Evaluating automated facial age estimation techniques for digital forensics
Published in 2018 IEEE Security and Privacy Workshops (SPW), 2018
Recommended citation: F Anda, D Lillis, NA Le-Khac, M Scanlon. (2018). "Evaluating automated facial age estimation techniques for digital forensics." 2018 IEEE Security and Privacy Workshops (SPW). 129-139. http://4nd4.github.io/files/EvaluatingFacialAge.pdf
In today’s world, closed circuit television, cellphone photographs and videos, open-source intelligence (i.e., social media/web data mining), and other sources of photographic ev- idence are commonly used by police forces to identify suspects and victims of both online and offline crimes. Human charac- teristics, such as age, height, weight, gender, hair color, etc., are often used by police officers and witnesses in their description of unidentified suspects. In certain circumstances, the age of the victim can result in the determination of the crime’s cate- gorization, e.g., child abuse investigations. Various automated machine learning-based techniques have been implemented for the analysis of digital images to detect soft biometric traits, such as age and gender, and thus aid detectives and investigators in progressing their cases. This paper documents an evaluation of existing cognitive age prediction services. The evaluative and comparative analysis of the various services was conducted to identify trends and issues inherent to their performance. One significant contributing factor impeding the accurate development of the services investigated is the notable lack of sufficient sample images in specific age ranges, i.e., underage and elderly. To overcome this issue, a dataset generator was developed, which harnesses collections of several unbalanced datasets and forms a balanced, curated dataset of digital images annotated with their corresponding age and gender.
Recommended citation: F Anda, D Lillis, NA Le-Khac, M Scanlon. (2018). “Evaluating automated facial age estimation techniques for digital forensics” 2018 IEEE Security and Privacy Workshops (SPW). 129-139.