0% found this document useful (0 votes)
299 views12 pages

Facial Recognition System

A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Some algorithms identify faces by extracting landmarks, or features, from an image of the subject's face.

Uploaded by

Tanu Raman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
299 views12 pages

Facial Recognition System

A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. Some algorithms identify faces by extracting landmarks, or features, from an image of the subject's face.

Uploaded by

Tanu Raman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 12

Facial recognition system

From Wikipedia, the free encyclopedia


Jump to: navigation, search
"Face recognition" redirects here. For the human cognitive process, see Face
perception.
It has been suggested that this article or section be merged with face detection
and three-dimensional face recognition. (Discuss)
This article needs attention from an expert on the subject. See the talk page
for details. WikiProject Robotics or the Robotics Portal may be able to help
recruit an expert. (June 2008)

Swiss European surveillance: facial recognition and vehicle make, model, color and
license plate reader.

Side View.
Close-up of the infrared illuminator. This light is invisible to the human eye but it creates
a day-like environment for the surveillance cameras.

A facial recognition system is a computer application for automatically identifying or


verifying a person from a digital image or a video frame from a video source. One of the
ways to do this is by comparing selected facial features from the image and a facial
database.

It is typically used in security systems and can be compared to other biometrics such as
fingerprint or eye iris recognition systems.[1]

Contents
[hide]

• 1 Techniques
o 1.1 Traditional
o 1.2 3-D
o 1.3 Skin texture analysis
• 2 Software
• 3 Notable users and deployments
o 3.1 Additional uses
• 4 Comparative study
• 5 Criticisms
o 5.1 Weaknesses
o 5.2 Effectiveness
o 5.3 Privacy concerns
• 6 Recent Improvements
• 7 Early development
• 8 See also
• 9 References

• 10 External links

[edit] Techniques
[edit] Traditional

Some facial recognition algorithms identify faces by extracting landmarks, or features,


from an image of the subject's face. For example, an algorithm may analyze the relative
position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are
then used to search for other images with matching features.[2] Other algorithms
normalize a gallery of face images and then compress the face data, only saving the data
in the image that is useful for face detection. A probe image is then compared with the
face data.[3] One of the earliest successful systems[4] is based on template matching
techniques[5] applied to a set of salient facial features, providing a sort of compressed face
representation.

Recognition algorithms can be divided into two main approaches, geometric, which looks
at distinguishing features, or photometric, which is a statistical approach that distill an
image into values and comparing the values with templates to eliminate variances.

Popular recognition algorithms include Principal Component Analysis with eigenface,


Linear Discriminate Analysis, Elastic Bunch Graph Matching fisherface, the Hidden
Markov model, and the neuronal motivated dynamic link matching.

[edit] 3-D

A newly emerging trend, claimed to achieve previously unseen accuracies, is three-


dimensional face recognition. This technique uses 3-D sensors to capture information
about the shape of a face. This information is then used to identify distinctive features on
the surface of a face, such as the contour of the eye sockets, nose, and chin.[6]

One advantage of 3-D facial recognition is that it is not affected by changes in lighting
like other techniques. It can also identify a face from a range of viewing angles, including
a profile view.[2][6]

Even a perfect 3D matching technique could be sensitive to expressions. For that goal a
group at the Technion applied tools from metric geometry to treat expressions as
isometries[7]

[edit] Skin texture analysis

Another emerging trend uses the visual details of the skin, as captured in standard digital
or scanned images. This technique, called skin texture analysis, turns the unique lines,
patterns, and spots apparent in a person’s skin into a mathematical space.[2]

Tests have shown that with the addition of skin texture analysis, performance in
recognizing faces can increase 20 to 25 percent.[2][6]

[edit] Software
• Google's Picasa digital image organizer has a built in face recognition system
starting from version 3.5 onwards. It can associate faces with persons, so that
queries can be run on pictures to return all pictures with a specific group of people
together. Picasaweb.com has also been providing a similar feature to its users.
• Apple iPhoto, photo organizer distributed with iLife suite of applications includes
a system using which people can tag recognized people on photos. Then they can
be searched using Spotlight.
• Sony's Picture Motion Browser (PMB) analyses photo, associates photos with
identical faces so that they can be tagged accordingly, and differentiates between
photos with one person, many persons and nobody.
• Facebook also included face recognition technology

[edit] Notable users and deployments


The London Borough of Newham, in the UK, previously trialled a facial recognition
system built into their borough-wide CCTV system.

The German Federal Police use a facial recognition system to allow voluntary subscribers
to pass fully automated border controls at Frankfurt Rhein-Main international airport.
Subscribers need to be European Union or Swiss citizens.[citation needed] Since 2005 the
German Federal Criminal Police Office offers centralized facial recognition on mugshot
images for all German police agencies. Recognition systems are also used by casinos to
catch card counters and other blacklisted individuals.

The Australian Customs Service has an automated border processing system called
SmartGate that uses facial recognition. The system compares the face of the individual
with the image in the e-passport microchip, certifying that the holder of the passport is
the rightful owner.

Pennsylvania Justice Network searches crime scene photographs and CCTV footage in
the mugshot database of previous arrests. A number of cold cases have been resolved
since the system became operational in 2005. Other law enforcement agencies in the
USA and abroad use arrest mugshot databases in their forensic investigative work.

U.S. Department of State operates one of the largest face recognition systems in the
world with over 75 million photographs that is actively used for visa processing.

Spaceship Earth in Epcot uses this[?] for the touch screen part of the ride.

[edit] Additional uses

In addition to being used for security systems, authorities have found a number of other
applications for facial recognition systems. While earlier post 9/11 deployments were
well publicized trials, more recent deployments are rarely written about due to their
covert nature.

At Super Bowl XXXV in January 2001, police in Tampa Bay, Florida, used Identix'
facial recognition software, FaceIt, to search for potential criminals and terrorists in
attendance at the event.[2] (it found 19 people with pending arrest warrants)[8]

In the 2000 presidential election, the Mexican government employed facial recognition
software to prevent voter fraud. Some individuals had been registering to vote under
several different names, in an attempt to place multiple votes. By comparing new facial
images to those already in the voter database, authorities were able to reduce duplicate
registrations.[9] Similar technologies are being used in the United States to prevent people
from obtaining fake identification cards and driver’s licenses.[10][11]

There are also a number of potential uses for facial recognition that are currently being
developed. For example, the technology could be used as a security measure at ATM’s;
instead of using a bank card or personal identification number, the ATM would capture
an image of your face, and compare it to your photo in the bank database to confirm your
identity. This same concept could also be applied to computers; by using a webcam to
capture a digital image of yourself, your face could replace your password as a means to
log-in.[2]

As part of the investigation of the disappearance of Madeleine McCann the British police
are calling on visitors to the Ocean Club Resort, Praia da Luz in Portugal or the
surrounding areas in the two weeks leading up to the child's disappearance on Thursday 3
May 2007 to provide copies of any photographs of people taken during their stay, in an
attempt to identify the abductor using a biometric facial recognition application.[12][13]

Also, in addition to biometric usages, modern digital cameras often incorporate a facial
detection system that allows the camera to focus and measure exposure on the face of the
subject, thus guaranteeing a focused portrait of the person being photographed. Some
cameras, in addition, incorporate a smile shutter, or take automatically a second picture if
someone closed their eyes during exposure.

[edit] Comparative study


Among the different biometric techniques, facial recognition may not be the most reliable
and efficient. However, one key advantage is that it does not require aid (or consent)
from the test subject. Properly designed systems installed in airports, multiplexes, and
other public places can identify individuals among the crowd. Other biometrics like
fingerprints, iris scans, and speech recognition cannot perform this kind of mass
identification. However, questions have been raised on the effectiveness of facial
recognition software in cases of railway and airport security.

[edit] Criticisms
[edit] Weaknesses

Face recognition is not perfect and struggles to perform under certain conditions. Ralph
Gross, a researcher at the Carnegie Mellon Robotics Institute, describes one obstacle
related to the viewing angle of the face: "Face recognition has been getting pretty good at
full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been
problems."[6]
Other conditions where face recognition does not work well include poor lighting,
sunglasses, long hair, or other objects partially covering the subject’s face, and low
resolution images.[2]

Another serious disadvantage is that many systems are less effective if facial expressions
vary. Even a big smile can render in the system less effective. For instance: Canada now
allows only neutral facial expressions in passport photos.[14]

This section requires expansion.

[edit] Effectiveness

Critics of the technology complain that the London Borough of Newham scheme has, as
of 2004, never recognized a single criminal, despite several criminals in the system's
database living in the Borough and the system having been running for several years.
"Not once, as far as the police know, has Newham's automatic facial recognition system
spotted a live target."[15][16] This information seems to conflict with claims that the system
was credited with a 34% reduction in crime (hence why it was rolled out to Birmingham
also)[17]. However it can be explained by the notion that when the public is regularly told
that they are under constant video surveillance with advanced face recognition
technology, this fear alone can reduce the crime rate, whether the face recognition system
technically works or does not. This has been the basis for several other face recognition
based security systems, where the technology itself does not work particularly well but
the user's perception of the technology does.

An experiment by the local police department in Tampa, Florida, had similarly


disappointing results.[18]

"Camera technology designed to spot potential terrorists by their facial characteristics at


airports failed its first major test at Boston's Logan Airport"[19]

[edit] Privacy concerns

Many citizens are concerned that their privacy will be invaded. Some fear that it could
lead to a “total surveillance society,” with the government and other authorities having
the ability to know where you are, and what you are doing, at all times. This is not to be
an underestimated concept as history has shown that states have typically abused such
access before.[20]

[edit] Recent Improvements


In 2006, the performance of the latest face recognition algorithms were evaluated in the
Face Recognition Grand Challenge (FRGC). High-resolution face images, 3-D face
scans, and iris images were used in the tests. The results indicated that the new
algorithms are 10 times more accurate than the face recognition algorithms of 2002 and
100 times more accurate than those of 1995. Some of the algorithms were able to
outperform human participants in recognizing faces and could uniquely identify identical
twins.[6]

Low-resolution images of faces can be enhanced using face hallucination. Further


improvements in high resolution, megapixel cameras in the last few years have helped to
resolve the issue of insufficient resolution.

[edit] Early development


Pioneers of Automated Facial Recognition include: Woody Bledsoe, Helen Chan Wolf,
and Charles Bisson.

During 1964 and 1965, Bledsoe, along with Helen Chan and Charles Bisson, worked on
using the computer to recognize human faces (Bledsoe 1966a, 1966b; Bledsoe and Chan
1965). He was proud of this work, but because the funding was provided by an unnamed
intelligence agency that did not allow much publicity, little of the work was published.
Given a large database of images (in effect, a book of mug shots) and a photograph, the
problem was to select from the database a small set of records such that one of the image
records matched the photograph. The success of the method could be measured in terms
of the ratio of the answer list to the number of records in the database. Bledsoe (1966a)
described the following difficulties:

This recognition problem is made difficult by the great variability in head

“ rotation and tilt, lighting intensity and angle, facial expression, aging, etc.
Some other attempts at facial recognition by machine have allowed for little
or no variability in these quantities. Yet the method of correlation (or
pattern matching) of unprocessed optical data, which is often used by some
researchers, is certain to fail in cases where the variability is great. In
particular, the correlation is very low between two pictures of the same
person with two different head rotations.

—Woody Bledsoe, 1966

This project was labeled man-machine because the human extracted the coordinates of a
set of features from the photographs, which were then used by the computer for
recognition. Using a graphics tablet (GRAFACON or RAND TABLET), the operator
would extract the coordinates of features such as the center of pupils, the inside corner of
eyes, the outside corner of eyes, point of widows peak, and so on. From these
coordinates, a list of 20 distances, such as width of mouth and width of eyes, pupil to
pupil, were computed. These operators could process about 40 pictures an hour. When
building the database, the name of the person in the photograph was associated with the
list of computed distances and stored in the computer. In the recognition phase, the set of
distances was compared with the corresponding distance for each photograph, yielding a
distance between the photograph and the database record. The closest records are
returned.
This brief description is an oversimplification that fails in general because it is unlikely
that any two pictures would match in head rotation, lean, tilt, and scale (distance from the
camera). Thus, each set of distances is normalized to represent the face in a frontal
orientation. To accomplish this normalization, the program first tries to determine the tilt,
the lean, and the rotation. Then, using these angles, the computer undoes the effect of
these transformations on the computed distances. To compute these angles, the computer
must know the three-dimensional geometry of the head. Because the actual heads were
unavailable, Bledsoe (1964) used a standard head derived from measurements on seven
heads.

After Bledsoe left PRI in 1966, this work was continued at the Stanford Research
Institute, primarily by Peter Hart. In experiments performed on a database of over 2000
photographs, the computer consistently outperformed humans when presented with the
same recognition tasks (Bledsoe 1968). Peter Hart (1996) enthusiastically recalled the
project with the exclamation, "It really worked!"

By about 1997, the system developed by Christoph von der Malsburg and graduate
students of the University of Bochum in Germany and the University of Southern
California in the United States outperformed most systems with those of Massachusetts
Institute of Technology and the University of Maryland rated next. The Bochum system
was developed through funding by the United States Army Research Laboratory. The
software was sold as ZN-Face and used by customers such as Deutsche Bank and
operators of airports and other busy locations. The software was "robust enough to make
identifications from less-than-perfect face views. It can also often see through such
impediments to identification as mustaches, beards, changed hair styles and glasses—
even sunglasses".[21]

In about January 2007, image searches were "based on the text surrounding a photo," for
example, if text nearby mentions the image content. Polar Rose technology can guess
from a photograph, in about 1.5 seconds, what any individual may look like in three
dimensions, and thought they "will ask users to input the names of people they recognize
in photos online" to help build a database.[citation needed]

[edit] See also


• Automatic number plate recognition
• Biometric technology in access control
• Computer vision
• Eigenface
• Face detection
• Face perception
• Glasgow Face Matching Test
• Iris recognition
• MALINTENT
• Mass surveillance
• Pattern recognition, analogy and case-based reasoning
• Retinal scan
• Template matching
• Three-dimensional face recognition
• Vein matching

[edit] References
1. ^ "Facial Recognition Applications". Animetrics.
http://www.animetrics.com/technology/frapplications.html. Retrieved 2008-06-04.
2. ^ a b c d e f g Bonsor, K.. "How Facial Recognition Systems Work".
http://computer.howstuffworks.com/facial-recognition.htm. Retrieved 2008-06-02.
3. ^ Smith, Kelly. "Face Recognition" (PDF).
http://www.biometrics.gov/Documents/FaceRec.pdf. Retrieved 2008-06-04.
4. ^ R. Brunelli and T. Poggio, "Face Recognition: Features versus Templates", IEEE
Trans. on PAMI, 1993, (15)10:1042-1052
5. ^ R. Brunelli, Template Matching Techniques in Computer Vision: Theory and Practice,
Wiley, ISBN 978-0-470-51706-2, 2009 ([1] TM book)
6. ^ a b c d e Williams, Mark. "Better Face-Recognition Software".
http://www.technologyreview.com/Infotech/18796/?a=f. Retrieved 2008-06-02.
7. ^ Kimmel, Ron. "Three-dimensional face recognition".
http://www.cs.technion.ac.il/~ron/PAPERS/BroBroKimIJCV05.pdf. Retrieved 2005-01-
01.
8. ^ McNealy, Scott. "Privacy is (Virtually) Dead".
http://www.jrnyquist.com/aug20/privacy.htm. Retrieved 2006-12-24.
9. ^ "Mexican Government Adopts FaceIt Face Recognition Technology to Eliminate
Duplicate Voter Registrations in Upcoming Presidential Election". Business Wire. 2000-
05-11. http://findarticles.com/p/articles/mi_m0EIN/is_2000_May_11/ai_62019954.
Retrieved 2008-06-02.
10. ^ House, David. "Facial recognition at DMV". Oregon Department of Transportation.
http://www.oregon.gov/ODOT/DMV/news/cards_facialrec.shtml. Retrieved 2007-09-17.
"Oregon DMV is going to start using “facial recognition” software, a new tool in the
prevention of fraud, required by a new state law. The law is designed to prevent someone
from obtaining a driver license or ID card under a false name."
11. ^ Schultz, Zac. "Facial Recognition Technology Helps DMV Prevent Identity Theft".
WMTV News, Gray Television. http://www.nbc15.com/news/headlines/2684991.html.
Retrieved 2007-09-17. "Madison: ...The Department of Motor Vehicles is using... facial
recognition technology [to prevent ID theft]"
12. ^ "Help find Madeleine McCann". Child Exploitation and Online Protection Centre.
2007-05-21. http://www.madeleine.ceopupload.com/. Retrieved 2007-05-21.
13. ^ Brown, David (2007-05-23). "We will travel anywhere to find Madeleine, say parents".
London: Times Online.
http://www.timesonline.co.uk/tol/news/world/europe/article1826735.ece. Retrieved
2008-06-02.
14. ^ "Passport Canada - Photos". passportcanada.gc.ca.
http://www.ppt.gc.ca/cdn/photos.aspx?lang=eng.
15. ^ Meek, James (2002-06-13). "Robo cop". London: UK Guardian newspaper.
http://www.guardian.co.uk/Archive/Article/0,4273,4432506,00.htm.
16. ^ Krause, Mike (2002-01-14). "Is face recognition just high-tech snake oil?". Enter Stage
Right. http://www.enterstageright.com/archive/articles/0102/0102facerecog.htm.
17. ^ "Birmingham City Centre CCTV Installs Visionics' FaceIt". Business Wire. 2008-06-
02. http://www.allbusiness.com/government/government-bodies-offices-
regional/6111139-1.html.
18. ^ Krause, Mike (2008-06-02). "Is face recognition just high-tech snake oil?". Enter Stage
Right. http://www.enterstageright.com/archive/articles/0102/0102facerecog.htm.
19. ^ Willing, Richard (2003-09-02). "Airport anti-terror systems flub tests; Face-recognition
technology fails to flag 'suspects'" (Abstract). USA Today.
http://pqasb.pqarchiver.com/USAToday/access/391952771.html?
dids=391952771:391952771&FMT=ABS&FMTS=ABS:FT&date=Sep+2%2C+2003&a
uthor=Richard+Willing&pub=USA+TODAY&edition=&startpage=A.03&desc=Airport
+anti-terror+systems+flub+tests+%3B+Face-recognition+technology+fails+to+flag+
%27suspects%27. Retrieved 2007-09-17.
20. ^ "Civil Liberties & Facial Recognition Software". About.com, The New York Times
Company. pp. pp. 2. Archived from the original on 2006-03-01.
http://web.archive.org/web/20060301220151/terrorism.about.com/od/civillibertiesissues/i
/facialrecsoft_2.htm. Retrieved 2007-09-17. "A few examples which have already arisen
from surveillance video are: using license plates to blackmail gay married people,
stalking women, tracking estranged spouses..."
21. ^ "Mugspot Can Find A Face In The Crowd -- Face-Recognition Software Prepares To
Go To Work In The Streets". ScienceDaily. 12 November 1997.
http://www.sciencedaily.com/releases/1997/11/971112070100.htm. Retrieved 2007-11-
06.

[edit] External links


• Face Recognition Homepage
• Face Recognition Research Community
• Introduction from How Stuff Works
• The UK Minority Report: Has 'Precrime' Finally Arrived? By Patrick St James,
April 2, 2009, OpEdNews
• Face Recognition: A Literature Survey by Sigurdur Ingvarsson By Carl A. K.
Borrebaeck, R. Chellappa, Leejay Wu, and Christos Faloutsos
• FBI Using DMV Photos to Search for Fugitives

Retrieved from "http://en.wikipedia.org/wiki/Facial_recognition_system"


Categories: Automatic identification and data capture | Face recognition | Surveillance
Hidden categories: Articles to be merged from August 2009 | All articles to be merged |
Miscellaneous articles needing expert attention | Articles needing expert attention from
June 2008 | All articles needing expert attention | All articles with unsourced statements |
Articles with unsourced statements from June 2008 | Articles to be expanded from
November 2009 | All articles to be expanded | Articles containing potentially dated
statements from 2004 | All articles containing potentially dated statements

Personal tools

• Log in / create account


Namespaces

• Article
• Discussion

Variants

Views

• Read
• Edit
• View history

Actions

Search

Navigation

• Main page
• Contents
• Featured content
• Current events
• Random article
• Donate to Wikipedia

Interaction

• Help
• About Wikipedia
• Community portal
• Recent changes
• Contact Wikipedia

Toolbox

• What links here


• Related changes
• Upload file
• Special pages
• Permanent link
• Cite this page

Print/export
• Create a book
• Download as PDF
• Printable version

Languages

• Català
• Deutsch
• Español
• Galego
• 한국어
• ‫עברית‬
• 日本語
• Олык Марий
• ไทย
• ‫اردو‬
• 中文

• This page was last modified on 13 February 2011 at 17:17.


• Text is available under the Creative Commons Attribution-ShareAlike License;
additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-
profit organization.
• Contact us

• Privacy policy
• About Wikipedia
• Disclaimers

You might also like