Facial Recognition System
Facial Recognition System
Swiss European surveillance: facial recognition and vehicle make, model, color and
license plate reader.
Side View.
Close-up of the infrared illuminator. This light is invisible to the human eye but it creates
a day-like environment for the surveillance cameras.
It is typically used in security systems and can be compared to other biometrics such as
fingerprint or eye iris recognition systems.[1]
Contents
[hide]
• 1 Techniques
o 1.1 Traditional
o 1.2 3-D
o 1.3 Skin texture analysis
• 2 Software
• 3 Notable users and deployments
o 3.1 Additional uses
• 4 Comparative study
• 5 Criticisms
o 5.1 Weaknesses
o 5.2 Effectiveness
o 5.3 Privacy concerns
• 6 Recent Improvements
• 7 Early development
• 8 See also
• 9 References
• 10 External links
[edit] Techniques
[edit] Traditional
Recognition algorithms can be divided into two main approaches, geometric, which looks
at distinguishing features, or photometric, which is a statistical approach that distill an
image into values and comparing the values with templates to eliminate variances.
[edit] 3-D
One advantage of 3-D facial recognition is that it is not affected by changes in lighting
like other techniques. It can also identify a face from a range of viewing angles, including
a profile view.[2][6]
Even a perfect 3D matching technique could be sensitive to expressions. For that goal a
group at the Technion applied tools from metric geometry to treat expressions as
isometries[7]
Another emerging trend uses the visual details of the skin, as captured in standard digital
or scanned images. This technique, called skin texture analysis, turns the unique lines,
patterns, and spots apparent in a person’s skin into a mathematical space.[2]
Tests have shown that with the addition of skin texture analysis, performance in
recognizing faces can increase 20 to 25 percent.[2][6]
[edit] Software
• Google's Picasa digital image organizer has a built in face recognition system
starting from version 3.5 onwards. It can associate faces with persons, so that
queries can be run on pictures to return all pictures with a specific group of people
together. Picasaweb.com has also been providing a similar feature to its users.
• Apple iPhoto, photo organizer distributed with iLife suite of applications includes
a system using which people can tag recognized people on photos. Then they can
be searched using Spotlight.
• Sony's Picture Motion Browser (PMB) analyses photo, associates photos with
identical faces so that they can be tagged accordingly, and differentiates between
photos with one person, many persons and nobody.
• Facebook also included face recognition technology
The German Federal Police use a facial recognition system to allow voluntary subscribers
to pass fully automated border controls at Frankfurt Rhein-Main international airport.
Subscribers need to be European Union or Swiss citizens.[citation needed] Since 2005 the
German Federal Criminal Police Office offers centralized facial recognition on mugshot
images for all German police agencies. Recognition systems are also used by casinos to
catch card counters and other blacklisted individuals.
The Australian Customs Service has an automated border processing system called
SmartGate that uses facial recognition. The system compares the face of the individual
with the image in the e-passport microchip, certifying that the holder of the passport is
the rightful owner.
Pennsylvania Justice Network searches crime scene photographs and CCTV footage in
the mugshot database of previous arrests. A number of cold cases have been resolved
since the system became operational in 2005. Other law enforcement agencies in the
USA and abroad use arrest mugshot databases in their forensic investigative work.
U.S. Department of State operates one of the largest face recognition systems in the
world with over 75 million photographs that is actively used for visa processing.
Spaceship Earth in Epcot uses this[?] for the touch screen part of the ride.
In addition to being used for security systems, authorities have found a number of other
applications for facial recognition systems. While earlier post 9/11 deployments were
well publicized trials, more recent deployments are rarely written about due to their
covert nature.
At Super Bowl XXXV in January 2001, police in Tampa Bay, Florida, used Identix'
facial recognition software, FaceIt, to search for potential criminals and terrorists in
attendance at the event.[2] (it found 19 people with pending arrest warrants)[8]
In the 2000 presidential election, the Mexican government employed facial recognition
software to prevent voter fraud. Some individuals had been registering to vote under
several different names, in an attempt to place multiple votes. By comparing new facial
images to those already in the voter database, authorities were able to reduce duplicate
registrations.[9] Similar technologies are being used in the United States to prevent people
from obtaining fake identification cards and driver’s licenses.[10][11]
There are also a number of potential uses for facial recognition that are currently being
developed. For example, the technology could be used as a security measure at ATM’s;
instead of using a bank card or personal identification number, the ATM would capture
an image of your face, and compare it to your photo in the bank database to confirm your
identity. This same concept could also be applied to computers; by using a webcam to
capture a digital image of yourself, your face could replace your password as a means to
log-in.[2]
As part of the investigation of the disappearance of Madeleine McCann the British police
are calling on visitors to the Ocean Club Resort, Praia da Luz in Portugal or the
surrounding areas in the two weeks leading up to the child's disappearance on Thursday 3
May 2007 to provide copies of any photographs of people taken during their stay, in an
attempt to identify the abductor using a biometric facial recognition application.[12][13]
Also, in addition to biometric usages, modern digital cameras often incorporate a facial
detection system that allows the camera to focus and measure exposure on the face of the
subject, thus guaranteeing a focused portrait of the person being photographed. Some
cameras, in addition, incorporate a smile shutter, or take automatically a second picture if
someone closed their eyes during exposure.
[edit] Criticisms
[edit] Weaknesses
Face recognition is not perfect and struggles to perform under certain conditions. Ralph
Gross, a researcher at the Carnegie Mellon Robotics Institute, describes one obstacle
related to the viewing angle of the face: "Face recognition has been getting pretty good at
full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been
problems."[6]
Other conditions where face recognition does not work well include poor lighting,
sunglasses, long hair, or other objects partially covering the subject’s face, and low
resolution images.[2]
Another serious disadvantage is that many systems are less effective if facial expressions
vary. Even a big smile can render in the system less effective. For instance: Canada now
allows only neutral facial expressions in passport photos.[14]
[edit] Effectiveness
Critics of the technology complain that the London Borough of Newham scheme has, as
of 2004, never recognized a single criminal, despite several criminals in the system's
database living in the Borough and the system having been running for several years.
"Not once, as far as the police know, has Newham's automatic facial recognition system
spotted a live target."[15][16] This information seems to conflict with claims that the system
was credited with a 34% reduction in crime (hence why it was rolled out to Birmingham
also)[17]. However it can be explained by the notion that when the public is regularly told
that they are under constant video surveillance with advanced face recognition
technology, this fear alone can reduce the crime rate, whether the face recognition system
technically works or does not. This has been the basis for several other face recognition
based security systems, where the technology itself does not work particularly well but
the user's perception of the technology does.
Many citizens are concerned that their privacy will be invaded. Some fear that it could
lead to a “total surveillance society,” with the government and other authorities having
the ability to know where you are, and what you are doing, at all times. This is not to be
an underestimated concept as history has shown that states have typically abused such
access before.[20]
During 1964 and 1965, Bledsoe, along with Helen Chan and Charles Bisson, worked on
using the computer to recognize human faces (Bledsoe 1966a, 1966b; Bledsoe and Chan
1965). He was proud of this work, but because the funding was provided by an unnamed
intelligence agency that did not allow much publicity, little of the work was published.
Given a large database of images (in effect, a book of mug shots) and a photograph, the
problem was to select from the database a small set of records such that one of the image
records matched the photograph. The success of the method could be measured in terms
of the ratio of the answer list to the number of records in the database. Bledsoe (1966a)
described the following difficulties:
“ rotation and tilt, lighting intensity and angle, facial expression, aging, etc.
Some other attempts at facial recognition by machine have allowed for little
or no variability in these quantities. Yet the method of correlation (or
pattern matching) of unprocessed optical data, which is often used by some
researchers, is certain to fail in cases where the variability is great. In
particular, the correlation is very low between two pictures of the same
person with two different head rotations.
„
—Woody Bledsoe, 1966
This project was labeled man-machine because the human extracted the coordinates of a
set of features from the photographs, which were then used by the computer for
recognition. Using a graphics tablet (GRAFACON or RAND TABLET), the operator
would extract the coordinates of features such as the center of pupils, the inside corner of
eyes, the outside corner of eyes, point of widows peak, and so on. From these
coordinates, a list of 20 distances, such as width of mouth and width of eyes, pupil to
pupil, were computed. These operators could process about 40 pictures an hour. When
building the database, the name of the person in the photograph was associated with the
list of computed distances and stored in the computer. In the recognition phase, the set of
distances was compared with the corresponding distance for each photograph, yielding a
distance between the photograph and the database record. The closest records are
returned.
This brief description is an oversimplification that fails in general because it is unlikely
that any two pictures would match in head rotation, lean, tilt, and scale (distance from the
camera). Thus, each set of distances is normalized to represent the face in a frontal
orientation. To accomplish this normalization, the program first tries to determine the tilt,
the lean, and the rotation. Then, using these angles, the computer undoes the effect of
these transformations on the computed distances. To compute these angles, the computer
must know the three-dimensional geometry of the head. Because the actual heads were
unavailable, Bledsoe (1964) used a standard head derived from measurements on seven
heads.
After Bledsoe left PRI in 1966, this work was continued at the Stanford Research
Institute, primarily by Peter Hart. In experiments performed on a database of over 2000
photographs, the computer consistently outperformed humans when presented with the
same recognition tasks (Bledsoe 1968). Peter Hart (1996) enthusiastically recalled the
project with the exclamation, "It really worked!"
By about 1997, the system developed by Christoph von der Malsburg and graduate
students of the University of Bochum in Germany and the University of Southern
California in the United States outperformed most systems with those of Massachusetts
Institute of Technology and the University of Maryland rated next. The Bochum system
was developed through funding by the United States Army Research Laboratory. The
software was sold as ZN-Face and used by customers such as Deutsche Bank and
operators of airports and other busy locations. The software was "robust enough to make
identifications from less-than-perfect face views. It can also often see through such
impediments to identification as mustaches, beards, changed hair styles and glasses—
even sunglasses".[21]
In about January 2007, image searches were "based on the text surrounding a photo," for
example, if text nearby mentions the image content. Polar Rose technology can guess
from a photograph, in about 1.5 seconds, what any individual may look like in three
dimensions, and thought they "will ask users to input the names of people they recognize
in photos online" to help build a database.[citation needed]
[edit] References
1. ^ "Facial Recognition Applications". Animetrics.
http://www.animetrics.com/technology/frapplications.html. Retrieved 2008-06-04.
2. ^ a b c d e f g Bonsor, K.. "How Facial Recognition Systems Work".
http://computer.howstuffworks.com/facial-recognition.htm. Retrieved 2008-06-02.
3. ^ Smith, Kelly. "Face Recognition" (PDF).
http://www.biometrics.gov/Documents/FaceRec.pdf. Retrieved 2008-06-04.
4. ^ R. Brunelli and T. Poggio, "Face Recognition: Features versus Templates", IEEE
Trans. on PAMI, 1993, (15)10:1042-1052
5. ^ R. Brunelli, Template Matching Techniques in Computer Vision: Theory and Practice,
Wiley, ISBN 978-0-470-51706-2, 2009 ([1] TM book)
6. ^ a b c d e Williams, Mark. "Better Face-Recognition Software".
http://www.technologyreview.com/Infotech/18796/?a=f. Retrieved 2008-06-02.
7. ^ Kimmel, Ron. "Three-dimensional face recognition".
http://www.cs.technion.ac.il/~ron/PAPERS/BroBroKimIJCV05.pdf. Retrieved 2005-01-
01.
8. ^ McNealy, Scott. "Privacy is (Virtually) Dead".
http://www.jrnyquist.com/aug20/privacy.htm. Retrieved 2006-12-24.
9. ^ "Mexican Government Adopts FaceIt Face Recognition Technology to Eliminate
Duplicate Voter Registrations in Upcoming Presidential Election". Business Wire. 2000-
05-11. http://findarticles.com/p/articles/mi_m0EIN/is_2000_May_11/ai_62019954.
Retrieved 2008-06-02.
10. ^ House, David. "Facial recognition at DMV". Oregon Department of Transportation.
http://www.oregon.gov/ODOT/DMV/news/cards_facialrec.shtml. Retrieved 2007-09-17.
"Oregon DMV is going to start using “facial recognition” software, a new tool in the
prevention of fraud, required by a new state law. The law is designed to prevent someone
from obtaining a driver license or ID card under a false name."
11. ^ Schultz, Zac. "Facial Recognition Technology Helps DMV Prevent Identity Theft".
WMTV News, Gray Television. http://www.nbc15.com/news/headlines/2684991.html.
Retrieved 2007-09-17. "Madison: ...The Department of Motor Vehicles is using... facial
recognition technology [to prevent ID theft]"
12. ^ "Help find Madeleine McCann". Child Exploitation and Online Protection Centre.
2007-05-21. http://www.madeleine.ceopupload.com/. Retrieved 2007-05-21.
13. ^ Brown, David (2007-05-23). "We will travel anywhere to find Madeleine, say parents".
London: Times Online.
http://www.timesonline.co.uk/tol/news/world/europe/article1826735.ece. Retrieved
2008-06-02.
14. ^ "Passport Canada - Photos". passportcanada.gc.ca.
http://www.ppt.gc.ca/cdn/photos.aspx?lang=eng.
15. ^ Meek, James (2002-06-13). "Robo cop". London: UK Guardian newspaper.
http://www.guardian.co.uk/Archive/Article/0,4273,4432506,00.htm.
16. ^ Krause, Mike (2002-01-14). "Is face recognition just high-tech snake oil?". Enter Stage
Right. http://www.enterstageright.com/archive/articles/0102/0102facerecog.htm.
17. ^ "Birmingham City Centre CCTV Installs Visionics' FaceIt". Business Wire. 2008-06-
02. http://www.allbusiness.com/government/government-bodies-offices-
regional/6111139-1.html.
18. ^ Krause, Mike (2008-06-02). "Is face recognition just high-tech snake oil?". Enter Stage
Right. http://www.enterstageright.com/archive/articles/0102/0102facerecog.htm.
19. ^ Willing, Richard (2003-09-02). "Airport anti-terror systems flub tests; Face-recognition
technology fails to flag 'suspects'" (Abstract). USA Today.
http://pqasb.pqarchiver.com/USAToday/access/391952771.html?
dids=391952771:391952771&FMT=ABS&FMTS=ABS:FT&date=Sep+2%2C+2003&a
uthor=Richard+Willing&pub=USA+TODAY&edition=&startpage=A.03&desc=Airport
+anti-terror+systems+flub+tests+%3B+Face-recognition+technology+fails+to+flag+
%27suspects%27. Retrieved 2007-09-17.
20. ^ "Civil Liberties & Facial Recognition Software". About.com, The New York Times
Company. pp. pp. 2. Archived from the original on 2006-03-01.
http://web.archive.org/web/20060301220151/terrorism.about.com/od/civillibertiesissues/i
/facialrecsoft_2.htm. Retrieved 2007-09-17. "A few examples which have already arisen
from surveillance video are: using license plates to blackmail gay married people,
stalking women, tracking estranged spouses..."
21. ^ "Mugspot Can Find A Face In The Crowd -- Face-Recognition Software Prepares To
Go To Work In The Streets". ScienceDaily. 12 November 1997.
http://www.sciencedaily.com/releases/1997/11/971112070100.htm. Retrieved 2007-11-
06.
Personal tools
• Article
• Discussion
Variants
Views
• Read
• Edit
• View history
Actions
Search
Navigation
• Main page
• Contents
• Featured content
• Current events
• Random article
• Donate to Wikipedia
Interaction
• Help
• About Wikipedia
• Community portal
• Recent changes
• Contact Wikipedia
Toolbox
Print/export
• Create a book
• Download as PDF
• Printable version
Languages
• Català
• Deutsch
• Español
• Galego
• 한국어
• עברית
• 日本語
• Олык Марий
• ไทย
• اردو
• 中文
• Privacy policy
• About Wikipedia
• Disclaimers