Skip to main content

2020 | OriginalPaper | Buchkapitel

2. What Is Face Recognition Technology?

verfasst von : Ian Berle

Erschienen in: Face Recognition Technology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Face recognition technology is one of several biometric tools or modalities used for person identification and verification. Broadly, it is mainly a monitoring and security technology designed to facilitate or control access used by governments, law enforcement agencies, and commerce. It has many other uses already in play, and many others are on the horizon. The chapter begins with a discussion of the technology and is followed with an overview of a few large-scale utilisers of FRT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
See Patil et al. (2010), pp. 74–78.
 
2
Gates (2011), p. 12.
 
3
ibid p. 200.
 
4
AADHAAR Unique Identification Authority of India.
 
5
Rogers (2016).
 
6
Turk and Pentland (1991).
 
7
ibid pp. 71–72.
 
8
ibid p. 76.
 
9
Syed Navaz et al. (2013).
 
10
Slevin (2013).
 
11
International Civil Aviation Organisation.
 
12
Lin (2000).
 
13
Dangi (n.d.).
 
14
Driessen and Dürmuth (2013).
 
15
The FERET program started in 1993 and ran until 1997. Sponsored by the Department of Defense (sic) Counterdrug Technology Development Program through the Defense Advanced Research Products Agency. Its primary mission was to develop automatic face recognition algorithms that could be employed to assist security, intelligence and law enforcement personnel. The FERET dataset was assembled to support government monitored testing and evaluation of face recognition algorithms using standardised tests and procedures. The final set of images has 3300 images from 1200 persons, with varying mimical expressions, from different dates, under semi-controlled conditions. The dataset is available for research related to face recognition. Cited by Driessen and Dürmuth (2013).
 
16
Driessen and Dürmuth (2013), p. 3 op cit.
 
17
Lin (2000), p. 1 op cit.
 
18
Zhao et al. (2003), pp. 399–458.
 
19
ibid p. 409.
 
20
ibid p. 409.
 
21
ibid p. 409.
 
22
Turk M, Pentland A op cit.
 
23
Euclidean space is the space in which distances and angles matter.
 
24
PCA Principal component analysis is a technique to reduce the complexity of a data set, namely reducing its dimensionality (in some sense, less variables).
 
25
Shah Zainudin et al. (2012), p. 51.
 
26
Driessen B, Durmuth M op cit.
 
27
ibid p. 3.
 
28
ibid p. 5.
 
29
Moghaddam et al. (2000).
 
30
Shah Zainudin et al. (2012) op cit.
 
31
Syed Navaz et al. (2013).
 
32
ibid p. 254.
 
33
NEC.
 
34
Gregory and Simon (2008), p. 22.
 
35
Lin (2000), p. 12 op cit.
 
36
Acharya and Kasprzyk (2010).
 
37
Grother et al. (2010).
 
38
See Gohringer (2012).
 
39
Biggio et al. (2012), p. 5.
 
40
Anjos and Marcel (2011).
 
41
Rodrigues et al. (2010).
 
42
Zhang et al. (2011).
 
43
Kant and Sharma (2013).
 
44
Acharya and Kasprzyk (2010).
 
45
ibid.
 
46
UIDAI (2012).
 
47
ibid.
 
48
Priyanto (2012).
 
49
UK Borders Act 2007 c.30 §.5 8.
 
50
Biometric Residents Permit.
 
51
Government of Canada ‘International use of biometrics’.
 
52
Kamisher (2017).
 
53
FBI Privacy Impact Assessment.
 
54
Automated Biometric Identification System.
 
55
Integrated Automated Fingerprint System.
 
56
Next Generation Identification.
 
57
United States Visitor and Immigrant Status Indicator Technology.
 
58
Lynch (2012).
 
59
FBI op cit.
 
60
FBI ibid.
 
61
FBI ibid.
 
62
BI2 Technologies.
 
63
Data Protection Act 2018.
 
64
Center for Democracy & Technology (2012).
 
65
Smith (2019).
 
66
Welinder (2012), p. 173.
 
67
Facebook (2011).
 
68
Welinder (2012), p. 174.
 
69
Facebook (n.d.).
 
70
Harris (2013).
 
71
NEC.
 
72
NEC.
 
73
Harmel (2006).
 
74
Occupy Corporatism (2012).
 
75
Niles (2012).
 
76
Biometrica (n.d.).
 
77
Elash and Luk (2018).
 
78
Finextra (2013).
 
Literatur
Zurück zum Zitat Driessen B, Dürmuth M (2013) Achieving anonymity against major face recognition algorithms. In: De Decker B, Dittmann J, Kraetzer C, Vielhauer C (eds) Communications and multimedia security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin. Photo credit, figure 2.1: ©Ian Berle Driessen B, Dürmuth M (2013) Achieving anonymity against major face recognition algorithms. In: De Decker B, Dittmann J, Kraetzer C, Vielhauer C (eds) Communications and multimedia security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin. Photo credit, figure 2.1: ©Ian Berle
Zurück zum Zitat Gates KA (2011) Our biometric future: facial recognition technology and the culture of surveillance. New York University Press, New York, p 12CrossRef Gates KA (2011) Our biometric future: facial recognition technology and the culture of surveillance. New York University Press, New York, p 12CrossRef
Zurück zum Zitat Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc, Indiapolis, p 22 Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc, Indiapolis, p 22
Zurück zum Zitat Lin SH (2000) An introduction to face recognition technology. Informing Sci 3(1):1, Informing Science Special Issue on Multimedia Informing Technologies Lin SH (2000) An introduction to face recognition technology. Informing Sci 3(1):1, Informing Science Special Issue on Multimedia Informing Technologies
Zurück zum Zitat Patil AM, Kolhe SR, Patil PM (2010) 2D Face recognition techniques: a survey. Int J Machine Intelligence 2(1):74–78 Patil AM, Kolhe SR, Patil PM (2010) 2D Face recognition techniques: a survey. Int J Machine Intelligence 2(1):74–78
Zurück zum Zitat Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system, Biometrics: Theory Applications and Systems (BTAS). In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp 1–5. 27–29 Sept. 2010 Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system, Biometrics: Theory Applications and Systems (BTAS). In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp 1–5. 27–29 Sept. 2010
Zurück zum Zitat Syed Navaz A, Dhevi Sri T, Mazumder P (2013) Face recognition using principal component analysis and neural networks. Int J Comp Netw Wireless Mobile Commun 3:245–256 Syed Navaz A, Dhevi Sri T, Mazumder P (2013) Face recognition using principal component analysis and neural networks. Int J Comp Netw Wireless Mobile Commun 3:245–256
Zurück zum Zitat Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosc 3(1):71–86. Massachusetts Institute of Technology, published by the MIT PressCrossRef Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosc 3(1):71–86. Massachusetts Institute of Technology, published by the MIT PressCrossRef
Zurück zum Zitat UIDAI (2012) The role of biometric technology in Aadhaar Enrolment. stateofaadhaar.in/wp-content/uploads/UIDAI_Role_2012.pdf. Accessed 7 Aug 2019 UIDAI (2012) The role of biometric technology in Aadhaar Enrolment. stateofaadhaar.in/wp-content/uploads/UIDAI_Role_2012.pdf. Accessed 7 Aug 2019
Metadaten
Titel
What Is Face Recognition Technology?
verfasst von
Ian Berle
Copyright-Jahr
2020
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-36887-6_2