{"id":67,"date":"2015-05-13T12:02:53","date_gmt":"2015-05-13T11:02:53","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/sjg\/?p=67"},"modified":"2015-05-13T12:16:28","modified_gmt":"2015-05-13T11:16:28","slug":"kent-researchers-awarded-major-epsrc-grant","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/sjg\/2015\/05\/13\/kent-researchers-awarded-major-epsrc-grant\/","title":{"rendered":"Kent researchers awarded major EPSRC grant"},"content":{"rendered":"<h3>Improving cyber security using realistic synthetic face generation<\/h3>\n<p>The grant application outlines a novel programme of research that questions the uniqueness of facial identity and investigates the use of computer generated face imagery in the area of cyber security. The popularity of the human face as a biometric remains strong despite the introduction of many competing modalities. People are accustomed to being identified by their facial appearance whereas other biometrics such as fingerprints and iris recognition feel more invasive. A programme of research that investigates the concept of identity that is highly relevant to cyber security is proposed. In addition we will develop a novel cyber security application based on facial identity and evaluate its practical security level.<\/p>\n<figure id=\"attachment_69\" aria-describedby=\"caption-attachment-69\" style=\"width: 294px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/blogs.kent.ac.uk\/sjg\/files\/2015\/05\/face319x325.png\"><img loading=\"lazy\" class=\"size-medium wp-image-69\" src=\"http:\/\/blogs.kent.ac.uk\/sjg\/files\/2015\/05\/face319x325-294x300.png\" alt=\"Synthetic face generated by Kent team's model\" width=\"294\" height=\"300\" srcset=\"https:\/\/blogs.kent.ac.uk\/sjg\/files\/2015\/05\/face319x325-294x300.png 294w, https:\/\/blogs.kent.ac.uk\/sjg\/files\/2015\/05\/face319x325.png 319w\" sizes=\"(max-width: 294px) 100vw, 294px\" \/><\/a><figcaption id=\"caption-attachment-69\" class=\"wp-caption-text\">Synthetic face generated by Kent team&#8217;s model<\/figcaption><\/figure>\n<p>Work of this nature has relevance beyond the scope of the project. For example, border control officers routinely verify a person&#8217;s identity using passport photos but what is the fundamental limit on the ability to achieve this task reliably?<\/p>\n<p>Principal Investigator Stuart Gibson (SPS), Co-Investigators: Julio Hernandez-Castro (School of Computing) &amp; Chris Solomon (SPS).<\/p>\n<p>The award coincides with Kent\u2019s recent success in securing an <a href=\"http:\/\/www.cybersec.kent.ac.uk\/\" target=\"_blank\">Excellence in Cyber Security Research award<\/a>, supported by GCHQ and EPSRC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Improving cyber security using realistic synthetic face generation The grant application outlines a novel programme of research that questions the uniqueness of facial identity and investigates the use of computer generated face imagery in the area of cyber security. The popularity of the human face as a biometric remains strong despite the introduction of many &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/sjg\/2015\/05\/13\/kent-researchers-awarded-major-epsrc-grant\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Kent researchers awarded major EPSRC grant<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":34698,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/posts\/67"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/users\/34698"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":3,"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/posts\/67\/revisions"}],"predecessor-version":[{"id":72,"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/posts\/67\/revisions\/72"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/media?parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/categories?post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/sjg\/wp-json\/wp\/v2\/tags?post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}