You are on page 1of 50

.

FACE RECOGNITION

A Research Paper

Presented to

The Faculty of College of Computer Studies

In Partial fulfillment

Of the requirement in

Associate in Computer Technology

By:

ACT 1A

Titular,Jenny L.

Pagulayan,Julius

Aclan,Reylan

Lugos,Angelica

Latag,Marvin L.

April 2019

2nd Semester

S.Y 2018-2019
INTRODUCTION:

Face recognition is came from the greek word:”Proopon”as a face

and”Agnosia”as not knowing.The opposite of prosopagnasia is the kill of superior Face

recognition ability.

It implements the image indexing,,creating a compact templates for a faster

searching..This can turn to allows building range of security applications such as video

surveillance system..Many features and higher performance are achievable in video-

based surveillance systems using the new set of motion-based recognition algorithms

faces.The library can compare different faces,returning the degree of likeness.This allows

identifying human faces appesring in still images or video streams by looking up face

data bases. Recognizing and identifying still images enables locating similar faces in

driver’s license databases while helping detect duplicates.


HISTORY OF FACE RECOGNITION

First that scientists were working in this more than a half-century ago.

In the 1960-was a woman.”Their programs required the administrator state

features such as the eyes,ears,nose,and mouth on the photograph. Latest Face

Recognition.

Face recognition technology is used in a wide range of area spanning an array of

industries,including national security infrastracture application such as immigration

control and national IDs security enhancement application such as entrance and exit.

What is the purpose of Face Recognition?

Facial recognition is a biometic software application capable of uniquely

,identifying or verifying a person by comparing and analyzing patterns based on the

person’s facial contours.

Facial recognition is mostly used for security purposes, though there is incresing

interest.

When was the Facial Recognition Invented?

Eigenface(Late 1980-Early 1990s)In 1988,Sirovich and Kirby Began applying

linesr algebra to the problem of facial recognition.What became known as the Eigenface

approach started as a search for a low dimentional representation of facial images.


SmartFace

Plug & Play Face Recognition

SmartFace is a high-performance, scalable, face recognition server platform

able to process multiple real-time video streams in parallel. Leveraging Innovatrics’

industry-leading algorithm, SmartFace allows system integrators to easily incorporate

face recognition into their solutions.

Rapid deployment, with no biometric skills required.

Save time and cost. Developed listening to requirements from the field, SmartFace

solves the typical problems associated with face recognition SDKs such as lack of

specialist biometric expertise, long integration times, and problems working with video files,

multiple IP camera streams. SmartFace is by design easy to integrate, potentially saving

hundreds of man-hours and dramatically shortening ROI periods.

HOW TO USE FACE RECOGNITION?

Open setting,go to security privacy and select Face Recognition.Enter your screen

unlock password.If you want the device to identity your face and unlock the screen

automatically when you pick up wake device to enhance the Face recognition experience.
Face Recognition

STREET-LEVEL SURVEILLANCE

Share It Share on Twitter Share on Facebook Copy link

Street-Level Surveillance

 Automated License Plate Readers (ALPRs)

 Body-worn Cameras

 Cell-Site Simulators/IMSI Catchers

 Drones/Unmanned Aerial vehicles

 Surveillance Cameras

 Face Recognition

 Tattoo Recognition

 Iris Recognition

 About the SLS Team

 Criminal Defense Resources

 Spot the Surveillance VR

Face Recognition

Face recognition is a method of identifying or verifying the identity of an individual

using their face. Face recognition systems can be used to identify people in photos, video,
or in real-time. Law enforcement may also use mobile devices to identify people during

police stops. 

But face recognition data can be prone to error, which can implicate people for crimes

they haven’t committed. Facial recognition software is particularly bad at recognizing

African Americans and other ethnic minorities, women, and young people, often

misidentifying or failing to identify them, disparately impacting certain groups.

Additionally, face recognition has been used to target people engaging in protected

speech. In the near future, face recognition technology will likely become more

ubiquitous. It may be used to track individuals’ movements out in the world like

automated license plate readers track vehicles by plate numbers. Real-time face

recognition is already being used in other countries and even at sporting events in the

United States. 

Source: Iowa Department of Transportation

Face recognition systems use computer algorithms to pick out specific, distinctive details

about a person’s face. These details, such as distance between the eyes or shape of the

chin, are then converted into a mathematical representation and compared to data on

other faces collected in a face recognition database. The data about a particular face is
often called a face template and is distinct from a photograph because it’s designed to

only include certain details that can be used to distinguish one face from another. 

Some face recognition systems, instead of positively identifying an unknown person, are

designed to calculate a probability match score between the unknown person and specific

face templates stored in the database. These systems will offer up several potential

matches, ranked in order of likelihood of correct identification, instead of just returning a

single result. 

Face recognition systems vary in their ability to identify people under challenging

conditions such as poor lighting, low quality image resolution, and suboptimal angle of

view (such as in a photograph taken from above looking down on an unknown person).

When it comes to errors, there are two key concepts to understand: 

A “false negative” is when the face recognition system fails to match a person’s face to

an image that is, in fact, contained in a database. In other words, the system will

erroneously return zero results in response to a query.

A “false positive” is when the face recognition system does match a person’s face to an

image in a database, but that match is actually incorrect. This is when a police officer

submits an image of “Joe,” but the system erroneously tells the officer that the photo is of

“Jack.” 

When researching a face recognition system, it is important to look closely at the “false

positive” rate and the “false negative” rate, since there is almost always a trade-off. For
example, if you are using face recognition to unlock your phone, it is better if the system

fails to identify you a few times (false negative) than it is for the system to misidentify

other people as you and lets those people unlock your phone (false positive). If the result

of a mis identification is that an innocent person goes to jail (like a mis identification in a

mugshot database), then the system should be designed to have as few false positives as

possible. 

 Source: Arizona Department of Transportation

Law enforcement agencies are using face recognition more and more frequently in

routine policing. Police collect mugshots from arrestees and compare them against local,

state, and federal face recognition databases. Once an arrestee’s photo has been taken, the

mugshot will live on in one or more databases to be scanned every time the police do

another criminal search. 

Law enforcement can then query these vast mugshot databases to identify people in

photos taken from social media, CCTV, traffic cameras, or even photographs they’ve

taken themselves in the field. Faces may also be compared in real-time against “hot lists”

of people suspected of illegal activity. 

Mobile face recognition allows officers to use smartphones, tablets or other portable

devices to take a photo of a driver or pedestrian in the field and immediately compare that

photo against one or more face recognition databases to attempt an identification. In San

Diego, for example, a program called TACIDS (Tactical Identification System) allows

law enforcement officers from nearly 25 agencies  to stop people on the street, use their
tablets or mobile phones to take photographs of them and run the images against the

county’s mugshot database.

Face recognition has been used in airports, at border crossings, and during events such as

the Olympic Games. Face recognition may also be used in private spaces like stores and

sports stadiums, but different rules may apply to private sector face recognition. 

Supporting these uses of face recognition are scores of databases at the local, state and

federal level. Estimates indicate that 25% or more of all state and local law enforcement

agencies in the U.S. can run face recognition searches on their own databases or those of

another agency.

According to Governing magazine, as of 2015, at least 39 states used face recognition

software with their Department of Motor Vehicles (DMV) databases to detect fraud.  The

Washington Post reported in 2013 that 26 of these states allow law enforcement to search

or request searches of driver license databases, however it is likely this number has

increased over time.

Databases are also found at the local level, and these databases can be very large. For

example, the Pinellas County Sheriff’s Office in Florida may have one of the largest local

face analysis databases. According to research from Georgetown University, the database

is searched about 8,000 times a month by more than 240 agencies. 

The federal government has several face recognition systems, but the database most

relevant for law enforcement is FBI’s Next Generation Identification database which

contains more than 30-million face recognition records. FBI allows state and local
agencies “lights out” access to this database, which means no human at the federal level

checks up on the individual searches. In turn, states allow FBI access to their own

criminal face recognition databases.

FBI also has a team of employees dedicated just to face recognition searches called Facial

Analysis, Comparison and Evaluation (“FACE”) Services. The FBI can access over 400-

million non-criminal photos from state DMVs and the State Department, and 16 U.S.

states allow FACE access to driver’s license and ID photos. 

Given the large number of DMV databases using face recognition and the number of

Americans whose photos are in the State Department’s database of passport and U.S. visa

holders, Georgetown University has estimated close to half of all American adults have

been entered into at least one if not more face recognition databases. 

Who Sells Face Recognition

Morpho Trust, a subsidiary of Idemia (formerly known as OT-Morpho or Safran),

is one of the largest vendors of face recognition and other biometric identification

technology in the United States. It has designed systems for state DMVs, federal and

state law enforcement agencies, border control and airports (including TSA
PreCheck), and the state department. Other common vendors include 3M, Cognitec,

DataWorks Plus, Dynamic Imaging Systems, FaceFirst, and NEC Global.

Threats Posed By Face Recognition

Face recognition data is easy for law enforcement to collect and hard for members of the

public to avoid. Faces are in public all of the time, but unlike passwords, people can’t

easily change their faces. We are seeing increased information-sharing among agencies.

Cameras are getting more powerful and technology is rapidly improving.

Face recognition data is often derived from mugshot images, which are taken upon arrest,

before a judge ever has a chance to determine guilt or innocence. Mugshot photos are

often never removed from the database, even if the are has never had charges brought

against them.

In spite of face recognition’s ubiquity and the improvement in technology, face

recognition data is prone to error. In fact, the FBI admitted in its privacy impact

assessment that its system “may not be sufficiently reliable to accurately locate other

photos of the same identity, resulting in an increased percentage of misidentifications.”

Although the FBI purports its system can find the true candidate in the top 50 profiles

85% of the time, that’s only the case when the true candidate exists in the gallery. If the

candidate is not in the gallery, it is quite possible the system will still produce one or

more potential matches, creating false positive results. These people—who aren’t the

candidate—could then become suspects for crimes they didn’t commit. An inaccurate
system like this shifts the traditional burden of proof away from the government and

forces people to try to prove their innocence.

Face recognition gets worse as the number of people in the database increases. This is

because so many people in the world look alike. As the likelihood of similar faces

increases, matching accuracy decreases. 

Face recognition software is especially bad at recognizing African Americans. A 2012

study [.pdf] co-authored by the FBI showed that accuracy rates for African Americans

were lower than for other demographics. Face recognition software also misidentifies

other ethnic minorities, young people, and women at higher rates. Criminal databases

include a disproportionate number of African Americans, Latinos, and immigrants, due in

part to racially biased police practices. Therefore the use of face recognition technology

has a disparate impact on people of color.

Some argue that human backup identification (a person who verifies the computer’s

identification) can counteract false positives. However, research shows that, if people

lack specialized training, they make the wrong decisions about whether a candidate photo

is a match about half the time. Unfortunately, few systems have specialized personnel

review and narrow down potential matches.

Face recognition can be used to target people engaging in protected speech. For example,

during protests surrounding the death of Freddie Gray, the Baltimore Police Department

ran social media photos through face recognition to identify protesters and arrest them.

Of the 52 agencies analyzed in a report by Georgetown Center on Privacy and


Technology , only one agency, the Ohio Bureau of Criminal Investigation, has a face

recognition policy expressly prohibiting the use of the technology to track individuals

engaged in protected free speech. 

Few face recognition systems are audited for misuse. Of 52 agencies surveyed by

Georgetown that acknowledged using face recognition, less than 10% had a publicly

available use policy. Only two agencies (the San Francisco Police Department and the

Seattle region’s South Sound 911) restrict the purchase of technology to those that meet

certain accuracy thresholds. Only one—Michigan State Police—provides documentation

of its audit process.

There are few measures in place to protect everyday Americans from the misuse of face

recognition technology. In general, agencies do not require warrants, and many do not

even require law enforcement to suspect someone of committing a crime before using

face recognition to identify them. 

The Illinois Biometric Information Privacy Act requires notice and consent before the

private use of face recognition tech. However, this only applies to companies and not to

law enforcement agencies. 

EFF's Work on Face Recognition


 

Privacy info. This embed will serve content from youtube-nocookie.com

We support meaningful restrictions on face recognition use both by government and

private companies. We testified about face recognition technology before the Senate

Subcommittee on Privacy, Technology, and the Law, as well as the House Committee on

Oversight and Government Reform Hearing on Law Enforcement’s Use of Facial

Recognition Technology.  We also participated in the NTIA face recognition

multistakeholder process but walked out, along with other NGOs, when companies

couldn’t commit to meaningful restrictions on face recognition use.

We have consistently filed public records requests to obtain previously secret information

on face recognition systems. We even sued the FBI for access to its face recognition

records. 
In 2015, EFF and Muck Rock launched a crowd sourcing campaign to request

information on various mobile biometric technologies acquired by law enforcement

around the country. We filed an amicus brief, along with the ACLU of

Minnesota, demanding the release of emails regarding the Hennep in County Sheriff

Office’s face recognition program that were requested by one local participant in the

project.

EFF Legal Cases

EFF v. U.S. Department of Justice

Tony Webster v. Hennepin County and Hennepin County Sheriff's Office

For More Information

The Perpetual Line-Up (Georgetown Law Center on Privacy and Technology)

Face Recognition Technology: FBI Should Better Ensure Privacy and

Accuracy (Government Accountability Office)

California Cops Are Using These Biometric Gadgets in the Field (EFF)

Face Recognition Performance Role of Demographic Information (IEEE)

Privacy Impact Assessment for the Facial Analysis, Comparison, and Evaluation (FACE)

Services Unit (FB)
Facial recognition is a category of biometric software that maps an individual's facial

features mathematically and stores the data as a face print. The software uses deep

learning algorithms to compare a live capture or digital image to the stored faceprint in

order to verify an individual's identity. 

High-quality cameras in mobile devices have made facial recognition a viable option for

authentication as well as identification. Apple’s iPhone X, for example, includes Face ID

technology that lets users unlock their phones with a faceprint mapped by the phone's

camera. The phone's software, which is designed with 3-D modeling to resist being

spoofed by photos or masks, captures and compares over 30,000 variables. As of this

writing, Face ID can be used to authenticate purchases with Apple Pay and in the iTunes

Store, App Store and I Books Store. Apple encrypts and stores faceprint data in the cloud,

but authentication takes place directly on the device. 

Developers can use Amazon Rekognition, an image analysis service that's part of the

Amazon AI suite, to add facial recognition and analysis features to an application.

Google provides a similar capability with its Google Cloud Vision API. The technology,

which uses machine learning to detect, match and identify faces, is being used in a wide

variety of ways, including entertainment and marketing. The Kinect motion

gaming system, for example, uses facial recognition to differentiate among players. Smart

advertisements in airports are now able to identify the gender, ethnicity and approximate

age of a passersby and target the advertisement to the person's demographic.

Facebook uses facial recognition software to tag individuals in photographs. Each time an

individual is tagged in a photograph, the software stores mapping information about that
person’s facial characteristics. Once enough data has been collected, the software can use

that information to identify a specific individual's face when it appears in a new

photograph. To protect people's privacy, a feature called Photo Review notifies the

Facebook member who has been identified. 

Currently, there are no laws in the United States that specifically protect an individual's

biometric data. Facial recognition systems are currently being studied or deployed for

airport security and it's estimated that more than half the United States population has

already had their faceprint captured. According the Department of Homeland Security,

the only way to avoid having biometric information collected when traveling

internationally is to refrain from traveling. The General Data Protection Regulation

(GDPR) for European Member States does address biometric data.


 How a simple facial recognition application works

The software identifies 80 nodal points on a human face. In this context, nodal points are

endpoints used to measure variables of a person’s face, such as the length or width of the

nose, the depth of the eye sockets and the shape of the cheekbones. The system works by

capturing data for nodal points on a digital image of an individual’s face and storing the

resulting data as a face print. The face print is then used as a basis for comparison with

data captured from faces in an image or video.

Even though the facial recognition system only uses 80 nodal points, it can quickly and

accurately identify target individuals when the conditions are favorable. However, if the

subject’s face is partially obscured or in profile rather than facing forward, or if the light

is insufficient, this type of software is less reliable. According to the National Institute of

Standards and Technology (NIST), the incidence of false positives in facial recognition

systems has been halved every two years since 1993.


Uses of facial recognition technology

  A research team at Carnegie Mellon has developed a proof-of-concept iPhone

app that can take a picture of an individual and -- within seconds -- return the

individual's name, date of birth and social security number.

 The Google Arts & Culture app uses facial recognition to identify museum

doppelgangers by matching a real person's face print with portrait's face print.

 Professor Shen Hao of the Communications University of China uses facial

recognition technology to track students’ attendance.

Amazon, MasterCard and Alibaba have rolled out facial recognition payment methods 

commonly referred to as selfie pay

What does Facial Recognition mean?

Facial recognition is a biometric software application capable of uniquely identifying or

verifying a person by comparing and analyzing patterns based on the person's facial

contours. Facial recognition is mostly used for security purposes, though there is

increasing interest in other areas of use. In fact, facial recognition technology has

received significant attention as it has potential for a wide range of application related to

law enforcement as well as other enterprises.

Facial recognition is also known as face recognition.

Techopedia explains Facial Recognition


There are different facial recognition techniques in use, such as the generalized matching

face detection method and the adaptive regional blend matching method. Most facial

recognition systems function based on the different nodal points on a human face. The

values measured against the variable associated with points of a person’s face help in

uniquely identifying or verifying the person. With technique, applications can use data

captured from faces and can accurately and quickly identify target individuals. Facial

recognition techniques are quickly evolving with new approaches such as 3-D modeling,

helping to overcome issues with existing techniques.

There are many advantages associated with facial recognition. Compared to other

biometric techniques, facial recognition is of a non-contact nature. Face images can be

captured from a distance and can be analyzed without ever requiring any interaction with

the user/person. As a result, no user can successfully imitate another person. Facial

recognition can serve as an excellent security measure for time tracking and attendance.

Facial recognition is also cheap technology as there is less processing involved, like in

other biometric techniques.

There are certain drawbacks associated with facial recognition. Facial recognition can

only identify people when the conditions such as lighting are favourable. The application

could be less reliable in case of insufficient light or if the face is partially obscured.

Another disadvantage is that facial recognition is less effective when facial expressions

vary.https://www.techopedia.com/reg/how-to-continuously-monitor-and-analyze-mysql-

and-mariadb-with-ideras-sql-diagnostic-manager/33743?

utm_source=techopedia&utm_medium=hellobar
The human face plays an important role in our social interaction, conveying people’s

identity. Using the human face as a key to security, biometric face recognition technology

has received significant attention in the past several years due to its potential for a wide

variety of applications in both law enforcement and non-law enforcement. 

As compared with other biometrics systems using fingerprint/palm print and iris, face

recognition has distinct advantages because of its non-contact process. Face images can

be captured from a distance without touching the person being identified, and the

identification does not require interacting with the person. In addition, face recognition

serves the crime deterrent purpose because face images that have been recorded and

archived can later help identify a person.

NEC’s face recognition technology can be implemented as a functionally independent

application, or seamlessly integrated into new or existing biometric security solutions by

system integrators and solution providers. Click to read NEC's Face Recognition

Brochure.

NEC's NeoFace® StrengCurrently, there are no laws in the UCurrently,Currently,

there are no laws in the United States that specifically protect an individual's biometric

data. Facial recognition systems are currently being studied or deployed for airport

security and it's estimated that more than half the United States population has already

had their faceprint captured. According the Department of Homeland Security, the only

way to avoid having biometric information collected when traveling internationally is to

refrain from traveling. The General Data Protection Regulation (GDPR) for European
Member States does address biometric data. there are no laws in the United States that

specifically protect an individual's biometric data. Facial recognition systems are

currently being studied or deployed for airport security and it's estimated that more than

half the United States population has already had their faceprint captured. According the

Department of Homeland Security, the only way to avoid having biometric information

collected when traveling internationally is to refrain from traveling. The General Data

Protection Regulation (GDPR) for European Member States does address biometric

data.nited States that specifically protect an individual's biometric data. Facial recognition

systems are currently being studied or deployed for airport security and it's estimated that

more than half the United States population has already had their faceprint captured.

According the Department of Homeland Security, the only way to avoid having biometric

information collected when traveling internationally is to refrain from traveling. The

General Data Protection Regulation (GDPR) for European Member States does address

biometric data.

NEC Neo Face technology's strength lies in its tolerance of poor quality.  Highly

compressed surveillance videos and images, previously considered of little to no value,

are now usable evidence and leading to higher rates of positive identification.  With Neo

Face's proven ability to match low resolution facial images, including images with low

resolutions down to 24 pixels between the eyes, there is a large separation between NEC's

Neo Face technology and all other face recognition systems matching accuracy in the

market. While searching of latent (scene of crime) fingerprints is the norm, NEC's Neo

Face facial recognition technology can now positively identify latent photos with high
degreeof

accuracy.https://www.nec.com/en/global/solutions/safety/face_recognition/index.html

Face PRO:Panasonic Facial Recognition System

What is Face PRO (Panasonic Facial Recognition System) ?

Panasonic Face PRO can identify faces that are difficult to recognise within common

video surveillance technology.

These situations include reading faces at an angle of up to 45 degrees to the left or right

or 30 degrees up or down, with a 90% accuracy rate when detecting faces partially hidden

by sunglasses or face masks.

Face PRO also has high accuracy reads in matching faces taken from up to ten-year-old

passport images.

-Specific faces can be registered in advance to send an alarm when they are detected. The

faces of repeat shoplifters and wanted criminals,etc. can be registered in the facial

recognition security/surveillance system from data recorded in the past.

Information can also be shared between facial recognition systems by importing generic

photo data in the JPEG format, etc. Alarms can notify the operator by displaying pop-ups

on the screen, emitting warning sounds, or flashing the camera on the map, etc.
-Face images can be used to perform searches.

For example, face images of suspicious people detected on the sales floor can be searched

to track information on a timeline, including what time they entered the store and which

sales floor they passed. Whether suspicious people have shoplifted, etc. after entering the

store can also be immediately searched for and checked by the facial recognition

security/surveillance system "Face

PRO".https://security.panasonic.com/solutions_application/application_solutions/facial_r

ecognition/

Facial Recognition

Biometrics make use of our most unique physical features and behaviors to serve as

digital identifiers that computers and software can interpret and utilize for identity-related

applications. They can be used to identify someone in a biometric database, or to verify

the authenticity of a claimed identity.Facial recognition technology applies the science of

biometrics to a user based on his or her facial features. Facial recognition algorithms

create a biometric template by detecting and measuring various characteristics or feature

points, including location of the eyes, eyebrows, nose, mouth, chin, and ears. Two

templates are compared to yield a match score, which indicates the likelihood that the

two images belong to the same person. Liveness detection may also be applied to ensure

that the source of the biometric sample is not a digital or paper reproduction.

Law enforcement agencies such as the FBI use facial recognition technology to search

criminal watch lists and help conclusively identify a person of interest. They can match a
recently -taken photo or video against a database of existing photos to help identify that

person. Governments around the world use facial for biometric identification for a variety

of applications including border security, fraud prevention, and citizen ID.

More recently, mobile authentication has emerged as the most common main private-

sector use case for facial biometrics, where our facial images can be used in place of a

password. Users can now log onto their devices using facial recognition as a convenient

and secure alternative to PINs and passwords. Incorporating facial recognition into a

mobile app, such as for banking or other secure applications, allows the app provider to

have more control of the security features and user experience, and also achieve more

consistency across customer devices.

Facial recognition’s advantages

Each biometric modality offers advantages and disadvantages. Facial recognition offers

several advantages over other biometrics:

1. Proliferation of digital facial image data.: The billions of existing digital facial

images from countless sources are extremely useful for algorithm training

purposes, particularly for algorithms using machine learning techniques.

2. Enhancement of manual facial recognition.: Biometrics can be used in concert

with human visual facial recognition processes, such as comparing a live person

to their facial image on their ID card. Facial recognition technology can be used

to automate or enhance this process and provides greater matching accuracy. For
just about any process where a person’s face is used by a human to verify their

identity, biometrics can be used to improve it.

3. Ubiquity of cameras on mobile devices.: Nearly all smart phones, and tablets,

and laptops have built-in front-facing cameras that enable high-quality “selfie”

shots. This makes it convenient to collect a live facial recognition sample for

comparison against a template.

4. Conducive for use with other modalities for mobile authentication.: Facial

image capture using the front-facing camera on a phone can be performed

passively and simultaneously during capture of other modalities such as voice and

keystroke to improve matching performance and liveness detection.

Facial recognition’s challenges

The following challenges must be addressed for facial recognition to be useful:

1. Wide variety of environmental capture conditions (e.g. lighting, shadows) make

accurate matching more challenging. Pose variations, aging, glasses, facial

expressions, and facial hair can also make matching more difficult. Differences

between camera sensors and settings can also have an impact.

2. High availability of facial images means fraudsters can more easily obtain images

of potential fraud victim that can be used for spoofing.

Overcoming the challenges

Several steps can be taken to optimize security, performance, and user experience.
Automate capture of high-quality images

Software that automates capture of facial images analyzes the streaming video frames in

real time. Image capture is automatically triggered once focus, facial positioning,

lighting, and other image-capture details are verified for compliance with quality

standards.

The image is analyzed again and optimized post-capture. Automatic scaling, rotation,

cropping, brightness, and contrast enhancements optimize the quality of an otherwise

non-compliant image so the photo doesn’t have to be retaken.

Perform robust liveness detection

Fraudsters may attempt to spoof a facial recognition algorithm with non-live digital

videos and images obtained online. Liveness detection algorithms distinguish between a

printed, digital, video, and a live facial image.

Passive liveness detection looks for indicators of a non-live image such as inconsistent

features between foreground and background.

Active liveness detection prompts the user to blink or shake his or her head to ascertain

liveness.

The combination of active and passive methods will yield the highest performance

matching. Facial recognition analysis applications might also leverage a second modality

such as voice to help assure liveness.

Use high-performance algorithms


In the past few years, machine learning algorithms have become the predominant method

for automatically extracting the above information and then comparing it against other

images.

Aware’s facial recognition products

Aware products for facial recognition:

 Knomi: Mobile authentication with facial matching and liveness detection

 PreFace: Face image auto capture and processing on mobile device or desktop.

 Nexa|Face: Face matching algorithm SDK.

 FaceWorkbench: Forensic examiner workstation application

 AwareABIS: Automated biometric identification system.

.https://www.aware.com/facial-recognition/

Facial recognition: Apple, Amazon, Google and the race for your face

Facial recognition technology is both innovative and worrisome. Here's how it works and

what you need to know.


Facial recognition is a blossoming field of technology that is at once exciting and

problematic. If you've ever unlocked your iPhone ($1,000 at Amazon) by looking at it, or

asked Facebook or Google to go through an unsorted album and show you pictures of

your kids, you've seen facial recognition in action.

Whether you want it to or not, facial recognition (sometimes called simply "face

recognition") is poised to play an ever-growing role in your life. Your face could be

scanned at airports or concerts with or without your knowledge. You could be targeted by

personalized ads thanks to cameras at shopping malls. Facial recognition has plenty of

upside. The tech could help smart home gadgets get smarter, sending you notifications

based on who it sees and offering more convenient access to friends and family. 

This is part of a CNET special report exploring the benefits and pitfalls of facial

recognition.

James Martin/CNET

But at the very least, facial recognition raises questions of privacy. Experts have concerns

ranging from the overreach of law enforcement, to systems with hidden racial biases, to

hackers gaining access to your secure information.

Over the next few weeks, CNET will be diving into facial recognition with in-depth

pieces on a wide variety of topics, including the science that allows it to work and the

implications, both positive and negative, for many of its applications. To get you up to

speed, here's a brief overview including what facial recognition is, how it works, where
you'll find it in use today, as well as a few of the implications of this rapidly expanding

corner of technology.

What is facial recognition?

Facial recognition is a form of biometric authentication, which uses body measurements

to verify your identity. Facial recognition is a subset of biometrics that identifies people

by measuring the unique shape and structure of their faces. Different systems use

different techniques, but at its core, facial recognition uses the same principles as other

biometric authentication techniques, such as fingerprint scanners and voice recognition.

How does facial recognition work?

Watch this: Facial recognition: Get to know the tech that gets to...

 5:11

All facial recognition systems capture either a two- or three-dimensional image of a

subject's face, and then compare key information from that image to a database of known

images. For law enforcement, that database could be collected from mugshots. For smart

home cameras, the data likely comes from pictures of people you've identified as relatives

or friends via the accompanying app. 


Woodrow "Woody" Bledsoe first developed facial recognition software at a firm called

Panoramic Research back in the 1960s using two-dimensional images, with funding for

the research coming from an unnamed intelligence agency.

Even now, most facial recognition systems rely on 2D images, either because the camera

doesn't have the ability to capture depth information -- such as the length of your nose or

the depth of your eye socket -- or because the reference database consists of 2D images

such as mugshots or passport photos.

2D facial recognition primarily uses landmarks such as the nose, mouth and eyes to

identify a face, gauging both the width and shape of the features, and the distance

between the various features of the face. Those measurements are converted to a

numerical code by facial recognition software, which is used to find matches. This code

is called a face print.

This geometric system can struggle with different angles and lighting. A straight-on shot

of a face will show a different distance from nose to eyes, for instance, than a shot of a

face turned to the side. The problem can be somewhat mitigated by mapping the 2D

image onto a 3D model and undoing the rotation.

In 2001, the Tampa Police Department installed police camerasequipped with facial

recognition technology in their Ybor City nightlife district in an attempt to cut down on

crime in the area. The system failed to do the job, and it was scrapped in 2003 due to

ineffectiveness. People in the area were seen wearing masks and making obscene

gestures, prohibiting the cameras from getting a clear enough shot to identify an
yone.Boston's Logan Airport also ran two separate tests of facial recognition systems at

its security checkpoints using volunteers. Over a three month period, the results were

disappointing. According to the Electronic Privacy Information Center, the system only

had a 61.4 percent accuracy rate, leading airport officials to pursue other security options.

Humans have always had the innate ability to recognize and distinguish between faces,

yet computers only recently have shown the same ability. In the mid 1960s, scientists

began work on using the computer to recognize human faces. Since then, facial

recognition software has come a long way.

In this article, we will look at the history of facial recognition systems, the changes that

are being made to enhance their capabilities and how governments and private companies

use (or plan to use) them.

https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition.htm
6 Best Facial Recognition Search Engines to Search Person’s Faces Online

Face recognition technology is being used by thousands of photo software for different

purposes. Face recognition helps in detecting faces in a group photo, matching two faces,

finding similar faces, providing face attributes and of course, recognizing a face. The

facial recognition search technology is now also incorporated as a search engine features,

which can help in finding similar faces online.

This search can be filtered to find specific type of people, or even your own images

online. There are many search engines available that use facial recognition technology to

offer different ways to search a picture or face. Some will let you find similar faces, some

may match your face with celebrities and other may just tell you structure of a face to get

details.5 Best Facial Recognition Search Engines to Search Person’s Faces Online

 1. Google Face Search

 2. Betaface

 3. PicWiser

 4. Pictriev

 5. TwinsOrNot.net

 The Pro Review From TechReviewPro

1. Google Face Search


You may already know about Google Reverse Image Search technology that lets you

search the web using picture. However, did you know that you can also limit that search

to just face to find similar faces. Google definitely has the largest image database, so this

should be your first place to find similar faces online. Google Image search doesn’t use

Facial Recognition technology, but its algorithms are quite accurate and can show up

pleasing results. You should be able to find similar images that look like the person in the

picture you have uploaded. Other search data should be ignored in our case, as Google

use many other factors to show search results.

To make a search, go to Google Images and click on the “Camera” icon. Now use the

“Upload an Image” option to upload the image you would to search for.Once uploaded,

you will be immediately shown results along with similar images.

O
To narrow down the search to only images with faces, type “&imgtype=face” in the

search field and hit Enter.

This will only show the images that have a clear focus on the face. You can also do this

from the Advanced Image search option found in the “Settings”, here set image type to

“Faces”.

Also Read: How to Find High-Quality Free Blog Images Using Flickr?

2. Betaface

Betaface is actually a professional face recognition software for media related companies

that helps automatically detect faces and keen details about it. Although, it is a paid

product, but you can try out its Demo online software to fulfill your needs. The online

software is amazing on so many levels, along with astonishing precision.


Once you will upload your picture, it will show you a big list of details about the face in

it. The details include, age, expression, beard, race, glasses, beard and hair color,

mustache, chin size, eyes color, eyes position, eyebrows color/thickness/position, hair

length, head shape, mouth height and shape, nose shape and size, teeth and some other

smaller details.

Above was just the face attributes it can tell, it is also capable of finding similar people.

You have two options, either you can search similar faces between 40000+ celebrities, or

search in Wikipedia’s database of over 1 million faces. Such information is handy for

media companies, but you can have some fun too with it for free.

Also Check: Top 6 Best Private Search Engines for Anonymous Web Surfing

3. PicWiser
PicWiser is a tool for designers and developers to ensure their pictures are not being used

anywhere else without their consent. They use many different official databases to search

for the copy of your image and report it back to you, similar to what Google Reverse

Image Search does. However, they also have a “Search Faces” option, where they use

face recognition technology to scan a face and then try to find that face in the huge

database.

Although, the intention is to find the exact faces and images over the internet, but they

also show similar faces that you might be looking for. In order to search for faces on

PicWiser, you need to register first and must be logged in to make a search. So if you are

comfortable with giving up your details to search for similar faces, then it could be a

good option.

Also See: 6 Best Free Online Photo Collage Maker to Make Photo Collage Online

4. Pictriev
Pictriev is a facial recognition search website that tells you basic information about you

by scanning your face and also shows you all the celebrities who look like the person in

the picture. Unfortunately, Pictriev will not let you scan for similar images all over the

internet, so it may not be a good option for some people. But if you are looking to have

some fun and want to know which celebrities look like you, then it is a great option.

All you have to do is upload your image or paste URL of any online image, Pictriev will

scan the picture and identify all the face in it. After that, it will cut and show all the

detected faces above its interface. You can then easily click on each face to see all the

look-alike celebrities. The website will also be able to tell gender difference and show a

percentage for each particular gender. Furthermore, it also guesses your age, which of
course is not that much accurate (expect a 10-year difference), but can be quite close if

the face is clear in a picture.

Also Read: Private Photo Sharing – How to Protect Your Privacy on the Internet?

5. TwinsOrNot.net

TwinsOrNot.net is actually a face comparison tool that will let you upload two similar

photos and then compare them to see how much similar they are. It uses a percentage to

tell how much two faces resemble and to be true, the software is quite accurate as well.

The process is simple, click on “Click to add a pic” button to add a picture and then

again click on “Click to add a pic” button to add another picture.


Once both of the pictures are uploaded, the tool will do a bit processing and then show a

percentage bar below showing how much the images look similar. This can be a great

tool to try out once you have used the above-mentioned tools. If you found any picture

that looks quite similar to the picture you uploaded, then you can use this tool to get an

actual estimation instead of just thinking about it in your head.

Also Read: How to Earn Money Selling Photos Online? – Everything You Need to

Know as a Beginner

The Pro Review From TechReviewPro

Finding similar faces on the web can be quite fun and in some cases important as well.

You can look for people that look similar to you, and may even find your own pictures

being used by other people. Such technology is also quite handy for tracking down
someone’s activity online, by checking out their other pictures that are online and

distributed over different websites (for legal purposes, of course).

All the above mentioned facial recognition search tools will help you find and identify

images that are similar to the picture you have uploaded. These services are free to use as

far as finding similar images are concerned, so use them as you please. If you know any

other good facial recognition search engines, do let us know in the comments and help

other readers.

One of the headlining new features Apple is touting with the announcement of the iPhone

X is the facial recognition tech used to unlock the handset. If you’re an Android user and

you’re jealous of this feature, you shouldn’t be. While it’s not nearly as advanced (or

secure) as the Face ID feature built-in to the iPhone X, Android has had facial recognition

technology for some time now…

On Android, the feature is called “Trusted face” and it was introduced within Smart lock

with the release of Android Lollipop.While it isn’t as precise as Apple’s Face ID — as

the iPhone X uses specialized hardware to map the user’s face, not to mention machine

learning models — Trusted face does do a semi-reliable job at unlocking when it sees the

owner’s face and no one else’s.


Below you will find the quick steps on how to set up Trusted face, improve its accuracy,

and remove it once you’re done using the feature.

How to set up Trusted Face

1. Go to your device’s Settings menu

2. Locate and enter Security (on Android Oreo it’s Security & Location)

3. Tap on Smart Lock under the Device security subheading

4. Enter your password, PIN, or pattern to confirm your ownership of the device

5. Select Trusted face

6. The UI will explain what Trusted face is, how it works, and tips on correctly

setting up your Trusted face

7. Hold your device level with your face and position yourself so that your entire

face is fully lit and inside of the on-screen circle

8. Keep your device still for several seconds until your face has been fully

recognized and saved

9. You can now unlock your Android device with facial recognition

How to improve facial recognition

1. Go to your device’s Settings menu

2. Locate and enter Security (on Android Oreo it’s Security & Location)

3. Tap on Smart Lock under the Device security subheading

4. Enter your password, PIN, or pattern to confirm your ownership of the device

5. Select Trusted face
6. Tap on Improve face matching

7. The UI will explain that you should be in different lighting than you were in when

initially setting up Trusted face and modify your appearance slightly with glasses,

hair style, or facial hair

8. Hold your device level with your face and position yourself so that your entire

face is fully lit and inside of the on-screen circle

9. Keep your device still for several seconds until your face has been fully

recognized and saved

10. Your Android device should now better recognize you and hopefully unlock

faster

How to remove Trusted face

1. Go to your device’s Settings menu

2. Locate and enter Security (on Android Oreo it’s Security & Location)

3. Tap on Smart Lock under the Device security subheading

4. Enter your password, PIN, or pattern to confirm your ownership of the device

5. Select Trusted face

6. Tap on Remove trusted face

7. A pop-up will ask if you really do want to remove Trusted face. If so, tap

on Remove
FACE RECOGNITION

Technology has come a long way in the last twenty years.Today,machines are able to

automatically verify identity information for secure transactions,for surveillance and

security tasks,and for access control to buildings etc.A facial recognition system is a

technology capable of identifying or verifying a person from a digital image or a video

frame from a video source.There are multiples methods in which facial recognition

systems work,but in general,they work by comparing selected facial features from given

image with faces within a databases.It is also described as a biometric as a biometric

artificial intelligence based application that can uniquely identity a person by analysing

patterns based on the persons facial textures and shape.While initially a form of computer

application. It has seen wider uses in recent times on mobile platforms and in other forms

of technology, such as robotics it is typically use as access control in security system and

can be compared to other biometrics such as fingerprint or eyes iris recognition system.

Although the accuracy of facial recognition system as a biometric technology is lower

than iris recognition and fingerprint recognition, it is widely adopted due ti its contactless

and non-invasive process. Recentky, it has also become popular as a commercial

identifocation and marketing tool. Other application include advance human computer

interaction, video surveillance, automatic indexing of images, and video database, among

others.
Compared to other Biometrics System

One key advantage of a facial recognition system that it is able to person mass

identification as it does not require the cooperation of the test subject to work. Properly

design system installed in airports, multiplexes, and other public places can identify

individual among the crowd, without passers by even being aware of the system.

However as compared to other biometric techniques, face recognition may not be most

reliable and effecient. Quality measures are very important in facial recognition systems

as large degress of variations are possible in face images. Factors such as illumination ,

expression, pose, and noise during face capture can affect the performance of facial

recognition systems. Among all biometric systems, facial recognition has the highest

false acceptance and rejection reates, thus questions have been raised on the effectiveness

of face recognition software in cases of railway and airport security.

Weaknesses

Ralph Gross, a researcher at the Carnegie melom Robotics Institute in 2008,

describes one obstacles related to the viewing angle of the face:” Face recognition has

been getting pretty good at full frontal faces and 20 degress off, but as soon as you go

towards profiles, there’ve been problems. Besides the pose variations, low-resolution face

images are also very hard to recognize. This one of the main obstacles of face recognition

in surveillance systems.

Face recognition is less effective if facial expressions vary.A big smile can render

the system less effective. For instance: Canada, in 2009, allowed only neutral facial
expression on passport photos. There is also inconstancy in the datasets used by

researchers. Researchers may use anywhere from several subjects to scores of subjects

and a few hundred image to thousands of imgaes. It is important for researchers to make

available the datasets they used to each other, or have atleast standard dataset.

Data privacy is the main concern when it comes to storing biometrics data in

companies. Data store about face or biometrics can be accessed by the third party if not

stored properly or hacked. In the tech world, parris adds (2017), “Hackers will already be

looking to replicate people’s faces to trick facial recognition system, but the technology

has proved harder to hack than fingerprint or voice recognition technology in the past.”

Ineffectiveness

Critics of the technology complain that the London Borough of Newham scheme

has, as of 2004, never recognized a single criminals, despite several criminals in the

system’s database living in the Borough and the system has been running for several

years.”Not once,aas far as the police know,has Newham’s automatic face recognition

system spotted a live target. “this information seems to conflict with claims that the

system was credited with a 34% reduction in crime (hence why it was rolled out to

birmingham also). Howeverit can be explained by the nation that when the public is

regularly told that they are under constant video surveillance with advanced face

recognition technology, this fear alone can reduce the crime rate, whether the face

recognition system technology works or does not. Thus has been the basis for several

other face recognition based security system, where the technology itself does not work

particularly well but the user’s perception of the technology does.


A system at Boston’s Logan Airport was shut down in 2003 after failing to make

any matches during a two-year test period. In 2014, Facebook started that in a

standardized two-option facial recognition test, its online system scored 97.25%

accuracy, compared to the human benchmark of 97.25.

In 2018, a report by the civil liberties and rights campaigning organisation Big

Brother Watch revealed that two UK police forces, South Wales Police and the

Metropolitan Police, were using live facial recognition at public events and in public

spaces,but with an accuracy rate as low as 2%. their report also warned of significant

potential human rights violations. It received widespread press coverage in the UK.

System are often advertised as having accuracy near 100%; this is misleading as

the studies often use much smaller sample sizes than would be necessary for large scale

applications. Because facial recognition is not completely accurate, it creates a list of

potential matches. A human operator matches and studies show the operators pick the

correct match out of the list only about half the time .this causes yhe issue of targeting

the wrong suspect

Face recognition is a method of identifying or verifying the identity of an

individual using their face. Face recognition systems can be used to identify people in

photos, video, or in real-time. Law enforcement may also use mobile devices to identify

people during police stops.

But face recognition data can be prone to error, which can implicate people for

crimes they haven’t committed. Facial recognition software is particularly bad at

recognizing African Americans and other ethnic minorities, women, and young people,

often misidentifying or failing to identify them, disparately impacting certain groups.


Additionally, face recognition has been used to target people engaging in

protected speech. In the near future, face recognition technology will likely become more

ubiquitous. It may be used to track individuals’ movements out in the world like

automated license plate readers track vehicles by plate numbers. Real-time face

recognition is already being used in other countries and even at sporting events in the

United States.

How Face Recognition Works

Source: Iowa Department of Transportation

Face recognition systems use computer algorithms to pick out specific, distinctive

details about a person’s face. These details, such as distance between the eyes or shape of

the chin, are then converted into a mathematical representation and compared to data on

other faces collected in a face recognition database. The data about a particular face is

often called a face template and is distinct from a photograph because it’s designed to

only include certain details that can be used to distinguish one face from another.

Some face recognition systems, instead of positively identifying an unknown

person, are designed to calculate a probability match score between the unknown person

and specific face templates stored in the database. These systems will offer up several

potential matches, ranked in order of likelihood of correct identification, instead of just

returning a single result.

Face recognition systems vary in their ability to identify people under challenging

conditions such as poor lighting, low quality image resolution, and suboptimal
angle of view (such as in a photograph taken from above looking down on an unknown

person).

When it comes to errors, there are two key concepts to understand:

A “false negative” is when the face recognition system fails to match a person’s

face to an image that is, in fact, contained in a database. In other words, the system will

erroneously return zero results in response to a query.

A “false positive” is when the face recognition system does match a person’s face

to an image in a database, but that match is actually incorrect. This is when a police

officer submits an image of “Joe,” but the system erroneously tells the officer that the

photo is of “Jack.”

When researching a face recognition system, it is important to look closely at the

“false positive” rate and the “false negative” rate, since there is almost always a trade-off.

For example, if you are using face recognition to unlock your phone, it is better if the

system fails to identify you a few times (false negative) than it is for the system to

misidentify other people as you and lets those people unlock your phone (false positive).

You might also like