blog




  • Essay / Facial Recognition Technology

    Table of ContentsAuthentication ProcedureApplication AreasChallenges of FRTConclusionReferencesAccording to Lin (2000), facial recognition technology (FRT) is one of the few biometric systems that help identify an individual based on its biological characteristics. Researchers from various fields, including security, computer vision, image processing and psychology, have developed a deep interest in this technology, due to its high precision and low intrusiveness. FRT works by identifying and verifying an individual's still image or scene video and confirming it with that stored in a database. This article aims to study the basic operation of FRT, application areas and challenges of FRT. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”?Get the original essayAuthentication procedureBobde and Deshmukh (2014) explain that the authentication procedure takes place in four stages: capture, extraction, comparison and correspondence. During registration, identification or verification, the system captures a physical or behavioral sample. Next, there is the creation of a model from the data extracted from the sample. The unique data is then compared to this new pattern, and finally, the system decides whether there is a match or not. The framework's algorithms are also composed of several modules; First, a facial image detector identifies facial locations from a complex background, then the facial recognition system determines who the individual is. Both modules use the feature extractor which converts pixel representations into vector representations, which can derive useful information through pattern recognition tools (Lin, 2000). The latter searches for the best match for the input image in the database to help identify the individual in question. Areas of application The technology has found numerous applications in various fields according to a study by Tsalakanidou (nd). In civil and police applications, for example, it is used in surveillance of public places, forensic applications, border control, passports and national identity cards. Electronic transaction security and access control applications also widely use this technology to secure their infrastructures and networks. Additional areas include ambient intelligence for natural human-machine interaction and in the smart home, as well as wearable systems such as memory aids and context-aware systems. The possibilities are endless given that entertainment such as interactive films and computer games currently apply to FRT. Challenges of FRTTsalakanidou (nd) points out that cross-class similarities and interpersonal variations tend to pose a challenge to the system. In the first case, twins, strangers or even relatives may look similar, while in the second, facial appearance may change due to factors such as lighting and pose variations, facial expressions and the use of cosmetic products. Others might even disguise themselves to avoid detection by the system. However, despite these drawbacks, researchers are continually working to find better algorithms to circumvent them. Therefore, there are several face detection techniques, such as knowledge-based structural matching, appearance-based template matching, and face invariant..