It’s a much more powerful version of the method your phone or computer might use to identify friends in your photos. Using computers to recognize people’s faces and validate their identities can streamline access control for secure corporate and government buildings or devices.
What is Face Recognition?
Face recognition technology is the least intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face.
Instead of requiring people to place their hand on a reader (a process not acceptable in some cultures as well as being a source of illness transfer) or precisely position their eye in front of a scanner, face recognition systems unobtrusively take pictures of people’s faces as they enter a defined area. There is no intrusion or delay, and in most cases the subjects are entirely unaware of the process. They do not feel “under surveillance” or that their privacy has been invaded.
The Defense Advanced Research Projects Agency (DARPA) and the National Institute of Standards and Technology rolled out the Face Recognition Technology (FERET) program beginning in the 1990s in order to encourage the commercial face recognition market. The project involved creating a database of facial images. The database was updated in 2003 to include high-resolution 24-bit color versions of images. Included in the test set were 2,413 still facial images representing 856 people. The hope was that a large database of test images for facial recognition would be able to inspire innovation, that might result in more powerful facial recognition technology.
Face recognition has been used increasingly for forensics by law enforcement and military professionals. It is often the most effective way to positively identify dead bodies. In fact, facial recognition was used to help confirm the identity of Osama bin Laden after he was killed (2011) in a U.S. raid.
Facial recognition analyzes the characteristics of a person’s face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera. This biometric has been widely, and perhaps wildly, touted as a fantastic system for recognizing potential threats (whether terrorist, scam artist, or known criminal) but so far has not seen wide acceptance in high-level usage. It is projected that biometric facial recognition technology will soon overtake fingerprint biometrics as the most popular form of user authentication.
Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. Each human face has approximately 80 nodal points. Some of these measured by the Facial Recognition Technology are:
- Distance between the eyes
- Width of the nose
- Depth of the eye sockets
- The shape of the cheekbones
- The length of the jaw line
These nodal points are measured creating a numerical code, called a faceprint, representing the face in the database.
How it Works?
The following four-stage process illustrates the way biometric systems operate:
Capture – A physical or behavioral sample is captured by the system during enrollment.
Extraction – Unique data is extracted from the sample and a template is created.
Comparison – The template is then compared with a new sample.
Matching – The system then decides if the features extracted from the new sample are matching or not.When the user faces the camera, standing about two feet from it. The system will locate the user’s face and perform matches against the claimed identity or the facial database. It is possible that the user may need to to move and reattempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds.
One of the strongest positive aspects of facial recognition is that it is non-intrusive. Verification or identification can be accomplished from two feet away or more, and without requiring the user to wait for long periods of time or do anything more than look at the camera. Face recognition is also very difficult to fool. It works by comparing facial landmarks – specific proportions and angles of defined facial features – which cannot easily be concealed by beards, eyeglasses or makeup.
The ideal solution
Currently gaining support as a potential tool for averting terrorist crimes, facial recognition is already in use in many law enforcement areas. Software has also been developed for computer networks and automated bank tellers that use facial recognition for user verification purposes.
All of this makes face recognition ideal for high traffic areas open to the general public, such as:
- Airports and railway stations
- Public transportation
- Financial institutions
- Government offices
- Businesses of all kinds
Advantage and Disadvantage
The main advantage of the system is that it is non-intrusive; most people are usually unaware that they are being watched. Security agencies also prefer it as it is difficult to cheat—dealing as the system does with defined facial features which cannot easily be concealed by make-up, beards or glasses.
But every technology has its limitations. For instance, its effectiveness is questionable in certain conditions, such as when viewing angle of the face is different, poor lighting, low-resolution image, varied facial expression and objects covering the face.
The technology is also increasingly becoming a common feature in smartphones. It is also being used by some churches to track attendance during service.