Technology has definitely performed a giant leap over the last few decades. We went from button phones that had two functions: call and text, to having small computers in our pockets that can perform nearly any task that a full desktop can. Furthermore, these smartphones contain nearly all personal information about us since they hold our messages, pictures, bank account details, locations, and much more. So if it goes in the wrong hands, you can not see what’s literally coming.
Fortunately, there are security measures in place that keep others from accessing this sensitive information.
Earlier, this was done by using passwords and pin codes but having to enter either of the aforementioned methods every time someone wants to unlock the phone is simply inconvenient for most users. That is why smartphone manufacturers started to explore different, faster ways one could unlock their devices.
So, biometric security on smartphones was born. From fingerprint sensors to facial recognition- everything changed the means of security measures. And, there is more to it. Stay glued to know.
What are biometrics?
To put it simply, biometrics are any metrics related to human features. They measure a person’s physical characteristics to verify their identity. Any time you are using your fingerprint or facial recognition to unlock your smartphone or laptop, you are using biometrics.
Undeniably there are many advantages to using biometric security on your devices. For example, a pin lock or a password can be cracked, while to fool a fingerprint scanner, someone would actually need to physically recreate your fingerprint, which is possible but very hard to do. Biometric authentication methods are also much faster than entering even a simple four-number pin.
Unfortunately, whenever there are advantages, there are also downsides. Although biometrics originally got popular by using fingerprints and iris scanners, there is a new method that certain smartphone and laptop manufacturers are pushing. It is facial recognition.
Despite being as secure as the previous methods, this biometric authentication approach carries a much more dangerous context.
What is facial recognition?
Facial recognition is a way for technology to recognize a human face. It does so in a similar fashion to another human being recognizing a face. People are good at recognizing familiar facial features:
- the eyes
- chin and how they all come together to form a face.
That’s basically how a facial recognition system works but on a much larger and algorithmic scale. There are a few different methods of how a facial recognition system works, but in general, they extract selected facial features from an image or video and compare this data to the information that is stored in the database.
How does facial recognition work?
Although when broken down to the basics, all facial recognition techniques use data from a face in an image to compare it to the data already contained in the database, there are different techniques in which this data can be obtained.
Each one has its own ups and downs and might require different hardware and software to execute.
There are five main methods of extracting data from a picture of a human face.
They are as follows:
1. Traditional Facial Recognition
As can be inferred from the name, this method uses a similar algorithm to that which was used back in the 1970s when the technology was just being developed. The facial recognition algorithm identifies different facial features by extracting landmarks from an image of a face.
It then compares the shapes of different facial structures such as the eye and nose shape and their relative position between one another. These images are then compared to other images in the database with matching features.
Although originally, the landmarks on the face were marked manually, nowadays, the computer recognizes these features on its own.
There are two main classifications of traditional facial recognition:
- Holistic: attempts to recognize the entire face
- Feature-based: divides the face into landmarks and compares their shape and spatial location with respect to each other.
2. 3 – Dimensional Recognition
Unfortunately, when referring to device security, traditional facial recognition can be fooled quite easily. All that is needed is a clear picture of your face, and your device is unlocked.
This is where 3-dimensional facial recognition comes into play. The three-dimensional face recognition technique uses 3D sensors to capture information about the shape of a face.
This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.
When used in device security, another advantage 3D face recognition has over the traditional method is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view.
Three-dimensional data points from a face vastly improve the precision of face recognition.
3D research is enhanced by the development of sophisticated sensors that do a better job of capturing 3D face imagery.
3. Skin Texture Analysis
Being a more recent development, this method of facial recognition is not fully developed to work 100% of the time on its own. Instead, it is usually combined with either of the aforementioned methods to improve their accuracy.
Skin texture analysis uses the visual details of the skin, as captured in standard digital or scanned images. This technique turns the unique lines, patterns, and spots apparent in a person's skin into a mathematical space.
Surface Texture Analysis works much the same way facial recognition does. A picture is taken of a patch to distinguish any lines, pores, and the actual skin texture. It can identify the contrast between identical pairs, which are not yet possible using facial recognition software alone.
4. Facial Recognition Combining Different Techniques
As every method has its advantages and disadvantages, technology companies have amalgamated traditional 3D recognition and Skin Textual Analysis to create recognition systems with higher success rates.
Combined techniques have an advantage over other systems. It is relatively insensitive to changes in expression, including blinking, frowning, or smiling, and has the ability to compensate for moustache or beard growth and the appearance of eyeglasses.
The system is also uniform with respect to race and gender.
5. Thermal Cameras
A different form of taking input data for face recognition is by using thermal cameras; by this procedure, the cameras will only detect the shape of the head, and it will ignore the subject accessories such as glasses, hats, or makeup.
Unlike conventional cameras, thermal cameras can capture facial imagery even in low-light and nighttime conditions without using a flash and exposing the camera's position. However, a problem with using thermal pictures for face recognition is that the databases for face recognition are limited.
Facial Recognition Applications
We have already discussed the use of facial recognition for the purposes of device security; however, facial recognition has many other applications as well.
Many published works mention numerous applications in which face recognition technology is already utilized, including entry to secured high‐risk spaces such as border crossings as well as access to restricted resources.
On the other hand, there are other application areas in which face recognition has not yet been used. The potential application areas of face recognition technology can be outlined as follows:
- Automated surveillance, where the objective is to recognize and track people.
- Monitoring closed-circuit television (CCTV), the facial recognition capability can be embedded into existing CCTV networks to look for lost children or other missing persons or tracking is known suspected criminals.
- Image database investigations, searching image databases of licensed drivers, benefit recipients, and finding people in large news photographs and video collections, as well as searching in the Facebook social networking website.
- Multimedia environments with adaptive human-computer interfaces (part of ubiquitous or context-aware systems, behaviour monitoring at childcare or centres for old people, recognizing customers, and assessing their needs).
- Airplane‐boarding gate. Face recognition may be used in places of random checks merely to screen passengers for further investigation.
- Similarly, in casinos, the strategic design of betting floors that incorporates cameras at face height with good lighting could be used not only to scan faces for identification purposes but possibly to afford the capture of images to build a comprehensive gallery for the future watch‐list, identification and authentication tasks.
- Sketch‐based face reconstruction, where law enforcement agencies in the world rely on practical methods to help crime witnesses reconstruct likenesses of faces. These methods range from sketch artistry to proprietary computerized composite systems.
There have been many applications for face recognition, but most commercial ones exploit only superficially the great potential of this technology. In addition, most of the applications are notably limited in their ability to handle pose, lighting changes, or ageing.
Note: Although face recognition surveillance systems have already begun, the technology seems to be not so accurate. It also brings additional problems concerning highly extensive perception in the data gathering and computing side of such complex solutions.
The Dangers Behind Facial Recognition
Although, as can be seen previously, facial recognition can and is used as a very beneficial technology, there are also some things that you need to be aware of with the implementation of it. Here are some malicious things that can be done with the help of facial recognition:
If facial data gets compromised, it poses huge threats to governments as well as ordinary citizens. If the security measures employed with facial recognition technology are not stringent enough, hackers can easily spoof other peoples’ identities to carry out illegal activities.
This may result in huge financial losses if the data required for financial transactions get stolen or duplicated. Therefore, financial institutes employing facial recognition methods for providing financial services must ensure strict security measures to protect user data.
In the consumer electronics space, mobile companies employing facial recognition technologies in mobile devices aren’t foolproof. Apart from a few manufacturers, most facial recognition tools are nothing more than gimmicks.
These systems can be fooled easily, leading to compromise of user data. However, the instances of identity fraud are decreasing due to increasingly advanced security measures. Fooling a facial recognition system has become difficult, but it’s still not impossible.
Facial recognition software depends on and generates a large amount of data. Therefore, storage of data becomes a major concern with this technology. However, the prevention of data theft is a bigger concern regarding technology.
Database hacking can compromise the data of thousands, if not millions of people. There have been numerous instances of data theft from publicly accessible databases. Prevention of data theft should be one of the priorities while implementing facial recognition technologies.
Once the user data is compromised, it's compromised forever. This poses a significant threat as the data can be misused for a long period of time if the issue is not resolved. Agreed, there are various dangers of facial recognition technology. However, these risks can be limited by the use of proper implementation of technology.
Safe storage of facial recognition data and ethical use will help eliminate the major concerns regarding the use of facial recognition technology. A healthy debate regarding the implementation of facial recognition technology by governments as well as private institutes is the need of the hour to find a suitable solution to the issues faced by the technology.
One of the significant dangers of facial recognition is the unethical use of technology. Gathering facial data without consent is one thing. However, collecting information without the user even being aware raises a huge debate regarding the unethical use of the technology.
Hidden cameras are being employed at various places without the user being aware. As a result, such data can be exploited and can be used unethically, compromising the data of unaware citizens.
This not only violates an individual’s right to privacy but also infringes his right to information. For example, a pizza restaurant in Norway was found to be using facial recognition technology with hidden cameras for delivering gendered advertising. Such instances can greatly harm the reputation of the firms carrying out such illegal activities.
Facial recognition can be a great feature to safeguard your devices. But when it’s used for all wrong reasons, it becomes alarming. Organizations must abstain from putting such practices in place which gather data without the knowledge of the concerned people.
Facial recognition technology can be deployed selectively too. For example, it can be used to identify illegal citizens and refugees or racial profiling. The deployment of controversial facial recognition technology poses concerns regarding human rights. Thus, human rights should be of prime importance while implementing facial recognition technology.
Do you value your privacy online?
Use VPN Surf and surf safely and securely in the open waters of the internet.