As described by Kekra, “It is basically the process of classifying a face as ‘known’ or ‘unknown’, based on training set.” (Kekra). It uses a pre uploaded image of a face and as it scans the person, it tries to identify the face with one of the images in its database. One important strength of this technology is that it is difficult to break into a facility without the proper face to match the companies’ database of employees. Another strength that that it provides is the difficulty of hacking or altering data on the machine because the inner workings of the technology is very complex.
Although there are more strengths than weaknesses, it should still be stated that it is not perfect in any way shape or form. A weakness of this technology is that it is very difficult to improve because the coding used to write the software for facial recognition technology is too complex to simply add upon it. Another weakness that it faces is that it cannot detect a face with one hundred percent precision. This can cause issues by allowing unwanted users from gaining access to somewhere they shouldn’t