{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T01:59:02Z","timestamp":1773367142821,"version":"3.50.1"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>This article takes a design-driven human-centred approach to Facial Recognition Technology (FRT). In a process of Research through Design, we first generated 120 ways to dodge face recognition, then distilled and tested 50 concepts in the lab. The 19 disguises that successfully bypasses FRT informed the implementation of seven disguises initially tested with 14 white participants walking through a hall, a corridor and a control gate. The control gate led to a larger study (39 participants of different ethnicities) to assess the effectiveness of the disguises in bypassing three open source FR models using three different distance metrics and four backends. We compare our real-life evaluation of design-generated disguises against previous and current computing research: while maliciously crafted digital perturbation attacks work well, they do not capture the complexity of live FRT opening up opportunities for future research.<\/jats:p>","DOI":"10.1145\/3769675","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T04:49:31Z","timestamp":1760590171000},"page":"1-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design-driven Deception of Face Recognition: An Empirical Study"],"prefix":"10.1145","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4103-3565","authenticated-orcid":false,"given":"Daniela","family":"Petrelli","sequence":"first","affiliation":[{"name":"Department of Design, Politecnico di Milano, Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1841-5848","authenticated-orcid":false,"given":"Nick","family":"Dulake","sequence":"additional","affiliation":[{"name":"Art Design and Media Research Centre, Sheffield Hallam University, Sheffield, United\u00a0Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5660-3407","authenticated-orcid":false,"given":"Gianni","family":"Molinari","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universita degli Studi di Torino, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5817-4810","authenticated-orcid":false,"given":"Fabio","family":"Ciravegna","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Universita degli Studi di Torino, Torino, Italy"}]}],"member":"320","published-online":{"date-parts":[[2026,2,25]]},"reference":[{"issue":"82","key":"e_1_3_3_2_1","first-page":"1","article-title":"Face recognition and privacy in the age of augmented reality","volume":"6","author":"Acquisti Alessandro","year":"2014","unstructured":"Alessandro Acquisti, Ralph Gross, and Fred Stutzman. 2014. Face recognition and privacy in the age of augmented reality. Journal of Privacy and Confidentiality 6, 82 (2014), 1\u201320.","journal-title":"Journal of Privacy and Confidentiality"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906412"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.32660688"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00077-w"},{"key":"e_1_3_3_6_1","unstructured":"BBC. 2019. Apple AI accused of leading to man\u2019s wrongful arrest. BBC News. 23 April 2019. Retrieved from https:\/\/www.bbc.co.uk\/news\/technology-48022890"},{"key":"e_1_3_3_7_1","unstructured":"Johana Bhuiyan. 2023. Rite Aid facial recognition misidentified Black Latino and Asia people as \u2018likely\u2019 shoplifter. The Guardian. 20 December 2023. Retrieved from https:\/\/www.theguardian.com\/technology\/2023\/dec\/20\/rite-aid-shoplifting-facial-recognition-ftc-settlement"},{"key":"e_1_3_3_8_1","unstructured":"Johana Bhuiyan. 2024. Facial recognition used after sunglass hut robbery led to man\u2019s wrongfully jailing say suit. The Guardian. 23 January 2024. Retrieved from https:\/\/www.theguardian.com\/technology\/2024\/jan\/22\/sunglass-hut-facial-recognition-wrongful-arrest-lawsuit"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.04.004"},{"key":"e_1_3_3_10_1","first-page":"1578","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops","author":"Boutros Fadi","year":"2022","unstructured":"Fadi Boutros, Naser Damer, Florian Kirchbuchner, and Arjan Kuijper. 2022. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, 1578\u20131587."},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2023.104688"},{"key":"e_1_3_3_12_1","volume-title":"Change by Design: How Design Thinking Transforms Organisations and Inspires Innovation","author":"Brown Tim","year":"2009","unstructured":"Tim Brown. 2009. Change by Design: How Design Thinking Transforms Organisations and Inspires Innovation. Harper Collins."},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-021-00022-x"},{"key":"e_1_3_3_14_1","first-page":"1","article-title":"Gender shades: Intersectional accuracy disparities in commercial gender classification","volume":"81","author":"Buolamwini Joy","year":"2018","unstructured":"Joy Buolamwini and Tinit Gebru. 2018. Gender shades: Intersectional accuracy disparities in commercial gender classification. Proceedings of Machine Learning Research 81, (2018), 1\u201315.","journal-title":"Proceedings of Machine Learning Research"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-020-03186-4"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947686"},{"key":"e_1_3_3_17_1","unstructured":"Tom Chivers. 2019. Facial recognition\u2026 coming to a supermarket near you. The Guardian 4 August 2019. Retrieved from https:\/\/www.theguardian.com\/technology\/2019\/aug\/04\/facial-recognition-supermarket-facewatch-ai-artificial-intelligence-civil-liberties"},{"key":"e_1_3_3_18_1","unstructured":"Peter Fussey and Daragh Murray. 2019. Independent Report on the London Metropolitan Police Service\u2019s Trial of Live Facial Recognition Technology. Project Report. University of Essex Human Rights Centre. Retrieved from https:\/\/repository.essex.ac.uk\/24946\/"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_3_20_1","unstructured":"Amy Hawkins. 2018. Beijing\u2019s Big Brother Tech Needs African Faces. Foreign Policy. July 24 2018. Retrieved from https:\/\/foreignpolicy.com\/2018\/07\/24\/beijings-big-brother-tech-needs-african-faces\/"},{"key":"e_1_3_3_21_1","volume-title":"The New York Times","author":"Hill Kashmir","year":"2023","unstructured":"Kashmir Hill. 2023. The Secretive Company That Might End Privacy as We Know It. The New York Times. International Edition. January 6, 2023."},{"key":"e_1_3_3_22_1","volume-title":"The New York Times","author":"Hill Kashmir","year":"2020","unstructured":"Kashmir Hill. 2020. Eight Months Pregnant Woman Arrested after False Facial Recognition Match. The New York Times. August 20, 2020."},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_9"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19300"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20020342"},{"key":"e_1_3_3_27_1","volume-title":"Design Research Through Practice: From the Lab, Field and Showroom","author":"Koskinen Ilpo","year":"2011","unstructured":"Ilpo Koskinen, John Zimmerman, Tomas Binder, Johan Redstr\u00f6m, and Stephan Wensveen. 2011. Design Research Through Practice: From the Lab, Field and Showroom. Morgan Kaufmann."},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747469"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605004"},{"key":"e_1_3_3_31_1","unstructured":"Tony Mansfield. 2023. Facial Recognition Technology in Law Enforcement Equitability Study (Final Report). NPL Report MS 43chromeextension:\/\/efaidnbmnnnibpcajpcglclefindmkaj\/. Retrieved from https:\/\/science.police.uk\/site\/assets\/files\/3396\/frt-equitability-study_mar2023.pdf"},{"key":"e_1_3_3_32_1","unstructured":"Tom Murphy. 2023. Rite Aid Banned from Facial Recognition Tech Use for 5 years after Faulty Theft Targeting in Store. Time. 20 December 2023. Retrieved from https:\/\/time.com\/6549652\/rite-aid-banned-facial-recognition-tech\/"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_2"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBIRCON48586.2019.8958134"},{"key":"e_1_3_3_36_1","unstructured":"Alina Polyakova and Chris Meserole. 2019. Exporting digital authoritarianism. Brookings Foreign Policy. Democracy and Disorder. Retrieved from https:\/\/www.brookings.edu\/wp-content\/uploads\/2019\/08\/FP_20190826_digital_authoritarianism_polyakova_meserole.pdf"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375820"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"e_1_3_3_39_1","unstructured":"REUTERS. 2023. Privacy Group Challenges Ryanair\u2019s Use of Facial Recognition. Retrieved from https:\/\/www.reuters.com\/business\/aerospace-defense\/privacy-group-challenges-ryanairs-use-facial-recognition-2023-07-27\/"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2108.02707"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3762185"},{"key":"e_1_3_3_42_1","doi-asserted-by":"crossref","unstructured":"Mahmood Sharif Sruti Bhagavatula Lujo Bauer and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201916) 1528\u20131540.","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317611"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351261"},{"key":"e_1_3_3_45_1","unstructured":"Emine Sinmaz. 2023. Live facial recognition labelled \u2018Orwellinan\u2019 as Met police push ahead with use. The Guardian. 5 April 2023. Retrieved from https:\/\/www.theguardian.com\/technology\/2023\/apr\/05\/live-facial-recognition-criticised-metropolitan-police"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7643-8472-2_6"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","unstructured":"Julian Steil Marion Koelle Wilko Heuten Susanne Bolol and Andreas Bulling. 2019. PrivacEye: Privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features. In Proceedings of the Eye Tracking Research and Applications (ETRA \u201919). DOI: 10.1145\/3314111.3319913","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_3_48_1","doi-asserted-by":"crossref","unstructured":"Philipp Terh\u00f6rst Malte Ihlefeld Marco Huber Naser Damer Florian Kirchbuchner Kiran Raja and Arjan Kuijper. 2023. QMagFace: Simple and accurate quality-aware face recognition. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision 3484\u20133494.","DOI":"10.1109\/WACV56688.2023.00348"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3092646"},{"key":"e_1_3_3_50_1","first-page":"354","volume-title":"Nature","author":"Van Noorden Richard","year":"2020","unstructured":"Richard Van Noorden. 2020. The ethical questions that haunt facial-recognition research. Nature. 587. (Nov. 2020), 354\u2013358."},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230633"},{"key":"e_1_3_3_52_1","volume-title":"The Washington Post","author":"Williams Robert","year":"2020","unstructured":"Robert Williams. 2020. I Was Wrongly Arrested Because of Face Recognition. Why Are Police Allowed to Use It? The Washington Post. June 24, 2020."},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"e_1_3_3_54_1","volume-title":"16th Symposium on Usable Privacy and Security","author":"Zhang Shikun","year":"2021","unstructured":"Shikun Zhang, Yuanyuan Feng, and Norman Sadeh. 2021. Facial recognition: Understanding privacy concerns and attitudes across increasingly diverse deployment scenarios. In 16th Symposium on Usable Privacy and Security. Retrieved from https:\/\/www.usenix.org\/system\/files\/soups2021-zhang-shikun.pdf"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3020691"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","unstructured":"Zhe Zhou Di Tang Xiaofeng Wang Weili Han Xiangyu Liu and Kehuan Zhang. 2018. Invisible mask: Practical attacks on face recognition with infrared. arXiv:1803.04683. 10.48550\/arXiv.1803.04683","DOI":"10.48550\/arXiv.1803.04683"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803269"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26409-2_19"}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:52:14Z","timestamp":1773323534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,25]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3769675"],"URL":"https:\/\/doi.org\/10.1145\/3769675","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,25]]},"assertion":[{"value":"2024-02-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}