Jump to content

Facial recognition system: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Line 147: Line 147:
|url=http://pqasb.pqarchiver.com/USAToday/access/391952771.html?dids=391952771:391952771&FMT=ABS&FMTS=ABS:FT&date=Sep+2%2C+2003&author=Richard+Willing&pub=USA+TODAY&edition=&startpage=A.03&desc=Airport+anti-terror+systems+flub+tests+%3B+Face-recognition+technology+fails+to+flag+%27suspects%27
|url=http://pqasb.pqarchiver.com/USAToday/access/391952771.html?dids=391952771:391952771&FMT=ABS&FMTS=ABS:FT&date=Sep+2%2C+2003&author=Richard+Willing&pub=USA+TODAY&edition=&startpage=A.03&desc=Airport+anti-terror+systems+flub+tests+%3B+Face-recognition+technology+fails+to+flag+%27suspects%27
|format=Abstract
|format=Abstract
|title=Airport anti-terror systems flub tests; Face-recognition technology fails to flag 'suspects'
|title=Airport [[anti-terror system]]s flub tests; Face-recognition technology fails to flag 'suspects'
|publisher=USA Today
|publisher=USA Today
|date=2003-09-02
|date=2003-09-02
Line 153: Line 153:


===Privacy concerns===
===Privacy concerns===
Many citizens are concerned that their privacy will be invaded. Some fear that it could lead to a “total surveillance society,” with the government and other authorities having the ability to know where you are, and what you are doing, at all times. This is not to be an underestimated concept as history has shown that states have typically abused such access before.<ref>{{cite web
Many citizens are concerned that their [[privacy]] will be invaded. Some fear that it could lead to a “total [[surveillance society]],” with the government and other authorities having the ability to know where you are, and what you are doing, at all times. This is not to be an underestimated concept as history has shown that states have typically abused such access before.<ref>{{cite web
|url = http://terrorism.about.com/od/civillibertiesissues/i/facialrecsoft_2.htm
|url = http://terrorism.about.com/od/civillibertiesissues/i/facialrecsoft_2.htm
|title = Civil Liberties & Facial Recognition Software
|title = Civil Liberties & Facial Recognition Software
Line 161: Line 161:
|archiveurl = http://web.archive.org/web/20060301220151/terrorism.about.com/od/civillibertiesissues/i/facialrecsoft_2.htm
|archiveurl = http://web.archive.org/web/20060301220151/terrorism.about.com/od/civillibertiesissues/i/facialrecsoft_2.htm
|archivedate = 2006-03-01
|archivedate = 2006-03-01
|quote = A few examples which have already arisen from surveillance video are: using license plates to blackmail gay married people, stalking women, tracking estranged spouses...
|quote = A few examples which have already arisen from surveillance video are: using license plates to blackmail gay married people, [[stalking]] women, tracking estranged spouses...
}}</ref>
}}</ref>



Revision as of 11:38, 29 June 2011

Swiss European surveillance: facial recognition and vehicle make, model, color and license plate reader.
Side View.
Close-up of the infrared illuminator. This light is invisible to the human eye but it creates a day-like environment for the surveillance cameras.

A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.

It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.[1]

Techniques

Traditional

Some facial recognition algorithms identify faces by extracting landmarks, or features, from an image of the subject's face. For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for other images with matching features.[2] Other algorithms normalize a gallery of face images and then compress the face data, only saving the data in the image that is useful for face detection. A probe image is then compared with the face data.[3] One of the earliest successful systems[4] is based on template matching techniques[5] applied to a set of salient facial features, providing a sort of compressed face representation.

Recognition algorithms can be divided into two main approaches, geometric, which looks at distinguishing features, or photometric, which is a statistical approach that distill an image into values and comparing the values with templates to eliminate variances.

Popular recognition algorithms include Principal Component Analysis with eigenface, Linear Discriminate Analysis, Elastic Bunch Graph Matching fisherface, the Hidden Markov model, and the neuronal motivated dynamic link matching.

3-D

A newly emerging trend, claimed to achieve previously unseen accuracies, is three-dimensional face recognition. This technique uses 3-D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.[6]

One advantage of 3-D facial recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view.[2][6]

Even a perfect 3D matching technique could be sensitive to expressions. For that goal a group at the Technion applied tools from metric geometry to treat expressions as isometries[7]

Skin texture analysis

Another emerging trend uses the visual details of the skin, as captured in standard digital or scanned images. This technique, called skin texture analysis, turns the unique lines, patterns, and spots apparent in a person’s skin into a mathematical space.[2]

Tests have shown that with the addition of skin texture analysis, performance in recognizing faces can increase 20 to 25 percent.[2][6]

Software

  • Google's Picasa digital image organizer has a built in face recognition system starting from version 3.5 onwards. It can associate faces with persons, so that queries can be run on pictures to return all pictures with a specific group of people together. Picasaweb.com has also been providing a similar feature to its users.
  • Apple iPhoto, photo organizer distributed with iLife suite of applications includes a system by which people can tag recognized people on photos. Then they can be searched using Spotlight.
  • Sony's Picture Motion Browser (PMB) analyses photo, associates photos with identical faces so that they can be tagged accordingly, and differentiates between photos with one person, many persons and nobody.
  • Facebook also included face recognition technology
  • Windows Live Photo Gallery also included face recognition in last version.

Notable users and deployments

The London Borough of Newham, in the UK, previously trialled a facial recognition system built into their borough-wide CCTV system.

The German Federal Police use a facial recognition system to allow voluntary subscribers to pass fully automated border controls at Frankfurt Rhein-Main international airport. Subscribers need to be European Union or Swiss citizens.[citation needed] Since 2005 the German Federal Criminal Police Office offers centralized facial recognition on mugshot images for all German police agencies. Recognition systems are also used by casinos to catch card counters and other blacklisted individuals.

The Australian Customs Service has an automated border processing system called SmartGate that uses facial recognition. The system compares the face of the individual with the image in the e-passport microchip, certifying that the holder of the passport is the rightful owner.

Pennsylvania Justice Network searches crime scene photographs and CCTV footage in the mugshot database of previous arrests. A number of cold cases have been resolved since the system became operational in 2005. Other law enforcement agencies in the USA and abroad use arrest mugshot databases in their forensic investigative work.

U.S. Department of State operates one of the largest face recognition systems in the world with over 75 million photographs that is actively used for visa processing.

Spaceship Earth in Epcot uses this[?] for the touch screen part of the ride.

Additional uses

In addition to being used for security systems, authorities have found a number of other applications for facial recognition systems. While earlier post 9/11 deployments were well publicized trials, more recent deployments are rarely written about due to their covert nature.

At Super Bowl XXXV in January 2001, police in Tampa Bay, Florida, used Identix' facial recognition software, FaceIt, to search for potential criminals and terrorists in attendance at the event.[2] (it found 19 people with pending arrest warrants)[8]

In the 2000 presidential election, the Mexican government employed facial recognition software to prevent voter fraud. Some individuals had been registering to vote under several different names, in an attempt to place multiple votes. By comparing new facial images to those already in the voter database, authorities were able to reduce duplicate registrations.[9] Similar technologies are being used in the United States to prevent people from obtaining fake identification cards and driver’s licenses.[10][11]

There are also a number of potential uses for facial recognition that are currently being developed. For example, the technology could be used as a security measure at ATM’s; instead of using a bank card or personal identification number, the ATM would capture an image of your face, and compare it to your photo in the bank database to confirm your identity. This same concept could also be applied to computers; by using a webcam to capture a digital image of yourself, your face could replace your password as a means to log-in.[2]

As part of the investigation of the disappearance of Madeleine McCann the British police are calling on visitors to the Ocean Club Resort, Praia da Luz in Portugal or the surrounding areas in the two weeks leading up to the child's disappearance on Thursday 3 May 2007 to provide copies of any photographs of people taken during their stay, in an attempt to identify the abductor using a biometric facial recognition application.[12][13]

Also, in addition to biometric usages, modern digital cameras often incorporate a facial detection system that allows the camera to focus and measure exposure on the face of the subject, thus guaranteeing a focused portrait of the person being photographed. Some cameras, in addition, incorporate a smile shutter, or take automatically a second picture if someone closed their eyes during exposure.

Comparative study

Among the different biometric techniques, facial recognition may not be the most reliable and efficient. However, one key advantage is that it does not require aid (or consent) from the test subject. Properly designed systems installed in airports, multiplexes, and other public places can identify individuals among the crowd. Other biometrics like fingerprints, iris scans, and speech recognition cannot perform this kind of mass identification. However, questions have been raised on the effectiveness of facial recognition software in cases of railway and airport security.

Criticisms

Weaknesses

Face recognition is not perfect and struggles to perform under certain conditions. Ralph Gross, a researcher at the Carnegie Mellon Robotics Institute, describes one obstacle related to the viewing angle of the face: "Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been problems."[6]

Other conditions where face recognition does not work well include poor lighting, sunglasses, long hair, or other objects partially covering the subject’s face, and low resolution images.[2]

Another serious disadvantage is that many systems are less effective if facial expressions vary. Even a big smile can render the system less effective. For instance: Canada now allows only neutral facial expressions in passport photos.[14]

Effectiveness

Critics of the technology complain that the London Borough of Newham scheme has, as of 2004, never recognized a single criminal, despite several criminals in the system's database living in the Borough and the system having been running for several years. "Not once, as far as the police know, has Newham's automatic facial recognition system spotted a live target."[15][16] This information seems to conflict with claims that the system was credited with a 34% reduction in crime (hence why it was rolled out to Birmingham also)[17]. However it can be explained by the notion that when the public is regularly told that they are under constant video surveillance with advanced face recognition technology, this fear alone can reduce the crime rate, whether the face recognition system technically works or does not. This has been the basis for several other face recognition based security systems, where the technology itself does not work particularly well but the user's perception of the technology does.

An experiment by the local police department in Tampa, Florida, had similarly disappointing results.[18]

"Camera technology designed to spot potential terrorists by their facial characteristics at airports failed its first major test at Boston's Logan Airport"[19]

Privacy concerns

Many citizens are concerned that their privacy will be invaded. Some fear that it could lead to a “total surveillance society,” with the government and other authorities having the ability to know where you are, and what you are doing, at all times. This is not to be an underestimated concept as history has shown that states have typically abused such access before.[20]

Recent Improvements

In 2006, the performance of the latest face recognition algorithms were evaluated in the Face Recognition Grand Challenge (FRGC). High-resolution face images, 3-D face scans, and iris images were used in the tests. The results indicated that the new algorithms are 10 times more accurate than the face recognition algorithms of 2002 and 100 times more accurate than those of 1995. Some of the algorithms were able to outperform human participants in recognizing faces and could uniquely identify identical twins.[6]

Low-resolution images of faces can be enhanced using face hallucination. Further improvements in high resolution, megapixel cameras in the last few years have helped to resolve the issue of insufficient resolution.

Early development

Pioneers of Automated Facial Recognition include: Woody Bledsoe, Helen Chan Wolf, and Charles Bisson.

During 1964 and 1965, Bledsoe, along with Helen Chan and Charles Bisson, worked on using the computer to recognize human faces (Bledsoe 1966a, 1966b; Bledsoe and Chan 1965). He was proud of this work, but because the funding was provided by an unnamed intelligence agency that did not allow much publicity, little of the work was published. Given a large database of images (in effect, a book of mug shots) and a photograph, the problem was to select from the database a small set of records such that one of the image records matched the photograph. The success of the method could be measured in terms of the ratio of the answer list to the number of records in the database. Bledsoe (1966a) described the following difficulties:

This recognition problem is made difficult by the great variability in head rotation and tilt, lighting intensity and angle, facial expression, aging, etc. Some other attempts at facial recognition by machine have allowed for little or no variability in these quantities. Yet the method of correlation (or pattern matching) of unprocessed optical data, which is often used by some researchers, is certain to fail in cases where the variability is great. In particular, the correlation is very low between two pictures of the same person with two different head rotations.

— Woody Bledsoe, 1966

This project was labeled man-machine because the human extracted the coordinates of a set of features from the photographs, which were then used by the computer for recognition. Using a graphics tablet (GRAFACON or RAND TABLET), the operator would extract the coordinates of features such as the center of pupils, the inside corner of eyes, the outside corner of eyes, point of widows peak, and so on. From these coordinates, a list of 20 distances, such as width of mouth and width of eyes, pupil to pupil, were computed. These operators could process about 40 pictures an hour. When building the database, the name of the person in the photograph was associated with the list of computed distances and stored in the computer. In the recognition phase, the set of distances was compared with the corresponding distance for each photograph, yielding a distance between the photograph and the database record. The closest records are returned.

This brief description is an oversimplification that fails in general because it is unlikely that any two pictures would match in head rotation, lean, tilt, and scale (distance from the camera). Thus, each set of distances is normalized to represent the face in a frontal orientation. To accomplish this normalization, the program first tries to determine the tilt, the lean, and the rotation. Then, using these angles, the computer undoes the effect of these transformations on the computed distances. To compute these angles, the computer must know the three-dimensional geometry of the head. Because the actual heads were unavailable, Bledsoe (1964) used a standard head derived from measurements on seven heads.

After Bledsoe left PRI in 1966, this work was continued at the Stanford Research Institute, primarily by Peter Hart. In experiments performed on a database of over 2000 photographs, the computer consistently outperformed humans when presented with the same recognition tasks (Bledsoe 1968). Peter Hart (1996) enthusiastically recalled the project with the exclamation, "It really worked!"

By about 1997, the system developed by Christoph von der Malsburg and graduate students of the University of Bochum in Germany and the University of Southern California in the United States outperformed most systems with those of Massachusetts Institute of Technology and the University of Maryland rated next. The Bochum system was developed through funding by the United States Army Research Laboratory. The software was sold as ZN-Face and used by customers such as Deutsche Bank and operators of airports and other busy locations. The software was "robust enough to make identifications from less-than-perfect face views. It can also often see through such impediments to identification as mustaches, beards, changed hair styles and glasses—even sunglasses".[21]

In about January 2007, image searches were "based on the text surrounding a photo," for example, if text nearby mentions the image content. Polar Rose technology can guess from a photograph, in about 1.5 seconds, what any individual may look like in three dimensions, and thought they "will ask users to input the names of people they recognize in photos online" to help build a database.[citation needed]

See also

References

  1. ^ "Facial Recognition Applications". Animetrics. Retrieved 2008-06-04.
  2. ^ a b c d e f g Bonsor, K. "How Facial Recognition Systems Work". Retrieved 2008-06-02. Cite error: The named reference "Bonsor" was defined multiple times with different content (see the help page).
  3. ^ Smith, Kelly. "Face Recognition" (PDF). Retrieved 2008-06-04.
  4. ^ R. Brunelli and T. Poggio, "Face Recognition: Features versus Templates", IEEE Trans. on PAMI, 1993, (15)10:1042-1052
  5. ^ R. Brunelli, Template Matching Techniques in Computer Vision: Theory and Practice, Wiley, ISBN 978-0-470-51706-2, 2009 ([1] TM book)
  6. ^ a b c d e Williams, Mark. "Better Face-Recognition Software". Retrieved 2008-06-02.
  7. ^ Kimmel, Ron. "Three-dimensional face recognition" (PDF). Retrieved 2005-01-01.
  8. ^ McNealy, Scott. "Privacy is (Virtually) Dead". Retrieved 2006-12-24.
  9. ^ "Mexican Government Adopts FaceIt Face Recognition Technology to Eliminate Duplicate Voter Registrations in Upcoming Presidential Election". Business Wire. 2000-05-11. Retrieved 2008-06-02.
  10. ^ House, David. "Facial recognition at DMV". Oregon Department of Transportation. Retrieved 2007-09-17. Oregon DMV is going to start using "facial recognition" software, a new tool in the prevention of fraud, required by a new state law. The law is designed to prevent someone from obtaining a driver license or ID card under a false name.
  11. ^ Schultz, Zac. "Facial Recognition Technology Helps DMV Prevent Identity Theft". WMTV News, Gray Television. Retrieved 2007-09-17. Madison: ...The Department of Motor Vehicles is using... facial recognition technology [to prevent ID theft]
  12. ^ "Help find Madeleine McCann". Child Exploitation and Online Protection Centre. 2007-05-21. Retrieved 2007-05-21.
  13. ^ Brown, David (2007-05-23). "We will travel anywhere to find Madeleine, say parents". London: Times Online. Retrieved 2008-06-02.
  14. ^ "Passport Canada - Photos". passportcanada.gc.ca.
  15. ^ Meek, James (2002-06-13). "Robo cop". London: UK Guardian newspaper.
  16. ^ Krause, Mike (2002-01-14). "Is face recognition just high-tech snake oil?". Enter Stage Right.
  17. ^ "Birmingham City Centre CCTV Installs Visionics' FaceIt". Business Wire. 2008-06-02.
  18. ^ Krause, Mike (2008-06-02). "Is face recognition just high-tech snake oil?". Enter Stage Right.
  19. ^ Willing, Richard (2003-09-02). "Airport [[anti-terror system]]s flub tests; Face-recognition technology fails to flag 'suspects'" (Abstract). USA Today. Retrieved 2007-09-17. {{cite news}}: URL–wikilink conflict (help)
  20. ^ "Civil Liberties & Facial Recognition Software". About.com, The New York Times Company. pp. pp. 2. Archived from the original on 2006-03-01. Retrieved 2007-09-17. A few examples which have already arisen from surveillance video are: using license plates to blackmail gay married people, stalking women, tracking estranged spouses...
  21. ^ "Mugspot Can Find A Face In The Crowd -- Face-Recognition Software Prepares To Go To Work In The Streets". ScienceDaily. 12 November 1997. Retrieved 2007-11-06.