Professional Documents
Culture Documents
Dominika Kamenská
Facial Recognition
Professional English
Facial recognition has in recent years exploded in popularity. Whether it´s the tagged
pictures on Facebook from a family gathering or a celebration with friends, facial recognition
can be found anywhere at any time. It has been even integrated into smartphones by Google,
Microsoft, Apple, and others to assemble albums of people that hang out together. Unlocking
your phone when your hands are wet or full of stuff, has also never been easier.
It sounds like the perfect technology to have and use, but facial recognition has its
downsides. The main goal of this work is to introduce the reader to facial recognition –
especially how it works – and to also state the possible risks and disadvantages of such widely
used technology.
1 FACIAL RECOGNITION
Facial or face recognition is a technology that uses an image, video, or other audio-
visual aspect of a person's face to recognize or verify him. This identification is typically used
to gain access to a program, device, or service.
It is a method of biometric identification that uses body measurements, in this case the
face and head, to verify a person's identity by looking at their facial biometric pattern and
details. To identify, verify, and/or authenticate an individual, the technology collects a
collection of specific biometric data associated with their face and facial expression. (1)
Speech recognition, fingerprint recognition, and eye retina or iris recognition are all
examples of biometric software. While the technology is primarily used for security and law
enforcement, there is growing interest in other applications.
The facial recognition process can perform two variants depending on when it is
performed (1):
The one in which a facial recognition system addresses a face for the first time
to register it and link it with an identity in a way that it is registered in the
system. Digital onboarding with facial recognition is another name for this
procedure.
The variant in which the user is authenticated, prior to being registered. The
incoming data from the camera is compared to the database's existing data in
this process. If the user's face matches an already-registered identity, the device
grants him access using his credentials.
Facial technology systems can vary, but in general, they tend to operate as follows:
1) Face detection
Page 1
The algorithm detects and locates the image of a face, either alone or in a crowd.
The image may show the person looking straight ahead or in profile.
This can be accomplished in a variety of ways, but the most common is to use a
second neural network. It is fed a series of face images and is taught how to distinguish
between them over several rounds. Some algorithms map the face directly, taking into
account the distances between the eyes, nose, and mouth, among other things. Or in other
words the software reads the geometry of the face. Others use more abstract features to
chart the face. (2)
In either case, the network generates a vector for each face, which is a string of
numbers that distinguishes the individual from the rest of the training set. Therefore, the
goal is to figure out what facial landmarks are essential for recognizing your face.
Image 1: Example of facial recognition – how the vectors are being used
Based on a person's facial features, the face capture process converts analog
information (a face) into a collection of digital information (data). The analysis of your
face is basically reduced to a mathematical formula. Faceprint refers to the numerical
code. Each individual has their own faceprint, similar to how thumbprints are special.
4) Finding a match
After that, the faceprint is linked to a database of other people's faces. The FBI, for
example, has access to up to 650 million images extracted from a variety of state
databases.
Page 2
Any picture tagged with a person's
name on Facebook is stored in Facebook's
database, which can be used for facial
recognition. A determination is made if the
faceprint matches a picture in a facial
recognition database.
A. Unlocking phones
Face recognition is used to unlock a variety of phones, including the most popular
iPhones. The technology provides a powerful way to secure personal information and
guarantees that confidential data is unavailable even if the phone is stolen. According to
Apple, the chances of a random face unlocking your phone are one in one million. (4)
B. Law enforcements
Law enforcement also employs facial recognition technology. According to this NBC
article (5), law enforcement departments in the United States are becoming more
technologically advanced, and the same is true in other countries. Arrestees' mugshots are
collected and compared to facial recognition databases at the local, national, and federal
levels. When an arrestee's photo is taken, it will be entered into databases and scanned if
police conduct another criminal investigation.
Missing people and victims of human trafficking may be identified using facial
recognition technology. Assuming that a database is created to track down missing people. In
any scenario, law enforcement will be notified as soon as a person is recognized by face
recognition, whether in an airport, a convenience store, or another public location.
Page 3
D. Reducing retail crime
2.1 Advantages
Increased security
Reduced crime
Burglars, robbers, and trespassers can be identified more easily through facial
recognition. The mere knowledge of a face recognition system will act as a deterrent,
particularly in the case of petty crime. There are advantages of cybersecurity in addition to
physical defence. Facial recognition technology can be used to unlock machines in place of
passwords.
Greater convenience
Customers will be able to pay in supermarkets with their faces rather than credit cards
or cash as the system becomes more widely used. This will reduce the amount of time spent in
checkout lines. Since facial recognition requires no touch, unlike fingerprinting or other
security measures – which would be useful in the post-COVID environment – it provides a
simple, automated, and seamless authentication experience.
Page 4
The majority of facial recognition software is compliant with security software. It is,
in effect, simple to integrate. This reduces the amount of extra money needed to put it in
place.
2.2 Disadvantages
Surveillance
Some fear that the use of facial recognition, in combination with pervasive video
cameras, artificial intelligence, and data analytics, would lead to mass surveillance, limiting
human rights. Governments can use face recognition technologies to track down terrorists, but
it may also be used to track down average, innocent individuals at any moment.
Possible errors
Facial recognition data is not error-free, which means that individuals could be
accused of offences they did not commit. A minor difference in camera angle, for example, or
a change in appearance, such as a new hairstyle, may result in an error. For example, in 2018,
Newsweek revealed that Amazon's facial recognition system had mistakenly named 28
members of the US Congress as criminals.
Breach of privacy
The most controversial issue is one of ethics and privacy. Governments have been
known to store photos of people without their permission. In 2020, the European Commission
announced that it was proposing a five-year ban on facial recognition technologies in public
spaces to give it time to develop a legal system to deter privacy and ethical violations.
Facial recognition software is based on machine learning, which takes a large amount
of data to "read" and provide correct results. Wide data sets require reliable data storage.
Small and medium-sized businesses may not have the necessary capacity to retain the data.
Page 5
3 CONCLUSIONS
Although biometric data is widely regarded as one of the most secure authentication
mechanisms, it also carries significant risks. If a person's credit card information is stolen,
they will freeze their credit and take action to alter the stolen personal information. But what
happens when you lose your digital identity, such as your faceprint?
Deepfakes also pose a threat to such security, especially with its ability to replace a
person in an existing image or video with someone else. Therefore it´s easy to assume that
such technologies can be used to fake your digital identity and get access to your personal
data. And as facial recognition becomes even more widely spread, the potential for hackers to
steal your facial data and use it to commit fraud grows.
Despite all the possible risks, biometric technology – such as facial recognition – has a
lot of potential in terms of defence. Regardless of the dangers, the devices are practical and
difficult to replicate.
Page 6
REFERENCES
5. Schuppe, Jon. How facial recognition became a routine policing tool in Americ.
www.nbcnews.com. [Online] 11 May 2019. [Cited: 15 April 2021.]
https://www.nbcnews.com/news/us-news/how-facial-recognition-became-routine-policing-
tool-america-n1004251.
Page 7