{"id":3670,"date":"2014-10-01T06:00:42","date_gmt":"2014-10-01T10:00:42","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3670"},"modified":"2025-12-08T02:03:00","modified_gmt":"2025-12-08T07:03:00","slug":"can-cosmetic-plastic-surgery-bypass-security-biometrics","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/","title":{"rendered":"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics?"},"content":{"rendered":"<figure id=\"attachment_3674\" aria-describedby=\"caption-attachment-3674\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/dreamstime_m_39528417.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3674\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/dreamstime_m_39528417-300x225.jpg\" alt=\"spoofing biometrics by altering your physical appearance\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/dreamstime_m_39528417-300x225.jpg 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/dreamstime_m_39528417-1024x768.jpg 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/dreamstime_m_39528417-606x454.jpg 606w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/dreamstime_m_39528417.jpg 2000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-3674\" class=\"wp-caption-text\">How easy is it to alter your appearance in order to spoof a biometric identification system?<\/figcaption><\/figure>\n<p><b><i>The following is a guest post from Dr. Simon Weight in Perth, Australia.<\/i><\/b><\/p>\n<p>Biometrics have long been hailed as fool-proof. While they do provide a high degree of security, they can be bypassed just like any security mechanism.<\/p>\n<p>The most prominent way that biometrics can be bypassed is through the use of cosmetic and plastic surgery. This can allow certain types of susceptible systems to return false positives when surgery tailors certain physical traits of a person to match those that an algorithm searches for.<\/p>\n<p><strong>A Practical Example of Biometrics Being Bypassed<\/strong><\/p>\n<p>The best way to answer \u201cCan it be done?\u201d is to look at a time when biometrics have been bypassed.<\/p>\n<p>In December of 2009, a Chinese woman in Japan name Lin Rong was able to bypass biometrics put in place by Japanese controls to essentially give her an entirely new identity. She accomplished this by having an illegal surgery that swapped skin grafts of her fingers.<\/p>\n<p>The Japanese authorities reported that this type of bypass is a practice likely to be widespread among illegal immigrants in Japan.<\/p>\n<p><strong>Faking Facial Recognition<\/strong><\/p>\n<p>While it&#8217;s one thing to confuse a system based on biometrics, it&#8217;s an entirely different thing to attempt to fake one&#8217;s identity as another person. This may be possible with implants or other simple surgeries that alter the way that fingerprints work.<\/p>\n<p>The true test concerning biometrics being faked is if facial recognition can be bypassed.<\/p>\n<p>The surprising answer is that it can be in some instances. A comprehensive facial recognition program that searches for multiple vectors can be used to safe guard against this problem as well, but that will be addressed later.<\/p>\n<p>To understand the challenges presented by cosmetic and plastic surgery as it applies to facial recognition, it&#8217;s important to understand that there are two types of cosmetic surgery: local and global surgery.<\/p>\n<p>The former alters one local feature, such as the nose, while the latter alters the entire facial structure. This can make predicting change due to plastic surgery nearly impossible due to the fact that information on such surgery is likely unavailable.<\/p>\n<p><strong>An Imperfect Solution<\/strong><\/p>\n<p>Individual algorithms that attempt to address the issues that plastic surgery can present with regards to facial recognition are nowhere near perfect on their own. The algorithm with the lowest accuracy rating for predicting cosmetic surgery changes is the Principle Component Analysis (PCA) algorithm with a success rate of 29.1%, and the highest is the Neutral Network Architecture-Based 2-D Log Polar Gabor Transform (GNN) with a success rate of 54.2%.<\/p>\n<p>The best strategy to use is to employ several algorithms into a facial recognition biometrics system. This allows multiple vectors to be checked, which in turn makes it significantly harder to falsify biometrics readings. It\u2019s essential to ensure you\u2019ve chosen the correct plastic surgeon, and that they\u2019re up to the job.<\/p>\n<p>The lowest computed value of any given employed algorithm can then be used to assess if an individual has undergone plastic surgery. This allows for the maker of a biometrics system to employ a risk analysis for subjects that matches the level of security required by the system.<\/p>\n<p>At worst, this will require that a valid employee have their facial recognition credentials qualified again while keeping possible intruders out of areas they aren&#8217;t supposed to have access to.<\/p>\n<p>While this method is imperfect, as it relies upon at least one feature resulting in a positive or close match, it&#8217;s a better solution than none at all. Future techniques may make it easier for one face to be compared to another with more accurate results.<\/p>\n<p><em><strong>This post comes from the writing team at Dr. Simon Weight\u2019s clinic in Perth. Dr. Simon is an expert in cosmetic surgeries, although he does advise obtaining a new passport if you\u2019ve had considerable facial work done.<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a guest post from Dr. Simon Weight in Perth, Australia. Biometrics have long been hailed as fool-proof.<\/p>\n","protected":false},"author":398,"featured_media":22010,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometrics","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[39,6,196,495,494],"class_list":["post-3670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometric","tag-biometrics","tag-guest-post","tag-plastic-surgery","tag-spoofing-biometrics-2"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics? - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics? - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-01T10:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T07:03:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2025\/05\/m2sys-blog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics?\",\"datePublished\":\"2014-10-01T10:00:42+00:00\",\"dateModified\":\"2025-12-08T07:03:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\"},\"wordCount\":669,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\",\"biometrics\",\"guest post\",\"plastic surgery\",\"spoofing biometrics\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\",\"name\":\"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics? - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2014-10-01T10:00:42+00:00\",\"dateModified\":\"2025-12-08T07:03:00+00:00\",\"description\":\"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics? - Digital Transformation of Government Services","description":"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/","og_locale":"en_US","og_type":"article","og_title":"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics? - Digital Transformation of Government Services","og_description":"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2014-10-01T10:00:42+00:00","article_modified_time":"2025-12-08T07:03:00+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2025\/05\/m2sys-blog-1.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics?","datePublished":"2014-10-01T10:00:42+00:00","dateModified":"2025-12-08T07:03:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/"},"wordCount":669,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric","biometrics","guest post","plastic surgery","spoofing biometrics"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/","name":"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics? - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2014-10-01T10:00:42+00:00","dateModified":"2025-12-08T07:03:00+00:00","description":"Can altering your physical appearance spoof biometrics security systems and just how easy is it to accomplish?","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/can-cosmetic-plastic-surgery-bypass-security-biometrics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Can Cosmetic and Plastic Surgery Spoof the Security of Biometrics?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"m2bloghorayra","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3670"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3670"}],"version-history":[{"count":6,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3670\/revisions"}],"predecessor-version":[{"id":19841,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3670\/revisions\/19841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/22010"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}