fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "R\u00e4ih\u00e4, Johanna", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-12-15T13:19:56Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-12-15T13:19:56Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/92368", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Ihmiset ovat kautta aikojen tunnistaneet toisiaan kasvojen, \u00e4\u00e4nen ja k\u00e4velytyylin perusteella. Tietokoneet ja yleens\u00e4kin tietotekninen kehitys on mahdollistanut kasvojentunnistusteknologian synnyn ja sen kehityksen yhdeksi yleisimm\u00e4ksi tavaksi tunnistaa ihmisi\u00e4 helposti, nopeasti ja tarkasti. Kasvojentunnistusteknologia kehittyy vuosi vuodelta ja sen k\u00e4ytt\u00f6 levi\u00e4\u00e4 usealle eri alalle, kuten turvallisuus-, pankki- ja kaupalliselle alalle tuoden kasvojentunnistusteknologian osaksi meid\u00e4n arkeamme. Sen vuoksi t\u00e4ss\u00e4 tutkielmassa pyrittiin tarkemmin selvitt\u00e4m\u00e4\u00e4n, mink\u00e4laisia hy\u00f6tyj\u00e4 ja haasteita liittyy kasvojentunnistusteknologian hy\u00f6dynt\u00e4miseen tunnistautumisessa. T\u00e4m\u00e4 tutkielma toteutettiin kirjallisuuskatsauksena. Aineistona k\u00e4ytettiin tietokantahakujen avulla l\u00f6ytyneit\u00e4 tieteellisi\u00e4 tutkimuksia ja artikkeleita sek\u00e4 internetist\u00e4 l\u00f6ytyneit\u00e4 aiheeseen liittyvi\u00e4 l\u00e4hteit\u00e4. Tutkielmaa teht\u00e4ess\u00e4 selvisi, ett\u00e4 kasvojentunnistusteknologian hy\u00f6dynt\u00e4miseen tunnistautumisessa liittyi useita erilaisia hy\u00f6tyj\u00e4 sek\u00e4 haasteita, joista valittiin kirjallisuudesta yleisimmin mainitut asiat. T\u00e4h\u00e4n tutkielmaan valittiin seitsem\u00e4n hy\u00f6ty\u00e4 ja kymmenen haastetta. Yleisimpi\u00e4 aineistoista l\u00f6ytyneit\u00e4 hy\u00f6tyj\u00e4 olivat muun muassa ihmiseen kajoamattomuus, nopeus, yhteisty\u00f6n v\u00e4h\u00e4isyys ja v\u00e4\u00e4rent\u00e4misen vaikeus. Kirjallisuudessa nousi esille haasteina, esimerkiksi meikin k\u00e4ytt\u00f6, asentojen ja valaistuksen vaihtelut, jotka saattavat vaikuttaa kasvojentunnistusteknologian tarkkuuteen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Throughout history, people have recognized each other by their face, voice, or gait pattern. Computers and advances in information technology in general have enabled the emergence of facial recognition technology and its develop-ment into one of the most common ways to identify people easily, quickly, and accurately. Facial recognition technology is evolving year by year and its use is spreading to many different fields, such as security, banking and commercial, bringing facial recognition technology into our everyday lives. Therefore, this thesis sought to find out in more detail what kind of benefits and challenges are associated with the use of facial recognition technology in authentication. This thesis was carried out as a literature review. The material used in this the-sis was scientific studies and articles which were found through database searches as well as sources related to the topic found on the Internet. During the process of analysing sources, it became clear that the use of facial recogni-tion technology in authentication was associated with several different benefits and challenges, from which the most mentioned issues in the literature were selected. Seven benefits and ten challenges were selected for this thesis. The most common benefits found in the sources were for example nonintrusive method, speed, less cooperation, and difficulty in forging. The literature used highlighted challenges such as the use of make-up, and variations in poses and lighting, which may affect the accuracy of facial recognition technology.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2023-12-15T13:19:56Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-12-15T13:19:56Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kasvojentunnistusteknologia", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tunnistautuminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "yksityisyydensuoja", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kasvojentunnistusteknologian hy\u00f6dynt\u00e4minen tunnistautumiseen", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202312158361", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "yksil\u00f6nsuoja", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "turvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kasvontunnistus (tietotekniikka)", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tunnistaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyv\u00e4skyl\u00e4 University Library (https://kirjasto.jyu.fi/collections/archival-workstation).", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Tekij\u00e4 ei ole antanut lupaa avoimeen julkaisuun, joten aineisto on luettavissa vain Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6semalta. Ks. https://kirjasto.jyu.fi/kokoelmat/arkistotyoasema..", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}]
|