Abstract :
A face recognition
technology is used to automatically identify a person through a digital image. It
is mainly used in security systems. The face recognition will directly capture information
about the shapes of faces. The main advantage of facial recognition is it identifies
each individual’s skin tone of a human face’s surface, like the curves of the eye
hole, nose, and chin, etc. this technology may also be used in very dark condition.
It can view the face in different angles to identify.
It is mainly
used in airports were it ill recognize the face and we can avoid some unwanted
terrorist. When compared with other biometrics systems using fingerprint and iris,
face recognition has different advantages because it is without touching the person.
Trough Face images we can capture the person identification from a distance without
touching or interacting with them. And also face recognition is used for crime
restriction purpose because face images that have been recorded and archived,
so that it ill help us to identify a person later.
This report
develops a socio-political analysis that bridges the technical and social-scientific
literatures on FRT and addresses the unique challenges and concerns that attend
its development, evaluation, and specific operational uses, contexts, and goals.
It highlights the potential and limitations of the technology, noting those tasks
for which it seems ready for deployment, those areas where performance obstacles
may be overcome by future technological developments or sound operating procedures,
and still other issues which appear intractable. Its concern with efficacy extends
to ethical considerations
What is Face
Recognition?
Face recognition
technology is the least intrusive and fastest biometric technology. It works with
the most obvious individual identifier – the human face.
Instead of requiring
people to place their hand on a reader(a process not acceptable in some cultures
as well as being a source of illness transfer) or precisely position their eye in
front of a scanner, face recognition systems unobtrusively take pictures of people's
faces as they enter a defined area. There is no intrusion or delay, and in most
cases the subjects are entirely unaware of the process. They do not feel "under
surveillance" or that their privacy has been invaded.
Applications
of face recognition system
1. Law enforcement and justice solutions:
• Today's law
enforcement agencies are looking for innovative technologies to help them stay
one step ahead
of the world's ever-advancing criminals.
• As such, FRS
is committed to developing technologies that can make the jobs of the law enforcement
officer easier. This includes acclaimed CABS-computerized arrest and booking system
and the childbase protection, a software solution for global law enforcement agencies
to help protect and recover missing and sexually exploited children, particularly
as it relates to child pornography.
CABS:
• Store all
offence-related detain one easy-to-use system -- data is entered once and only once.
• Integrate
with any database -- including other detachments and other applications (RMS,
CAD, Jail Management systems, and "most-wanted" databases) .
• Link victims
to offenders -- to aid in criminal analysis and investigations
• Capture and
store digital images of the offender -- encode all mug shots, marks, tattoos, and
scars
• Perform rapid
and accurate searches -- on all data and image fields for crime statistics and
reporting
• Produce digital
lineups -- using any stored image in minutes
• Identify previous
offenders -- pre-integrated with advanced biometric face recognition software.
Childbase
protection:
• ChildBase is an application that helps protect
and recover missing and sexually-exploited children, particularly those children
victimized through child abuse images.
2 Identification solutions:
With regards
to primary identification documents, (Passports, Driver's licenses, and ID Cards),
the use of face recognition for identification programs has several advantages
over other biometric technologies.
• Leverage your
existing identification infrastructure. This includes, using existing photo databases
and the existing enrollment technology (e.g. cameras and capture stations); and
• Increase the
public's cooperation by using a process (taking a picture of one's face) that is
already accepted and expected;
• Integrate
with terrorist watch lists, including regional, national, and international "most-
wanted" databases.
3 Homeland defence:
• Since the
terrorist events of September 11, 2001, the world has paid much more attention to
the idea of Homeland Defense, and both governments and private industries alike
are committed to the cause of national defense.
• This includes everything from preventing terrorists
from boarding aircraft, to protecting critical infrastructure from attack or tampering
(e.g. dams, bridges, water resevoirs, energy plants, etc.), to the identification
of known terrorists.
4 Airport security:
• Airport and
other transportation terminal security is not a new thing. People have long had
to pass through metal detectors before they boarded a plane, been subject to questioning
by security personnel, and restricted from entering "secure" areas. What
has changed, is the vigilance in which these security efforts are being applied.
• The use of
biometric identification, can enhance security
efforts already underway at most airports and other major transportation hubs
(seaports, train stations, etc.).
• This includes the identification of known terrorists
before they get onto an airplane or into a secure location.
5 Immigration:
• Most countries
do not want to be perceived as being a "weak link" when it comes to accepting
immigrants and refugees, particularly if that individual uses the new country as
a staging ground for multi-national criminal and terrorist activities. Consequently,
governments around the world are examining their immigration policies and procedures.
• Biometric
technology, particularly face recognition software, can enhance the effectiveness
of immigration and customs personnel. After all, to the human eye it is often difficult
to determine a person's identity by looking at a photo, especially if the person
has aged, is of a different ethnic background, has altered their hair style,
shaved their beard, etc. FRS does not have this difficulty.
6 Access control:
• The use of
biometric technology, particularly face recognition software (either independently
or
as one part
of a multi-layered biometric solution), can enhance your security efforts considerably.
• Biometric
identification ensures that a person is who they claim to be, eliminating any worry
of someone using illicitly obtained keys or access cards.
7 Financial services:
• The financial
services industry revolves around the concept of security. Yet for the most part,
security within the industry is limited to a simple personal identification number
(PIN) or password.
• Biometrics,
particularly face recognition software, can improve the security of the financial
services industry, saving the institution time and money both through a reduction
of fraud cases and the administration expenses of dealing with forgotten passwords.
• Furthermore,
biometric-based access control units can safeguard vaults, teller areas, and safety
deposit boxes to protect against theft.
• The use of
biometrics can also ensure that confidential information remains confidential
while deterring identity theft, particularly as it relates to ATM terminals and
card-not-present e- commerce transactions.
8 Scene analysis and surveillance solutions:
• This includes
the ability to extract, categorize, and search non-facial imagery. For example,
within the law enforcement application it allows you to capture, archive, and retrieve
such identifying characteristics as tattoos, marks, or scars.
• It can also
analyse scenes from either streaming or archived video, "looking" for
out-of-the- ordinary occurrences, the presence of certain vehicles, specific faces,
etc.
• This is
beneficial and can save significant time and money to those individuals who spend
hours, days, or weeks monitoring video streams (i.e. examining a bank's security
in a criminal investigation).
Download:
Download: