Generally speaking, a computer system that recognizes human faces does so by performing pattern recognition on an image of the face. An algorithm is used to compare certain landmarks and proportions within the facial image to known physical characteristics of people known to the system.
There are many examples in which face recognition technology has been applied successfully for commercial purposes. These include automated ticket management systems at theme parks such as Disneyland, or by law enforcement agencies such as the U.S Department of Homeland Security and the Federal Bureau of Investigation (FBI). However, there is one large difference between facial recognition and facial authentication, and that is privacy and consent. Let us weigh the benefits.
- Benefits of Face Recognition
- Face Recognition Techniques
- Methods Based Upon Individual Feature Extraction
- Methods Based Upon Appearance
- Methods Based Upon 3D Face Modeling
- Methods Utilizing Videos
- Methods Utilizing Parametric Representation Of Faces
- Methods Based Upon Local Binary Pattern Histograms
- Methods Based Upon Fourier Descriptors
- Methods Based Upon Wavelet Transforms
- Methods Utilizing Fractal Geometry
- Methods Utilizing Boundary Moments
- Methods Based Upon Neural Networks
- Software Packages
There are many benefits to using face recognition technology instead of traditional identification methods like passports or identification cards.
- It requires no special equipment to work and can be used by itself or as an addition to other security measures.
- The technology is quick and has a near-perfect success rate at identifying people, making it ideal for security purposes such as border control and surveillance.
- Face recognition technologies are also available on mobile devices so they can be used in almost any situation where identification is needed.
- Face recognition negates the need to carry identification papers wherever you go and makes it safer than other methods of identification which rely on card readers, scanners, and other bulky equipment that could potentially fail or malfunction under pressure.
- Face recognition can easily be combined with other biometric data such as fingerprint matching. This leads to improved accuracy rates over traditional identification techniques that aren’t capable of identifying individuals with the same degree of specificity.
- Face recognition software can also be used to identify people by their voices or other physical characteristics such as fingerprints, irises, and even the way they walk.
- The cost for this technology has been steadily dropping in recent years and it is becoming more effective at detecting fraud and identifying criminals including those who participate in human trafficking or online crime.
- Another benefit to face recognition is it reduces policing costs because less time is required to find criminals. This may help reduce overcrowding in prisons and allow offenders access to rehabilitation programs earlier. There are several drawbacks, however, including privacy concerns as well as difficulties with accuracy rates such as false detection.
The largest caveat and understandable public concern with facial recognition is its lack of consent and privacy. More large companies, like Walgreens, are using facial recognition to identify would-be shoplifters and taking stock of regular customers in the process. Facial authentication, however, requires prior consent into a closed database, protecting the space’s security and user’s privacy.
There are several methods utilized in different domains.
This method exploits distinctive features like the distance between eyes, nose, and mouth.
This method usually involves image differentiation in the overall image appearance to obtain an appearance map.
3D face models are computed by considering the symmetry of the left and right sides of the face. This is achieved by applying a gradient transformation on both sides of the images. The local surface orientation of both sides is then considered for matching with the prototype model of the face database.
Video sequences are broken down into static frames, which can be analyzed individually or jointly using sequential techniques like dynamic time warping (DTW) to align them before further processing for recognition purposes.
This method treats faces as bounded-continuous two-dimensional manifolds.
Techniques Utilizing Eigenspace
Eigenfaces are obtained by using Principal Component Analysis (PCA) to the face images. They are then mapped to a much smaller Eigenspace, where recognition is performed by considering these subspaces.
This method exploits local features for image representation, where features like edge direction histograms or Gabor filters are used depending on the application domain. The set of all such features constitutes an Eigen feature vector, which forms the input to classifiers like neural network and Support Vector Machine (SVM).
These methods represent face images in terms of LBP histograms computed from the images. A set of LBP histograms is then mapped to a codebook (of size ≤30), which forms the input for classifiers like SVM.
These methods obtain spectral descriptors by projecting face images into their frequency domain, where these are then used as features in classification algorithms like SVM.
Wavelet transforms are performed on both facial regions and reference faces to obtain invariant representations for recognition purposes using sub-band coding techniques.
Fractals are defined as geometric shapes having similar properties at different scales or resolutions. This property may be exploited for analysis of face images represented in terms of object fractal dimension (OFD). Finally, the algorithm is applied to various levels of scale and noise to obtain consistent results for recognition purposes.
The boundaries in objects can be made up of straight lines or curves, either closed loops or arcs; the geometric object which encloses this boundary element is known as a boundary moment. This technique exploits these moments in building classifiers like SVM.
A neural network attempts to model how a set of neurons in the brain processes information by considering itself as composed of interconnected neurons acting in concert. These artificial networks are used instead of conventional approaches such as Eigen features and DTW when there is no underlying statistical model for face behavior.
Many software packages are available for face recognition, some of them include Eigenfaces and Fisherfaces by Matthew Turk and Alex Pentland at the MIT Media Laboratory vision algorithms applied to monocular images.
Face recognition is a technology that can be used to identify people by their faces. It works by identifying certain key points on the face, known as landmarks, and then creating a mathematical model of the face based upon these points. Previously, this process wasn’t entirely successful because identical twins couldn’t be distinguished from each other.
As of now, face recognition typically uses facial measurements to create unique templates for individuals that are often stored in databases along with personal information such as name and Social Security number. However, consumers have grown understandably concerned for their privacy and consent in being potentially logged into these systems. Luckily, new artificial intelligence software has now been developed that can distinguish between two different faces, but only stores the facial credentials of personnel who have willingly opted in.