Advertisement

What Is Face Recognition Technology?

  • Ian Berle
Chapter
  • 26 Downloads
Part of the Law, Governance and Technology Series book series (LGTS, volume 41)

Abstract

Face recognition technology is one of several biometric tools or modalities used for person identification and verification. Broadly, it is mainly a monitoring and security technology designed to facilitate or control access used by governments, law enforcement agencies, and commerce. It has many other uses already in play, and many others are on the horizon. The chapter begins with a discussion of the technology and is followed with an overview of a few large-scale utilisers of FRT.

References

  1. Acharya L, Kasprzyk T (2010) Biometrics and Government. https://lop.parl.ca/Content/LOP/ResearchPublications/06-30-e.pdf. Accessed 6 June 2018 (unavailable 6 Aug 2019)
  2. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. http://ieeexplore.ieee.org/document/6117503/. Accessed 7 Aug 2019
  3. BI2 Technologies Biometric Intelligence & Identification Technologies. http://www.bi2technologies.com/. Accessed 7 Aug 2019
  4. Biggio et al (2012) Security evaluation of biometric authentication under realistic spoofing attacks. p 5. https://pralab.diee.unica.it/it/node/667. Accessed 7 Aug 2019
  5. Biometric Residents Permit. https://www.gov.uk/biometric-residence-permits. Accessed 18 Sept 2019
  6. Biometrica (n.d.). https://biometrica.com/casinos/. Accessed 7 Aug 2019
  7. Center for Democracy & Technology (2012) ‘Seeing is ID’ing: facial recognition & privacy’ https://cdt.org/files/pdfs/Facial_Recognition_and_Privacy-Center_for_Democracy_and_Technology-January_2012.pdf
  8. Dangi R (n.d.) Face recognition. https://www.engineersgarage.com/articles/face-recognition. Accessed 6 Aug 2019
  9. Driessen B, Dürmuth M (2013) Achieving anonymity against major face recognition algorithms. In: De Decker B, Dittmann J, Kraetzer C, Vielhauer C (eds) Communications and multimedia security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin. Photo credit, figure 2.1: ©Ian BerleGoogle Scholar
  10. Elash A, Luk V (2018) Canadian casinos, banks, police use facial-recognition technology. http://www.theglobeandmail.com/news/national/time-to-lead/canadian-casinos-banks-police-use-facial-recognition-technology/article590998/. Accessed 7 Aug 2019
  11. Facebook (2011) Making photo tagging easier. https://www.facebook.com/notes/facebook/making-photo-tagging-easier/467145887130. Accessed 7 Aug 2019
  12. Facebook (n.d.) How do I remove a tag from a photo or post I’m tagged in? https://en-gb.facebook.com/help/140906109319589. Accessed 7 Aug 2019
  13. FBI Privacy Impact Assessment Integrated Automated Fingerprint Identification System (IAFIS)/Next Generation Identification (NGI) Biometric Interoperability. https://www.fbi.gov/services/records-management/foia/privacy-impact-assessments/iafis-ngi-biometric-interoperability. Accessed 7 Aug 2019
  14. Finextra (2013) Facebanx unveils facial recognition tech for banks. http://www.finextra.com/news/Announcement.aspx?pressreleaseid=49488&topic=mobile. Accessed 7 Aug 2019
  15. Gates KA (2011) Our biometric future: facial recognition technology and the culture of surveillance. New York University Press, New York, p 12CrossRefGoogle Scholar
  16. Gohringer C (2012) Advances in face recognition technology and its application in airports. http://www.planetbiometrics.com/article-details/i/1214/desc/advances-in-face-recognition-technology-and-its-application-in-airports/. Accessed 7 Aug 2019
  17. Government of Canada International use of biometrics. http://www.cic.gc.ca/english/department/biometrics-international.asp. Accessed 7 Aug 2019
  18. Great Britain, Data Protection Act 2018 c.12. https://www.legislation.gov.uk/ukpga/2018/12/contents. Accessed 7 Aug 2019
  19. Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc, Indiapolis, p 22Google Scholar
  20. Grother PJ et al (2010) Report on the evaluation of 2D still-image face recognition algorithms. NIST Interagency Report 7709. http://www.nist.gov/customcf/get_pdf.cfm?pub_id=905968. Accessed 6 Aug 2019
  21. Harmel K (2006) Walt Disney World: The Government’s Tomorrowland. http://news21.com/story/2006/09/01/walt_disney_world_the_governments. Accessed 7 Aug 2019
  22. Harris S (2013) Computer to sales staff: VIP approaching. The Sunday Times 14 July 2013. http://www.thesundaytimes.co.uk/sto/news/uk_news/Tech/article1287590.ece. Accessed 7 Aug 2019
  23. International Civil Aviation Organisation Machine Readable Travel Documents ICAO Document 9303 part 9 section 4.1 ‘Primary Biometric: Facial Image’ p 7-8. www.icao.int/publications/Documents/9303_p9_cons_en.pdf. Accessed 6 Aug 2019
  24. Kamisher E (2017) Israel transitions to Biometric passports and IDs. Jerusalem Post 1st June 2017. http://www.jpost.com/Israel-News/Israel-transitions-to-Biometric-passports-and-IDs-494535. Accessed 18 Sept 2019
  25. Kant C, Sharma N (2013) Fake face recognition using fusion of thermal imaging and skin elasticity. IJCSCIJ 4(1):65–72. http://www.csjournals.com/IJCSC/PDF4-1/Article_15.pdf. Accessed 7 Aug 2019Google Scholar
  26. Lin SH (2000) An introduction to face recognition technology. Informing Sci 3(1):1, Informing Science Special Issue on Multimedia Informing TechnologiesGoogle Scholar
  27. Lynch J (2012) Written testimony of Jennifer Lynch Staff Attorney with the Electronic Frontier Foundation (EFF) Senate Committee on the Judiciary Subcommittee on privacy, technology, and the law what facial recognition technology means for privacy and civil liberties. July 18, 2012, p 3. http://www.judiciary.senate.gov/imo/media/doc/12-7-18LynchTestimony.pdf. Accessed 7 Aug 2019
  28. Moghaddam B, Jebara T, Pentland A (2000) Bayesian face recognition. www.cnbc.cmu.edu/~tai/readings/face/pentland.pdf. Accessed 6 Aug 2019
  29. NEC. The acronym of NEC corporation previously known as Nippon Electric Company. http://uk.nec.com/en_GB/global/about/history.html. Accessed 7 Aug 2019
  30. NEC. New biometric identification tools used in theme parks. http://www.nec.com/en/global/about/mitatv/03/2.html. Accessed 7 Aug 2019
  31. Niles R (2012) Disney claims top 8 spots in 2011 global theme park industry attendance report. http://www.themeparkinsider.com/flume/201205/3073/. Accessed 7 Aug 2019
  32. Occupy Corporatism (2012) Disney biometrics and the Department of Defense. http://www.occupycorporatism.com/disney-biometrics-and-the-department-of-defense/. Accessed 7 Aug 2019. See also Chapter 3.2
  33. Patil AM, Kolhe SR, Patil PM (2010) 2D Face recognition techniques: a survey. Int J Machine Intelligence 2(1):74–78Google Scholar
  34. Priyanto U (2012) National Electronic ID Card (e-ktp) Programme in Indonesia. https://www.scribd.com/document/240007853/1-Priyanto-Unggul. Accessed 7 Aug 2019
  35. Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system, Biometrics: Theory Applications and Systems (BTAS). In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp 1–5. 27–29 Sept. 2010Google Scholar
  36. Rogers K (2016) That time the super bowl secretly used facial recognition software on fans. https://www.vice.com/en_us/article/kb78de/that-time-the-super-bowl-secretly-used-facial-recognition-software-on-fans. Accessed 6 Aug 2019
  37. Shah Zainudin MN et al (2012) Face recognition using Principle Component Analysis (PCA) and Linear Discriminant Analysis (LDA). Int J Electr Comp Sci 12:51. http://www.ijens.org/Vol_12_I_05/1214404-05-3737-IJECS-IJENS.pdf. Accessed 6 Aug 2019Google Scholar
  38. Slevin J (2013) How to measure passenger flow? Part 3 – Facial Recognition. http://blog.hrsid.com/mflow/2013/12/03/can-measure-passenger-flow-part-3-facial-recognition. Accessed 6 Aug 2019
  39. Smith K (2019) 53 Incredible facebook statistics. Brandwatch marketing. https://www.brandwatch.com/blog/47-facebook-statistics/. Accessed 7 Aug 2019
  40. Syed Navaz A, Dhevi Sri T, Mazumder P (2013) Face recognition using principal component analysis and neural networks. Int J Comp Netw Wireless Mobile Commun 3:245–256Google Scholar
  41. Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosc 3(1):71–86. Massachusetts Institute of Technology, published by the MIT PressCrossRefGoogle Scholar
  42. UIDAI (2012) The role of biometric technology in Aadhaar Enrolment. stateofaadhaar.in/wp-content/uploads/UIDAI_Role_2012.pdf. Accessed 7 Aug 2019Google Scholar
  43. UK Borders Act 2007 c.30 §.5. https://www.legislation.gov.uk/ukpga/2007/30/contents. Accessed 7 Aug 2019
  44. Welinder Y (2012) A face tells more than a thousand posts: developing face recognition privacy in social networks. Harv J Law Technol 26(1):166–237. http://jolt.law.harvard.edu/articles/pdf/v26/26HarvJLTech165.pdf Google Scholar
  45. Zhang Z et al (2011) Face liveness detection by learning multispectral reflectance distributions. http://www.cbsr.ia.ac.cn/users/zlei/papers/Zhang-FaceLiveness-FG-11.pdf. Accessed 18 Sept 2019
  46. Zhao W et al (2003) Face recognition: a literature survey. ACM Comp Surv 35(4):399–458. http://doi.acm.org/10.1145/954339.954342. Accessed 6 Aug 2019CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Ian Berle
    • 1
  1. 1.SuttonUK

Personalised recommendations