{"id":408,"date":"2020-06-04T21:37:58","date_gmt":"2020-06-04T21:37:58","guid":{"rendered":"http:\/\/ssrc.ie\/blog\/?p=408"},"modified":"2020-06-04T21:45:30","modified_gmt":"2020-06-04T21:45:30","slug":"understanding-the-basics-of-facial-recognition-technology","status":"publish","type":"post","link":"http:\/\/ssrc.ie\/blog\/2020\/06\/04\/understanding-the-basics-of-facial-recognition-technology\/","title":{"rendered":"Understanding the Basics of Facial Recognition Technology"},"content":{"rendered":"\n<p>Biometric security was first commercially introduced to the digital world with the use of fingerprint technology which was to a large extent, grouped under digital forensics. This technology has thrived but can definitely be improved in many ways. Facial recognition technology takes care of the majority of its drawbacks with its ability for remote verification, ease of use, and affordability.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-attachment-id=\"411\" data-permalink=\"http:\/\/ssrc.ie\/blog\/2020\/06\/04\/understanding-the-basics-of-facial-recognition-technology\/man-wearing-led-purge-mask-3605901\/\" data-orig-file=\"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?fit=2560%2C1707\" data-orig-size=\"2560,1707\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"man-wearing-led-purge-mask-3605901\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?fit=300%2C200\" data-large-file=\"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?fit=640%2C427\" decoding=\"async\" loading=\"lazy\" width=\"2560\" height=\"1707\" src=\"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?fit=640%2C427\" alt=\"\" class=\"wp-image-411\" srcset=\"https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?w=2560 2560w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?resize=300%2C200 300w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?resize=1024%2C683 1024w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?resize=768%2C512 768w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?resize=1536%2C1024 1536w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?resize=2048%2C1365 2048w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?w=1280 1280w, https:\/\/i1.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/06\/man-wearing-led-purge-mask-3605901-scaled.jpg?w=1920 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><figcaption>Photo by <strong><a href=\"https:\/\/www.pexels.com\/@ryan-miguel-capili-1710923?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\">Ryan Miguel Capili<\/a><\/strong> from <strong><a href=\"https:\/\/www.pexels.com\/photo\/man-wearing-led-purge-mask-3605901\/?utm_content=attributionCopyText&amp;utm_medium=referral&amp;utm_source=pexels\">Pexels<\/a><\/strong><\/figcaption><\/figure>\n\n\n\n<p><strong>Working Principles of Facial Recognition Technology<\/strong><\/p>\n\n\n\n<p>The facial recognition system can be implemented in two major ways. The basic form is 2D imaging which uses flat images from pictures. This is rather inaccurate as the software can easily be fooled by properties such as angles and shadows. 3D imaging, a more advanced system, uses a web of infrared lights that mark every facial characteristic.<\/p>\n\n\n\n<p>This web of lights is then sent through the camera to the software. The pixels will then be converted into a numeric code. This code is then compared with other stored values in the database in order to make a match. On a more advanced and complex level, some systems use the <a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1111\/srt.12793\">surface texture analysis <\/a>technique which focuses on skin properties such as wrinkles and distance between skin pores to accurately make a match.<\/p>\n\n\n\n<p>As with most applications that deal with Artificial Intelligence and Machine Learning, the more the raw data used to train the algorithms, the more accurate the result. Hence, virtually every facial image picked up by facial recognition software ends up getting saved to a database.<\/p>\n\n\n\n<p>From the technical point of view, facial recognition works based on the geometry of the facial attributes such as:<\/p>\n\n\n\n<ul><li>the shape of the face<\/li><li>distance between the eyeballs<\/li><li>depth of the eye sockets<\/li><li>width of the nose<\/li><li>jawline structure<\/li><\/ul>\n\n\n\n<p>When these attributes are put together, they form a facial signature. This puts the technology under the biometrics field since the details generated are peculiar to every human being \u2013 just like their fingerprint and iris structure.<\/p>\n\n\n\n<p><strong>Facial Recognition Used in Various Sectors<\/strong><\/p>\n\n\n\n<p>This technology has found its way into a couple of sectors. Explained below are some of the ways facial recognition technology is making waves:<\/p>\n\n\n\n<p><strong>Law Enforcement<\/strong>: The primary benefit of facial recognition technology in this regard is for the detection and prevention of criminal activities. Apart from its obvious use in policing, this technology is used for issuance and identification of identity documents in order to prevent any form of identity fraud. Face match is also used in carrying out security missions in public places. Such a use case presents itself when there is a potential security threat at a large gathering or to find missing adults or children.<\/p>\n\n\n\n<p><strong>Health<\/strong>: With respect to health, significant advancement has been made in this area. With the use of this technology:<\/p>\n\n\n\n<ul><li>a patient\u2019s use of medication can be appropriately tracked;<\/li><li>pain management procedures can be administered and;<\/li><li>genetic diseases such as DiGeorge syndrome can be detected. This has a success rate of 96.6%.<\/li><\/ul>\n\n\n\n<p><strong>Retail Shopping<\/strong>: Although one of the least areas that would be expected to use such technology so soon, retail outlets have begun using facial recognition in marketing processes in order to improve customer experience. Stores in the US such as Amazon GO and <a href=\"https:\/\/www.theguardian.com\/cities\/2016\/mar\/03\/revealed-facial-recognition-software-infiltrating-cities-saks-toronto\">Saks Fifth Avenue<\/a> are reportedly using such technology.<\/p>\n\n\n\n<p><strong>Nothing is Completely Free<\/strong><\/p>\n\n\n\n<p>Nothing good comes entirely free \u2013 not especially with respect to technology that deals with data and privacy. In the quest for a large number of facial images used to train algorithms, governments and institutions often create lopsided agreements or employ the use of illicit methods in order to obtain this data, which has paved way for <a href=\"https:\/\/www.expressvpn.com\/blog\/the-fight-against-facial-recognition\/\">facial recognition protests in the US<\/a>.<\/p>\n\n\n\n<p>Unknown to many, Facebook has a facial recognition feature turned on for users and this would most likely help them train their models. In order to keep personal data safe, you can turn this feature off. It is also advisable that everyone reads privacy policies properly and take proper precautions when performing online activities on websites that collect user data.<\/p>\n\n\n\n<p>Chris Jones @TurnOnVPN<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Biometric security was first commercially introduced to the digital world with the use of fingerprint technology which was to a large extent, grouped under digital forensics. This technology has thrived but can definitely be improved in many ways. Facial recognition technology takes care of the majority of its drawbacks with its ability for remote verification, &#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[1],"tags":[75,59,76],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9PkL7-6A","jetpack-related-posts":[{"id":284,"url":"http:\/\/ssrc.ie\/blog\/2020\/01\/31\/facial-recognition-technology-the-opportunities-dangers\/","url_meta":{"origin":408,"position":0},"title":"Facial Recognition Technology: The Opportunities &#038; Dangers","date":"January 31, 2020","format":false,"excerpt":"Introduction Sharing space with the rest of humanity isn\u2019t always sunshine and roses. You could be forgiven for having it crossed your mind that a more ordered society, where people were held to account for their inconsiderate actions, would be a good thing. Like most in society, I wouldn't be\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2020\/01\/girl-on-phone-1.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":441,"url":"http:\/\/ssrc.ie\/blog\/2021\/02\/01\/the-role-technology-plays-in-education\/","url_meta":{"origin":408,"position":1},"title":"The Role Technology Plays in Education","date":"February 1, 2021","format":false,"excerpt":"Introduction This blog post will examine the role that technology plays in education in our modern society and the impacts digital revolution has and continues to have on the education process. Technology is all around us and it is constantly continuing to expand. Technology is certainly being merged into the\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2021\/02\/pexels-photo-2774556-1.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":433,"url":"http:\/\/ssrc.ie\/blog\/2021\/01\/29\/virtual-needs\/","url_meta":{"origin":408,"position":2},"title":"Virtual Needs","date":"January 29, 2021","format":false,"excerpt":"Introduction Maslow's theory affirmed the motivation of human needs and arranged a hierarchy of relevance. The bottom of the pyramid are basic needs, biological and physiological \u2013 food, water, warmth, and above this level is love and relationships. Next is self-esteem and finally at the top self-actualisation. He stated that\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2021\/01\/pexels-artem-beliaikin-2490920-1-scaled.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":415,"url":"http:\/\/ssrc.ie\/blog\/2021\/01\/25\/the-digital-black-hole\/","url_meta":{"origin":408,"position":3},"title":"The Digital Black Hole","date":"January 25, 2021","format":false,"excerpt":"Introduction iPhones, laptops, PlayStations, Smart-Watches \u2013 you name it, we have it. We have evolved into a generation that is obsessed with our technological devices, such as our phones for example. A generation that must have the latest technology, gadget or model. A generation that if we were asked too,\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2021\/01\/texting.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":72,"url":"http:\/\/ssrc.ie\/blog\/2018\/01\/23\/the-impact-the-overuse-of-technology-has-on-humans-and-the-environment\/","url_meta":{"origin":408,"position":4},"title":"The impact the overuse of technology has on humans and the environment","date":"January 23, 2018","format":false,"excerpt":"This blog post would like to critically examine the driving factors that see an acceleration in the use of communicative technology. The general theme throughout will be how technology is taking away from human interaction and increasing other social issues. To carry out this research, the blog will explore the\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2018\/01\/pokemon-pokemon-go-phone-game-159395.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":208,"url":"http:\/\/ssrc.ie\/blog\/2019\/01\/16\/the-digital-worlds-environmental-impact\/","url_meta":{"origin":408,"position":5},"title":"The Digital World&#8217;s Environmental Impact","date":"January 16, 2019","format":false,"excerpt":"Introduction The production, consumption and disposal of the digital world has considerable environmental impacts. Hodgson (2015) states that global data centres are producing the same amount of emissions as aviation. E-waste and the ways in which to manage it are contestable. In 1998 electrical and electronic waste was estimated to\u2026","rel":"","context":"In &quot;Digital Citizenship&quot;","img":{"alt_text":"","src":"https:\/\/i2.wp.com\/ssrc.ie\/blog\/wp-content\/uploads\/2019\/01\/e-waste.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts\/408"}],"collection":[{"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":4,"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"predecessor-version":[{"id":413,"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/posts\/408\/revisions\/413"}],"wp:attachment":[{"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ssrc.ie\/blog\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}