Skip to main content

What Is Face Recognition Technology?

  • Chapter
  • First Online:

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 41))

Abstract

Face recognition technology is one of several biometric tools or modalities used for person identification and verification. Broadly, it is mainly a monitoring and security technology designed to facilitate or control access used by governments, law enforcement agencies, and commerce. It has many other uses already in play, and many others are on the horizon. The chapter begins with a discussion of the technology and is followed with an overview of a few large-scale utilisers of FRT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See Patil et al. (2010), pp. 74–78.

  2. 2.

    Gates (2011), p. 12.

  3. 3.

    ibid p. 200.

  4. 4.

    AADHAAR Unique Identification Authority of India.

  5. 5.

    Rogers (2016).

  6. 6.

    Turk and Pentland (1991).

  7. 7.

    ibid pp. 71–72.

  8. 8.

    ibid p. 76.

  9. 9.

    Syed Navaz et al. (2013).

  10. 10.

    Slevin (2013).

  11. 11.

    International Civil Aviation Organisation.

  12. 12.

    Lin (2000).

  13. 13.

    Dangi (n.d.).

  14. 14.

    Driessen and Dürmuth (2013).

  15. 15.

    The FERET program started in 1993 and ran until 1997. Sponsored by the Department of Defense (sic) Counterdrug Technology Development Program through the Defense Advanced Research Products Agency. Its primary mission was to develop automatic face recognition algorithms that could be employed to assist security, intelligence and law enforcement personnel. The FERET dataset was assembled to support government monitored testing and evaluation of face recognition algorithms using standardised tests and procedures. The final set of images has 3300 images from 1200 persons, with varying mimical expressions, from different dates, under semi-controlled conditions. The dataset is available for research related to face recognition. Cited by Driessen and Dürmuth (2013).

  16. 16.

    Driessen and Dürmuth (2013), p. 3 op cit.

  17. 17.

    Lin (2000), p. 1 op cit.

  18. 18.

    Zhao et al. (2003), pp. 399–458.

  19. 19.

    ibid p. 409.

  20. 20.

    ibid p. 409.

  21. 21.

    ibid p. 409.

  22. 22.

    Turk M, Pentland A op cit.

  23. 23.

    Euclidean space is the space in which distances and angles matter.

  24. 24.

    PCA Principal component analysis is a technique to reduce the complexity of a data set, namely reducing its dimensionality (in some sense, less variables).

  25. 25.

    Shah Zainudin et al. (2012), p. 51.

  26. 26.

    Driessen B, Durmuth M op cit.

  27. 27.

    ibid p. 3.

  28. 28.

    ibid p. 5.

  29. 29.

    Moghaddam et al. (2000).

  30. 30.

    Shah Zainudin et al. (2012) op cit.

  31. 31.

    Syed Navaz et al. (2013).

  32. 32.

    ibid p. 254.

  33. 33.

    NEC.

  34. 34.

    Gregory and Simon (2008), p. 22.

  35. 35.

    Lin (2000), p. 12 op cit.

  36. 36.

    Acharya and Kasprzyk (2010).

  37. 37.

    Grother et al. (2010).

  38. 38.

    See Gohringer (2012).

  39. 39.

    Biggio et al. (2012), p. 5.

  40. 40.

    Anjos and Marcel (2011).

  41. 41.

    Rodrigues et al. (2010).

  42. 42.

    Zhang et al. (2011).

  43. 43.

    Kant and Sharma (2013).

  44. 44.

    Acharya and Kasprzyk (2010).

  45. 45.

    ibid.

  46. 46.

    UIDAI (2012).

  47. 47.

    ibid.

  48. 48.

    Priyanto (2012).

  49. 49.

    UK Borders Act 2007 c.30 §.5 8.

  50. 50.

    Biometric Residents Permit.

  51. 51.

    Government of Canada ‘International use of biometrics’.

  52. 52.

    Kamisher (2017).

  53. 53.

    FBI Privacy Impact Assessment.

  54. 54.

    Automated Biometric Identification System.

  55. 55.

    Integrated Automated Fingerprint System.

  56. 56.

    Next Generation Identification.

  57. 57.

    United States Visitor and Immigrant Status Indicator Technology.

  58. 58.

    Lynch (2012).

  59. 59.

    FBI op cit.

  60. 60.

    FBI ibid.

  61. 61.

    FBI ibid.

  62. 62.

    BI2 Technologies.

  63. 63.

    Data Protection Act 2018.

  64. 64.

    Center for Democracy & Technology (2012).

  65. 65.

    Smith (2019).

  66. 66.

    Welinder (2012), p. 173.

  67. 67.

    Facebook (2011).

  68. 68.

    Welinder (2012), p. 174.

  69. 69.

    Facebook (n.d.).

  70. 70.

    Harris (2013).

  71. 71.

    NEC.

  72. 72.

    NEC.

  73. 73.

    Harmel (2006).

  74. 74.

    Occupy Corporatism (2012).

  75. 75.

    Niles (2012).

  76. 76.

    Biometrica (n.d.).

  77. 77.

    Elash and Luk (2018).

  78. 78.

    Finextra (2013).

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Berle, I. (2020). What Is Face Recognition Technology?. In: Face Recognition Technology. Law, Governance and Technology Series, vol 41. Springer, Cham. https://doi.org/10.1007/978-3-030-36887-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36887-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36886-9

  • Online ISBN: 978-3-030-36887-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics