplitude modulation (QAM) schemes have become popular in numerous wireless network standards, notably, in the recent WiMax standard. This contribution focuses on the design of adaptive beamforming assisted detection for the employment in multiple-antenna aided multiuser systems that employ the high-order QAM signalling. Traditionally, the minimum mean square error (MMSE) design is regarded as the state-of-the-art for adaptive beamforming assisted receiver. However, the recent work (Chen et al., 2006) proposed a novel minimum symbol error rate (MSER) design for the beamforming assisted receiver, and it was demonstrated that this MSER design provides significant performance enhancement, in terms of achievable symbol error rate, over the standard MMSE design. This MSER beamforming design is developed fully in this contribution. In particular, an adaptive implementation of the MSER beamforming solution, referred to as the least symbol error rate algorithm, is investigated extensively. The proposed adaptive MSER beamforming scheme is evaluated in simulation, in comparison with the adaptive MMSE beamforming benchmark.


2020 ◽  
pp. 1-12
Author(s):  
Wang Hui ◽  
Li Aiyuan

This paper algorithms based on neural network model designed for English education, to develop a model education system with artificial intelligence, summarized the dimensions were can be used for data analysis related indicators. These indicators include not only the contents of the learning behavior, test behavior, cooperation behavior and resource search behavior and other human-computer interaction behavior data, also includes demographic background information, learning ability, learning attitude, and other characteristic data that affect the learning effect. We tried to collect relevant indicators to the maximum extent. An audiovisual fusion method based on Convolutional Neural Network (CNN) is proposed. The independent CNN structure is used to realize independent modeling of audiovisual perception and asynchronous information transmission and obtain the description of audiovisual parallel data in the high-dimensional feature space. Following the shared fully connected structure, it is possible to model the long-term dependence of audiovisual parallel data in a higher dimension. Experiments show that the AVSR system built using a CNN-based audiovisual fusion method can achieve a significant performance improvement, and its recognition error rate is relatively reduced by about 15%. The speech recognition system trained with the cross-domain adaptive method can obtain a significant performance improvement, and its recognition error rate is more than 10% lower than that of the baseline system..


2013 ◽  
Vol 37 (3) ◽  
pp. 82-98 ◽  
Author(s):  
Parag Chordia ◽  
Sertan Şentürk

In many non-Western musical traditions, such as North Indian classical music (NICM), melodies do not conform to the major and minor modes, and they commonly use tunings that have no fixed reference (e.g., A = 440 Hz). We present a novel method for joint tonic and raag recognition in NICM from audio, based on pitch distributions. We systematically compare the accuracy of several methods using these tonal features when combined with instance-based (nearest-neighbor) and Bayesian classifiers. We find that, when compared with a standard twelve-dimensional pitch class distribution that estimates the relative frequency of each of the chromatic pitches, smoother and more continuous tonal representations offer significant performance advantages, particularly when combined with appropriate classification techniques. Best results are obtained using a kernel-density pitch distribution along with a nearest-neighbor classifier using Bhattacharyya distance, attaining a tonic error rate of 4.2 percent and raag error rate of 10.3 percent (with 21 different raag categories). These experiments suggest that tonal features based on pitch distributions are robust, reliable features that can be applied to complex melodic music.


2021 ◽  
Vol 38 (2) ◽  
pp. 1-16
Author(s):  
Nebojša Šarkić ◽  
Dalibor Krstinić ◽  
Katarina Petrović

The right to the personal name represents the most important expression of a personal identity, as well as an absolute subjective right of every individual. Furthermore, the individual is, through the personal name, distinguished in the known and social context, and it is also the means through which the state identifies its subjects. Without the existence of the personal name, the life within a community would be unimaginable, which means that this type of individualization is as old as the very human society. Nevertheless, through time, the means of such an individualization have been changed. Today, in Republic of Serbia, the personal name consists of a surname by which the belonging to a certain family community is expressed, and a name through which he/she is individualized within that community. The question of a personal name in our country is regulated by the Family Law and it is guaranteed by the Constitution. Given the importance of the personal name, the aim of this paper will be to demonstrate the important questions pertaining to the personal name, as well as the Family Law norms, by which it is regulated within the lawful context of Republic of Serbia.


Sign in / Sign up

Export Citation Format

Share Document