Skip to main content
Top

2020 | OriginalPaper | Chapter

2. What Is Face Recognition Technology?

Author : Ian Berle

Published in: Face Recognition Technology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Face recognition technology is one of several biometric tools or modalities used for person identification and verification. Broadly, it is mainly a monitoring and security technology designed to facilitate or control access used by governments, law enforcement agencies, and commerce. It has many other uses already in play, and many others are on the horizon. The chapter begins with a discussion of the technology and is followed with an overview of a few large-scale utilisers of FRT.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
See Patil et al. (2010), pp. 74–78.
 
2
Gates (2011), p. 12.
 
3
ibid p. 200.
 
4
AADHAAR Unique Identification Authority of India.
 
5
Rogers (2016).
 
6
Turk and Pentland (1991).
 
7
ibid pp. 71–72.
 
8
ibid p. 76.
 
9
Syed Navaz et al. (2013).
 
10
Slevin (2013).
 
11
International Civil Aviation Organisation.
 
12
Lin (2000).
 
13
Dangi (n.d.).
 
14
Driessen and Dürmuth (2013).
 
15
The FERET program started in 1993 and ran until 1997. Sponsored by the Department of Defense (sic) Counterdrug Technology Development Program through the Defense Advanced Research Products Agency. Its primary mission was to develop automatic face recognition algorithms that could be employed to assist security, intelligence and law enforcement personnel. The FERET dataset was assembled to support government monitored testing and evaluation of face recognition algorithms using standardised tests and procedures. The final set of images has 3300 images from 1200 persons, with varying mimical expressions, from different dates, under semi-controlled conditions. The dataset is available for research related to face recognition. Cited by Driessen and Dürmuth (2013).
 
16
Driessen and Dürmuth (2013), p. 3 op cit.
 
17
Lin (2000), p. 1 op cit.
 
18
Zhao et al. (2003), pp. 399–458.
 
19
ibid p. 409.
 
20
ibid p. 409.
 
21
ibid p. 409.
 
22
Turk M, Pentland A op cit.
 
23
Euclidean space is the space in which distances and angles matter.
 
24
PCA Principal component analysis is a technique to reduce the complexity of a data set, namely reducing its dimensionality (in some sense, less variables).
 
25
Shah Zainudin et al. (2012), p. 51.
 
26
Driessen B, Durmuth M op cit.
 
27
ibid p. 3.
 
28
ibid p. 5.
 
29
Moghaddam et al. (2000).
 
30
Shah Zainudin et al. (2012) op cit.
 
31
Syed Navaz et al. (2013).
 
32
ibid p. 254.
 
33
NEC.
 
34
Gregory and Simon (2008), p. 22.
 
35
Lin (2000), p. 12 op cit.
 
36
Acharya and Kasprzyk (2010).
 
37
Grother et al. (2010).
 
38
See Gohringer (2012).
 
39
Biggio et al. (2012), p. 5.
 
40
Anjos and Marcel (2011).
 
41
Rodrigues et al. (2010).
 
42
Zhang et al. (2011).
 
43
Kant and Sharma (2013).
 
44
Acharya and Kasprzyk (2010).
 
45
ibid.
 
46
UIDAI (2012).
 
47
ibid.
 
48
Priyanto (2012).
 
49
UK Borders Act 2007 c.30 §.5 8.
 
50
Biometric Residents Permit.
 
51
Government of Canada ‘International use of biometrics’.
 
52
Kamisher (2017).
 
53
FBI Privacy Impact Assessment.
 
54
Automated Biometric Identification System.
 
55
Integrated Automated Fingerprint System.
 
56
Next Generation Identification.
 
57
United States Visitor and Immigrant Status Indicator Technology.
 
58
Lynch (2012).
 
59
FBI op cit.
 
60
FBI ibid.
 
61
FBI ibid.
 
62
BI2 Technologies.
 
63
Data Protection Act 2018.
 
64
Center for Democracy & Technology (2012).
 
65
Smith (2019).
 
66
Welinder (2012), p. 173.
 
67
Facebook (2011).
 
68
Welinder (2012), p. 174.
 
69
Facebook (n.d.).
 
70
Harris (2013).
 
71
NEC.
 
72
NEC.
 
73
Harmel (2006).
 
74
Occupy Corporatism (2012).
 
75
Niles (2012).
 
76
Biometrica (n.d.).
 
77
Elash and Luk (2018).
 
78
Finextra (2013).
 
Literature
go back to reference Driessen B, Dürmuth M (2013) Achieving anonymity against major face recognition algorithms. In: De Decker B, Dittmann J, Kraetzer C, Vielhauer C (eds) Communications and multimedia security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin. Photo credit, figure 2.1: ©Ian Berle Driessen B, Dürmuth M (2013) Achieving anonymity against major face recognition algorithms. In: De Decker B, Dittmann J, Kraetzer C, Vielhauer C (eds) Communications and multimedia security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin. Photo credit, figure 2.1: ©Ian Berle
go back to reference Gates KA (2011) Our biometric future: facial recognition technology and the culture of surveillance. New York University Press, New York, p 12CrossRef Gates KA (2011) Our biometric future: facial recognition technology and the culture of surveillance. New York University Press, New York, p 12CrossRef
go back to reference Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc, Indiapolis, p 22 Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc, Indiapolis, p 22
go back to reference Lin SH (2000) An introduction to face recognition technology. Informing Sci 3(1):1, Informing Science Special Issue on Multimedia Informing Technologies Lin SH (2000) An introduction to face recognition technology. Informing Sci 3(1):1, Informing Science Special Issue on Multimedia Informing Technologies
go back to reference Patil AM, Kolhe SR, Patil PM (2010) 2D Face recognition techniques: a survey. Int J Machine Intelligence 2(1):74–78 Patil AM, Kolhe SR, Patil PM (2010) 2D Face recognition techniques: a survey. Int J Machine Intelligence 2(1):74–78
go back to reference Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system, Biometrics: Theory Applications and Systems (BTAS). In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp 1–5. 27–29 Sept. 2010 Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system, Biometrics: Theory Applications and Systems (BTAS). In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp 1–5. 27–29 Sept. 2010
go back to reference Syed Navaz A, Dhevi Sri T, Mazumder P (2013) Face recognition using principal component analysis and neural networks. Int J Comp Netw Wireless Mobile Commun 3:245–256 Syed Navaz A, Dhevi Sri T, Mazumder P (2013) Face recognition using principal component analysis and neural networks. Int J Comp Netw Wireless Mobile Commun 3:245–256
go back to reference Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosc 3(1):71–86. Massachusetts Institute of Technology, published by the MIT PressCrossRef Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosc 3(1):71–86. Massachusetts Institute of Technology, published by the MIT PressCrossRef
go back to reference UIDAI (2012) The role of biometric technology in Aadhaar Enrolment. stateofaadhaar.in/wp-content/uploads/UIDAI_Role_2012.pdf. Accessed 7 Aug 2019 UIDAI (2012) The role of biometric technology in Aadhaar Enrolment. stateofaadhaar.in/wp-content/uploads/UIDAI_Role_2012.pdf. Accessed 7 Aug 2019
Metadata
Title
What Is Face Recognition Technology?
Author
Ian Berle
Copyright Year
2020
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-36887-6_2