
Technology has definitely performed a giant leap over the last few decades. We went from button phones that had two functions: call and text, to having small computers in our pockets that could perform nearly any task that a full desktop can. Furthermore, these smartphones contain nearly all our personal information since they hold our messages, pictures, bank account details, locations, and more. So if it goes in the wrong hands, you can not see what’s literally coming.
Fortunately, there are security measures in place that keep others from accessing this sensitive information.
Earlier, this was done by using passwords and pin codes but having to enter either of the aforementioned methods every time someone wants to unlock the phone is inconvenient for most users. That is why smartphone manufacturers started to explore different, faster ways could unlock their devices.
So, biometric security on smartphones was born. Everything changed the means of security measures, from fingerprint sensors to facial recognition. And there is more to it. Stay glued to know.
What are biometrics?
To put it simply, biometrics are any metrics related to human features. They measure a person’s physical characteristics to verify their identity. Any time you use your fingerprint or facial recognition to unlock your smartphone or laptop, you use biometrics.
Undeniably there are many advantages to using biometric security on your devices. For example, a pin lock or a password can be cracked, while to fool a fingerprint scanner, someone would need to physically recreate your fingerprint, which is possible but very hard to do. Biometric authentication methods are also much faster than entering even a simple four-number pin.
Unfortunately, whenever there are advantages, there are also downsides. Although biometrics originally got popular by using fingerprints and iris scanners, there is a new method that certain smartphone and laptop manufacturers are pushing. It is facial recognition.
Despite being as secure as the previous methods, this biometric authentication approach carries a much more dangerous context.
What is facial recognition?
Facial recognition is a way for technology to recognize a human face. It does so in a similar fashion to another human being recognizing a face. People are good at recognizing familiar facial features:
- the eyes
- nose
- mouth
- chin and how they all come together to form a face.
That’s basically how a facial recognition system works but on a much larger and algorithmic scale. There are a few different methods of how a facial recognition system works, but in general, they extract selected facial features from an image or video and compare this data to the information that is stored in the database.
How does facial recognition work?
Although when broken down to the basics, all facial recognition techniques use data from a face in an image to compare it to the data already contained in the database, there are different techniques to obtain this data.
Each one has its own ups and downs and might require different hardware and software to execute.
There are five main methods of extracting data from a picture of a human face.
They are as follows:
1. Traditional Facial Recognition
As can be inferred from the name, this method uses a similar algorithm to that which was used back in the 1970s when the technology was just being developed. The facial recognition algorithm identifies different facial features by extracting landmarks from an image of a face.
It then compares the shapes of different facial structures, such as the eye and nose shape and their relative position between one another. These images are then compared to other images in the database with matching features.
Although originally, the landmarks on the face were marked manually, nowadays, the computer recognizes these features on its own.
There are two main classifications of traditional facial recognition:
- Holistic: attempts to recognize the entire face
- Feature-based: divides the face into landmarks and compares their shape and spatial location with respect to each other.
2. 3 – Dimensional Recognition
Unfortunately, traditional facial recognition can be fooled quite easily when referring to device security. All that is needed is a clear picture of your face, and your device is unlocked.
This is where 3-dimensional facial recognition comes into play. The three-dimensional face recognition technique uses 3D sensors to capture information about the shape of a face.
This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.
When used in device security, another advantage 3D face recognition has over the traditional method is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view.
Three-dimensional data points from a face vastly improve the precision of face recognition.
3D research is enhanced by the development of sophisticated sensors that do a better job of capturing 3D face imagery.
3. Skin Texture Analysis
Being a more recent development, this facial recognition method is not fully developed to work on its own 100% of the time. Instead, it is usually combined with either of the aforementioned methods to improve their accuracy.
Skin texture analysis uses the visual details of the skin as captured in standard digital or scanned images. This technique turns the unique lines, patterns, and spots apparent in a person's skin into a mathematical space.
Surface Texture Analysis works much the same way facial recognition does. A picture is taken of a patch to distinguish any lines, pores, and skin texture. It can identify the contrast between identical pairs, which is not yet possible using facial recognition software alone.
4. Facial Recognition Combining Different Techniques
As every method has advantages and disadvantages, technology companies have amalgamated traditional 3D recognition and Skin Textual Analysis to create recognition systems with higher success rates.
Combined techniques have an advantage over other systems. It is relatively insensitive to changes in expression, including blinking, frowning, or smiling, and can compensate for moustache or beard growth and the appearance of eyeglasses.
The system is also uniform with respect to race and gender.
5. Thermal Cameras
A different form of taking input data for face recognition is by using thermal cameras; by this procedure, the cameras will only detect the shape of the head, and it will ignore the subject accessories such as glasses, hats, or makeup.
Unlike conventional cameras, thermal cameras can capture facial imagery even in low-light and nighttime conditions without using a flash and exposing the camera's position. However, a problem with using thermal pictures for face recognition is limited databases.
Facial Recognition Applications
We have already discussed using facial recognition for device security; however, facial recognition also has many other applications.
Many published works mention numerous applications in which face recognition technology is already utilized, including entry to secured high‐risk spaces such as border crossings and access to restricted resources.
On the other hand, there are other application areas in which face recognition has not yet been used. The potential application areas of face recognition technology can be outlined as follows:
- Automated surveillance, where the objective is to recognize and track people.
- Monitoring closed-circuit television (CCTV), the facial recognition capability can be embedded into existing CCTV networks to look for lost children or other missing persons or tracking known suspected criminals.
- Image database investigations, searching image databases of licensed drivers and benefit recipients, finding people in large news photographs and video collections, and searching in the Facebook social networking website.
- Multimedia environments with adaptive human-computer interfaces (part of ubiquitous or context-aware systems, behaviour monitoring at childcare or centres for old people, recognizing customers, and assessing their needs).
- Aeroplane-boarding gate. Face recognition may be used in places of random checks merely to screen passengers for further investigation.
- Similarly, in casinos, the strategic design of betting floors that incorporates cameras at face height with good lighting could be used to scan faces for identification purposes and possibly to afford the capture of images to build a comprehensive gallery for the future watch‐list, identification and authentication tasks.
- Sketch‐based face reconstruction, where law enforcement agencies in the world rely on practical methods to help crime witnesses reconstruct likenesses of faces. These methods range from sketch artistry to proprietary computerized composite systems.
There have been many applications for face recognition, but most commercial ones exploit only superficially the great potential of this technology. In addition, most of the applications are notably limited in their ability to handle pose, lighting changes, or ageing.
Note: Although face recognition surveillance systems have already begun, the technology seems to be not so accurate. It also brings additional problems concerning highly extensive perception in such complex solutions' data gathering and computing side.
The Dangers Behind Facial Recognition
Although, as can be seen previously, facial recognition can and is used as a very beneficial technology, there are also some things that you need to be aware of with its implementation of it. Here are some malicious things that can be done with the help of facial recognition:
-
Identity Fraud
If facial data gets compromised, it poses huge threats to governments as well as ordinary citizens. If the security measures employed with facial recognition technology are not stringent enough, hackers can easily spoof other peoples’ identities to carry out illegal activities.
This may result in huge financial losses if the data required for financial transactions get stolen or duplicated. Therefore, financial institutes employing facial recognition methods for providing financial services must ensure strict security measures to protect user data.
In the consumer electronics space, mobile companies employing facial recognition technologies in mobile devices aren’t foolproof. Apart from a few manufacturers, most facial recognition tools are nothing more than gimmicks.
These systems can be fooled easily, leading to compromise of user data. However, the instances of identity fraud are decreasing due to increasingly advanced security measures. Fooling a facial recognition system has become difficult, but it’s still not impossible.
-
Data Theft
Facial recognition software depends on and generates a large amount of data. Therefore, storage of data becomes a major concern with this technology. However, the prevention of data theft is a bigger concern regarding technology.
Database hacking can compromise the data of thousands if not millions of people. There have been numerous instances of data theft from publicly accessible databases. Data theft prevention should be a priority while implementing facial recognition technologies.
Once the user data is compromised, it's compromised forever. This poses a significant threat as the data can be misused for a long period of time if the issue is not resolved. Agreed, there are various dangers of facial recognition technology. However, these risks can be limited by the use of proper implementation of technology.
Safe storage of facial recognition data and ethical use will help eliminate the major concerns regarding the use of facial recognition technology. A healthy debate regarding the implementation of facial recognition technology by governments as well as private institutes is the need of the hour to find a suitable solution to the issues faced by the technology.
-
Unethical Use
One of the significant dangers of facial recognition is the unethical use of technology. Gathering facial data without consent is one thing. However, collecting information without the user even being aware raises a huge debate regarding the unethical use of the technology.
Hidden cameras are being employed at various places without the user being aware. As a result, such data can be exploited and can be used unethically, compromising the data of unaware citizens.
This violates an individual’s right to privacy and infringes his right to information. For example, a pizza restaurant in Norway was found to be using facial recognition technology with hidden cameras for delivering gendered advertising. Such instances can greatly harm the reputation of the firms carrying out such illegal activities.
Conclusion
Facial recognition can be a great feature to safeguard your devices. But when it’s used for all wrong reasons, it becomes alarming. Organizations must abstain from putting such practices in place which gather data without the knowledge of the concerned people.
Facial recognition technology can be deployed selectively too. For example, it can be used to identify illegal citizens and refugees or racial profiling. The deployment of controversial facial recognition technology poses concerns regarding human rights. Thus, human rights should be of prime importance while implementing facial recognition technology.
Do you value your privacy online?
Use VPN Surf and surf safely and securely in the open waters of the internet.