Preview

Facial Recognition Systems, Is This an Effective Tool for Security?

Powerful Essays
Open Document
Open Document
3118 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Facial Recognition Systems, Is This an Effective Tool for Security?
April S Professor G P Wright BA 731 Business and Information Technology 08 December 2012

Facial Recognition Systems, Is this an effective tool for security? Facial Recognition software has been used in many atmospheres to assist in security. There has been controversy as to wither or not facial recognition is an accurate tool. The software has been in existence for many years but still can be defeated by criminals, terrorists, and even by citizens in general without malice. History of Facial Recognition Software. Between the years 1964 to 1965; facial recognition started in its infancy by Woody Bledsoe, Helen Chan Wolf, and Charles Bisson. The project name man-machine utilized mug shot photos, the operator would obtain the features of a person such as the center of pupils, inside & outside corners of the eyes, points of widows peaks, forehead height, chin features and so on. The software measured the distances between twenty different points of the face, such as; width of eyes, width from pupil to pupil, width of mouth, and various others. The problem with this concept is the difficulty of measuring the features would change as the face is tilted or rotated. Lighting was also a major factor in the accuracy of measuring the features to match a 2D photo. Testing is being conducted. The software has recent improvements to address past issues as well as keep up with the technology of today. In 2006, the [2] National Institute of Standards and Technology (NIST) conducted numerous testing sponsored by multiple U.S. Government agencies. One of the priority testing was on the algorithm development project which was designed to advance facial recognition technology and support previous developed software. In the recent news, in September 2012, [3] The Federal Bureau of Investigation (FBI) begins installation of a $1 billion facial recognition system in America in an effort to increase information and sharing in support of



References: [1] Facial Recognition System." Last Updated November 12, 2012: <http://en.wikipedia.org/wiki/Facial_recognition_system>. [2] "Face Recognition Vendor Test 2006." Last updated February 15, 2011 [5] RT.com, . (September 25, 2012): n. page. Web. 14 Nov. 2012. <http://rt.com/usa/news/license-jersey-recognition-face-956/>. [6] Alwis, Sujeewa [10] Reisinger, Don. "CNET News Mobil." CNET News Mobil. (September 5, 2012): n. page. Web. 3 Dec. 2012. <http://news.cnet.com/8301-1035_3-57506457-94/google-wins-patent-on-face-to-unlock-feature/>. [11] Eaton, Kit. (July 24, 2011): n. page. Web. 3 Dec. 2012. <http://www.fastcompany.com/1768963/how-googles-new-face-recognition-tech-could-change-webs-future>. [16] Smith, Gerry. "Facial Recognition Technology Raising Privacy, Civil Liberties, Experts Warn." Huffington Post. (July 18, 2012): n. page. Web. 8 Dec. 2012. <http://www.huffingtonpost.com/2012/07/18/facial-technology_n_1684445.html>.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The subject of face recognition is as old as computer vision and both because of the practical importance of the topic and theoretical interest from cognitive science. Face recognition is not the only method of recognising other people. Even humans between each other use senses in order to recognise others. Machines have a wider range for recognition purposes, which use thinks such as fingerprints, or iris scans. Despite the fact that these methods of identification can be more accurate, face recognition has always remains a major focus of research because of its non-invasive nature and because it is people's primary method of person identification.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Full body scanners used for security purposes pose serious concern to many United States citizens and citizens abroad because of potential violations of individual privacy and personal liberty due to the…

    • 1289 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    To further elaborate on advanced cameras, CNN commented on the “new, chilling, face recognition technology.” With this new technology, it is possible to instantaneously identify people who are caught on camera through facial images that are in government databases. CNN stated that face recognition technology is “a wonderful way for government to spy on its citizens who went to the antigovernment rally” (Strossen 127). CNN could have used a better choice of words rather than “to spy on,” for the simple fact that it’s invading the privacy of the people rather than protecting them. This statement alone could help strengthen Strossen’s weak argument. However,…

    • 523 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the documentary Big Brother Big Business, David Faber takes viewers inside the FBI, the Border Patrol, police departments and schools to determine how they are using biometric technologies to ascertain identity. We also get a look inside a little-known division of AOL that works solely with law enforcement requests for information about AOL’s members.…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The progress of surveillance technology has come so far that it is almost impossible to contain it. Within a much bigger situation it is because we rely on it in the first place. This dependency is stimulated by our own use of surveillance technologies, tracking and our unhealthy want to see ourselves and others. The needs for these surveillance technologies in the commercial and governmental categories are unappeasable.…

    • 2637 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Scaling can be used to create a graphic representation of missing children faces taking into consideration development and maturity of the individual after several years. In the enotes.com article, “What is facial recognition technology and how does it work?” since the 1990’s facial recognition technology has been used to identify criminals and missing children. The technology uses a previous picture of an individual’s face. Measurements such as the person’s nose width, length of their forehead, and width of the lips are digitally stored and the data is used to identify a person; this process is known as geometrical recognition. An alternative process called photometric recognition, generates an outline of the facial features and uses the data for identifications. Data extracted from a picture can be scaled and be compared to other pictures in a database. The technology can be used to progress a child’s picture to an image the child would look like as he or she ages. For instance, if a child went missing at age five, this technology can use be used to…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The only way this technology can be utilitarian is after the crime has taken place so the police can try to find the suspect. Amanda Alvarez, a write, editor, and a college instructor, explains in her article the reason why these cameras are not ready to be used. She states, “ Hair, hats, sunglasses, and facial expressions can throw off automated recognition” (Alvarez). Even though these cameras are “able” to recognize certain faces, sometimes they fail, and the police end up arresting the wrong person. In addition, Ms. Kelly states, “But it 's still not clear whether they are effective at preventing crimes” (“After Boston”). Even though the technology on these cameras has work to capture criminals, they still are not able to prevent crime, and sometimes, they can cause an unnecessary arrest. This means that these cameras function the same way as a normal camera would. Congress should pass a law that bans this technology until the cameras are able to guarantee success 100% of the time. Instead of installing expensive cameras with face- and object-recognition technology, cities can have normal cameras installed, so the police will not arrest an innocent…

    • 777 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    features, their face was at a profile perspective where their eyes were head on, their…

    • 1400 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    different classifiers: Naïve Bayes and SVM. The main advantages of the method are that it is simple, computationally efficient and intrinsically invariant. We present results for simultaneously classifying seven semantic visual categories. These results clearly demonstrate that the method is robust to background clutter and produces good categorization accuracy even…

    • 4807 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Abstract— This paper explores a comparative study of both the linear and kernel implementations of three of the most popular Appearance-based Face Recognition projection classes, these being the methodologies of Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Independent Component Analysis (ICA). The experimental procedure provides a platform of equal working conditions and examines the ten algorithms in the categories of expression, illumination, occlusion and temporal delay. The results are then evaluated based on a sequential combination of assessment tools that facilitate both intuitive and statistical decisiveness among the intra and inter-class comparisons. The ‘best’ categorical algorithms are then incorporated into a hybrid methodology, where the advantageous effects of fusion strategies are considered.…

    • 1124 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    FACE SEGMENTATION

    • 2630 Words
    • 11 Pages

    4. The performance of the face segmentation algorithm is illustrated by some simulation results carried out on various head-and-shoulders test images.…

    • 2630 Words
    • 11 Pages
    Powerful Essays