Abstract
Face recognition technology is one of several biometric tools or modalities used for person identification and verification. Broadly, it is mainly a monitoring and security technology designed to facilitate or control access used by governments, law enforcement agencies, and commerce. It has many other uses already in play, and many others are on the horizon. The chapter begins with a discussion of the technology and is followed with an overview of a few large-scale utilisers of FRT.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Patil et al. (2010), pp. 74–78.
- 2.
Gates (2011), p. 12.
- 3.
ibid p. 200.
- 4.
AADHAAR Unique Identification Authority of India.
- 5.
Rogers (2016).
- 6.
Turk and Pentland (1991).
- 7.
ibid pp. 71–72.
- 8.
ibid p. 76.
- 9.
Syed Navaz et al. (2013).
- 10.
Slevin (2013).
- 11.
International Civil Aviation Organisation.
- 12.
Lin (2000).
- 13.
Dangi (n.d.).
- 14.
Driessen and Dürmuth (2013).
- 15.
The FERET program started in 1993 and ran until 1997. Sponsored by the Department of Defense (sic) Counterdrug Technology Development Program through the Defense Advanced Research Products Agency. Its primary mission was to develop automatic face recognition algorithms that could be employed to assist security, intelligence and law enforcement personnel. The FERET dataset was assembled to support government monitored testing and evaluation of face recognition algorithms using standardised tests and procedures. The final set of images has 3300 images from 1200 persons, with varying mimical expressions, from different dates, under semi-controlled conditions. The dataset is available for research related to face recognition. Cited by Driessen and Dürmuth (2013).
- 16.
Driessen and Dürmuth (2013), p. 3 op cit.
- 17.
Lin (2000), p. 1 op cit.
- 18.
Zhao et al. (2003), pp. 399–458.
- 19.
ibid p. 409.
- 20.
ibid p. 409.
- 21.
ibid p. 409.
- 22.
Turk M, Pentland A op cit.
- 23.
Euclidean space is the space in which distances and angles matter.
- 24.
PCA Principal component analysis is a technique to reduce the complexity of a data set, namely reducing its dimensionality (in some sense, less variables).
- 25.
Shah Zainudin et al. (2012), p. 51.
- 26.
Driessen B, Durmuth M op cit.
- 27.
ibid p. 3.
- 28.
ibid p. 5.
- 29.
Moghaddam et al. (2000).
- 30.
Shah Zainudin et al. (2012) op cit.
- 31.
Syed Navaz et al. (2013).
- 32.
ibid p. 254.
- 33.
NEC.
- 34.
Gregory and Simon (2008), p. 22.
- 35.
Lin (2000), p. 12 op cit.
- 36.
Acharya and Kasprzyk (2010).
- 37.
Grother et al. (2010).
- 38.
See Gohringer (2012).
- 39.
Biggio et al. (2012), p. 5.
- 40.
Anjos and Marcel (2011).
- 41.
Rodrigues et al. (2010).
- 42.
Zhang et al. (2011).
- 43.
Kant and Sharma (2013).
- 44.
Acharya and Kasprzyk (2010).
- 45.
ibid.
- 46.
UIDAI (2012).
- 47.
ibid.
- 48.
Priyanto (2012).
- 49.
UK Borders Act 2007 c.30 §.5 8.
- 50.
Biometric Residents Permit.
- 51.
Government of Canada ‘International use of biometrics’.
- 52.
Kamisher (2017).
- 53.
FBI Privacy Impact Assessment.
- 54.
Automated Biometric Identification System.
- 55.
Integrated Automated Fingerprint System.
- 56.
Next Generation Identification.
- 57.
United States Visitor and Immigrant Status Indicator Technology.
- 58.
Lynch (2012).
- 59.
FBI op cit.
- 60.
FBI ibid.
- 61.
FBI ibid.
- 62.
BI2 Technologies.
- 63.
Data Protection Act 2018.
- 64.
Center for Democracy & Technology (2012).
- 65.
Smith (2019).
- 66.
Welinder (2012), p. 173.
- 67.
Facebook (2011).
- 68.
Welinder (2012), p. 174.
- 69.
Facebook (n.d.).
- 70.
Harris (2013).
- 71.
NEC.
- 72.
NEC.
- 73.
Harmel (2006).
- 74.
Occupy Corporatism (2012).
- 75.
Niles (2012).
- 76.
Biometrica (n.d.).
- 77.
Elash and Luk (2018).
- 78.
Finextra (2013).
References
Acharya L, Kasprzyk T (2010) Biometrics and Government. https://lop.parl.ca/Content/LOP/ResearchPublications/06-30-e.pdf. Accessed 6 June 2018 (unavailable 6 Aug 2019)
Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. http://ieeexplore.ieee.org/document/6117503/. Accessed 7 Aug 2019
BI2 Technologies Biometric Intelligence & Identification Technologies. http://www.bi2technologies.com/. Accessed 7 Aug 2019
Biggio et al (2012) Security evaluation of biometric authentication under realistic spoofing attacks. p 5. https://pralab.diee.unica.it/it/node/667. Accessed 7 Aug 2019
Biometric Residents Permit. https://www.gov.uk/biometric-residence-permits. Accessed 18 Sept 2019
Biometrica (n.d.). https://biometrica.com/casinos/. Accessed 7 Aug 2019
Center for Democracy & Technology (2012) ‘Seeing is ID’ing: facial recognition & privacy’ https://cdt.org/files/pdfs/Facial_Recognition_and_Privacy-Center_for_Democracy_and_Technology-January_2012.pdf
Dangi R (n.d.) Face recognition. https://www.engineersgarage.com/articles/face-recognition. Accessed 6 Aug 2019
Driessen B, Dürmuth M (2013) Achieving anonymity against major face recognition algorithms. In: De Decker B, Dittmann J, Kraetzer C, Vielhauer C (eds) Communications and multimedia security. CMS 2013. Lecture Notes in Computer Science, vol 8099. Springer, Berlin. Photo credit, figure 2.1: ©Ian Berle
Elash A, Luk V (2018) Canadian casinos, banks, police use facial-recognition technology. http://www.theglobeandmail.com/news/national/time-to-lead/canadian-casinos-banks-police-use-facial-recognition-technology/article590998/. Accessed 7 Aug 2019
Facebook (2011) Making photo tagging easier. https://www.facebook.com/notes/facebook/making-photo-tagging-easier/467145887130. Accessed 7 Aug 2019
Facebook (n.d.) How do I remove a tag from a photo or post I’m tagged in? https://en-gb.facebook.com/help/140906109319589. Accessed 7 Aug 2019
FBI Privacy Impact Assessment Integrated Automated Fingerprint Identification System (IAFIS)/Next Generation Identification (NGI) Biometric Interoperability. https://www.fbi.gov/services/records-management/foia/privacy-impact-assessments/iafis-ngi-biometric-interoperability. Accessed 7 Aug 2019
Finextra (2013) Facebanx unveils facial recognition tech for banks. http://www.finextra.com/news/Announcement.aspx?pressreleaseid=49488&topic=mobile. Accessed 7 Aug 2019
Gates KA (2011) Our biometric future: facial recognition technology and the culture of surveillance. New York University Press, New York, p 12
Gohringer C (2012) Advances in face recognition technology and its application in airports. http://www.planetbiometrics.com/article-details/i/1214/desc/advances-in-face-recognition-technology-and-its-application-in-airports/. Accessed 7 Aug 2019
Government of Canada International use of biometrics. http://www.cic.gc.ca/english/department/biometrics-international.asp. Accessed 7 Aug 2019
Great Britain, Data Protection Act 2018 c.12. https://www.legislation.gov.uk/ukpga/2018/12/contents. Accessed 7 Aug 2019
Gregory P, Simon MA (2008) Biometrics for dummies. Wiley Publishing Inc, Indiapolis, p 22
Grother PJ et al (2010) Report on the evaluation of 2D still-image face recognition algorithms. NIST Interagency Report 7709. http://www.nist.gov/customcf/get_pdf.cfm?pub_id=905968. Accessed 6 Aug 2019
Harmel K (2006) Walt Disney World: The Government’s Tomorrowland. http://news21.com/story/2006/09/01/walt_disney_world_the_governments. Accessed 7 Aug 2019
Harris S (2013) Computer to sales staff: VIP approaching. The Sunday Times 14 July 2013. http://www.thesundaytimes.co.uk/sto/news/uk_news/Tech/article1287590.ece. Accessed 7 Aug 2019
International Civil Aviation Organisation Machine Readable Travel Documents ICAO Document 9303 part 9 section 4.1 ‘Primary Biometric: Facial Image’ p 7-8. www.icao.int/publications/Documents/9303_p9_cons_en.pdf. Accessed 6 Aug 2019
Kamisher E (2017) Israel transitions to Biometric passports and IDs. Jerusalem Post 1st June 2017. http://www.jpost.com/Israel-News/Israel-transitions-to-Biometric-passports-and-IDs-494535. Accessed 18 Sept 2019
Kant C, Sharma N (2013) Fake face recognition using fusion of thermal imaging and skin elasticity. IJCSCIJ 4(1):65–72. http://www.csjournals.com/IJCSC/PDF4-1/Article_15.pdf. Accessed 7 Aug 2019
Lin SH (2000) An introduction to face recognition technology. Informing Sci 3(1):1, Informing Science Special Issue on Multimedia Informing Technologies
Lynch J (2012) Written testimony of Jennifer Lynch Staff Attorney with the Electronic Frontier Foundation (EFF) Senate Committee on the Judiciary Subcommittee on privacy, technology, and the law what facial recognition technology means for privacy and civil liberties. July 18, 2012, p 3. http://www.judiciary.senate.gov/imo/media/doc/12-7-18LynchTestimony.pdf. Accessed 7 Aug 2019
Moghaddam B, Jebara T, Pentland A (2000) Bayesian face recognition. www.cnbc.cmu.edu/~tai/readings/face/pentland.pdf. Accessed 6 Aug 2019
NEC. The acronym of NEC corporation previously known as Nippon Electric Company. http://uk.nec.com/en_GB/global/about/history.html. Accessed 7 Aug 2019
NEC. Face recognition. https://www.nec.com/en/global/solutions/safety/face_recognition/index.html. Accessed 6 Aug 2019
NEC. New biometric identification tools used in theme parks. http://www.nec.com/en/global/about/mitatv/03/2.html. Accessed 7 Aug 2019
Niles R (2012) Disney claims top 8 spots in 2011 global theme park industry attendance report. http://www.themeparkinsider.com/flume/201205/3073/. Accessed 7 Aug 2019
Occupy Corporatism (2012) Disney biometrics and the Department of Defense. http://www.occupycorporatism.com/disney-biometrics-and-the-department-of-defense/. Accessed 7 Aug 2019. See also Chapter 3.2
Patil AM, Kolhe SR, Patil PM (2010) 2D Face recognition techniques: a survey. Int J Machine Intelligence 2(1):74–78
Priyanto U (2012) National Electronic ID Card (e-ktp) Programme in Indonesia. https://www.scribd.com/document/240007853/1-Priyanto-Unggul. Accessed 7 Aug 2019
Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system, Biometrics: Theory Applications and Systems (BTAS). In: Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp 1–5. 27–29 Sept. 2010
Rogers K (2016) That time the super bowl secretly used facial recognition software on fans. https://www.vice.com/en_us/article/kb78de/that-time-the-super-bowl-secretly-used-facial-recognition-software-on-fans. Accessed 6 Aug 2019
Shah Zainudin MN et al (2012) Face recognition using Principle Component Analysis (PCA) and Linear Discriminant Analysis (LDA). Int J Electr Comp Sci 12:51. http://www.ijens.org/Vol_12_I_05/1214404-05-3737-IJECS-IJENS.pdf. Accessed 6 Aug 2019
Slevin J (2013) How to measure passenger flow? Part 3 – Facial Recognition. http://blog.hrsid.com/mflow/2013/12/03/can-measure-passenger-flow-part-3-facial-recognition. Accessed 6 Aug 2019
Smith K (2019) 53 Incredible facebook statistics. Brandwatch marketing. https://www.brandwatch.com/blog/47-facebook-statistics/. Accessed 7 Aug 2019
Syed Navaz A, Dhevi Sri T, Mazumder P (2013) Face recognition using principal component analysis and neural networks. Int J Comp Netw Wireless Mobile Commun 3:245–256
Turk M, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosc 3(1):71–86. Massachusetts Institute of Technology, published by the MIT Press
UIDAI (2012) The role of biometric technology in Aadhaar Enrolment. stateofaadhaar.in/wp-content/uploads/UIDAI_Role_2012.pdf. Accessed 7 Aug 2019
UK Borders Act 2007 c.30 §.5. https://www.legislation.gov.uk/ukpga/2007/30/contents. Accessed 7 Aug 2019
Welinder Y (2012) A face tells more than a thousand posts: developing face recognition privacy in social networks. Harv J Law Technol 26(1):166–237. http://jolt.law.harvard.edu/articles/pdf/v26/26HarvJLTech165.pdf
Zhang Z et al (2011) Face liveness detection by learning multispectral reflectance distributions. http://www.cbsr.ia.ac.cn/users/zlei/papers/Zhang-FaceLiveness-FG-11.pdf. Accessed 18 Sept 2019
Zhao W et al (2003) Face recognition: a literature survey. ACM Comp Surv 35(4):399–458. http://doi.acm.org/10.1145/954339.954342. Accessed 6 Aug 2019
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Berle, I. (2020). What Is Face Recognition Technology?. In: Face Recognition Technology. Law, Governance and Technology Series, vol 41. Springer, Cham. https://doi.org/10.1007/978-3-030-36887-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-36887-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36886-9
Online ISBN: 978-3-030-36887-6
eBook Packages: Law and CriminologyLaw and Criminology (R0)