Facial recognition systems
   HOME

TheInfoList



OR:

A facial recognition system is a technology capable of matching a
human face The face is the front of an animal's head that features the eyes, nose and mouth, and through which animals express many of their emotions. The face is crucial for human identity, and damage such as scarring or developmental deformities may aff ...
from a digital image or a
video frame In filmmaking, video production, animation, and related fields, a frame is one of the many '' still images'' which compose the complete '' moving picture''. The term is derived from the historical development of film stock, in which the sequenti ...
against a
database In computing, a database is an organized collection of data stored and accessed electronically. Small databases can be stored on a file system, while large databases are hosted on computer clusters or cloud storage. The design of databases s ...
of faces. Such a system is typically employed to
authenticate Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
users through
ID verification service An identity verification service is used by businesses to ensure that users or customers provide information that is associated with the identity of a real person. The service may verify the authenticity of physical identity documents such as a driv ...
s, and works by pinpointing and measuring facial features from a given image. Development began on similar systems in the 1960s, beginning as a form of computer application. Since their inception, facial recognition systems have seen wider uses in recent times on
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
s and in other forms of technology, such as
robotics Robotics is an interdisciplinary branch of computer science and engineering. Robotics involves design, construction, operation, and use of robots. The goal of robotics is to design machines that can help and assist humans. Robotics integrate ...
. Because computerized facial recognition involves the measurement of a human's physiological characteristics, facial recognition systems are categorized as
biometrics Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify i ...
. Although the accuracy of facial recognition systems as a biometric technology is lower than
iris recognition Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can ...
and
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
recognition, it is widely adopted due to its contactless process. Facial recognition systems have been deployed in advanced
human–computer interaction Human–computer interaction (HCI) is research in the design and the use of computer technology, which focuses on the interfaces between people (users) and computers. HCI researchers observe the ways humans interact with computers and design te ...
,
video surveillance Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly tr ...
and automatic indexing of images. Facial recognition systems are employed throughout the world today by governments and private companies. Their effectiveness varies, and some systems have previously been scrapped because of their ineffectiveness. The use of facial recognition systems has also raised controversy, with claims that the systems violate citizens' privacy, commonly make incorrect identifications, encourage
gender norms A gender role, also known as a sex role, is a social role encompassing a range of behaviors and attitudes that are generally considered acceptable, appropriate, or desirable for a person based on that person's sex. Gender roles are usually cent ...
and
racial profiling Racial profiling or ethnic profiling is the act of suspecting, targeting or discriminating against a person on the basis of their ethnicity, religion or nationality, rather than on individual suspicion or available evidence. Racial profiling involv ...
, and do not protect important biometric data. The appearance of
synthetic media Synthetic media (also known as AI-generated media, generative AI, personalized media, and colloquially as deepfakes) is a catch-all term for the artificial production, manipulation, and modification of data and media by automated means, especiall ...
such as
deepfakes Deepfakes (a portmanteau of "deep learning" and "fake") are synthetic media in which a person in an existing image or video is replaced with someone else's likeness. While the act of creating fake content is not new, deepfakes leverage powerful ...
has also raised concerns about its security. These claims have led to the ban of facial recognition systems in several cities in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
. As a result of growing societal concerns, Meta announced that it plans to shut down Facebook facial recognition system, deleting the face scan data of more than one billion users. This change will represent one of the largest shifts in facial recognition usage in the technology's history.


History of facial recognition technology

Automated facial recognition was pioneered in the 1960s.
Woody Bledsoe Woodrow Wilson "Woody" Bledsoe (November 12, 1921 – October 4, 1995) was an American mathematician, computer scientist, and prominent educator. He is one of the founders of artificial intelligence (AI), making early contributions in pattern r ...
,
Helen Chan Wolf Helen Chan Wolf is an artificial intelligence pioneer who worked on facial recognition technology and Shakey the robot, the world's first autonomous robot, at SRI International. Career In the early 1960s Wolf worked with Charles Bisson and W ...
, and Charles Bisson worked on using the computer to recognize human faces. Their early facial recognition project was dubbed "man-machine" because the coordinates of the facial features in a photograph had to be established by a human before they could be used by the computer for recognition. On a
graphics tablet A graphics tablet (also known as a digitizer, digital graphic tablet, pen tablet, drawing tablet, external drawing pad or digital art board) is a computer input device that enables a user to hand-draw images, animations and graphics, with a spec ...
a human had to pinpoint the coordinates of facial features such as the pupil centers, the inside and outside corner of eyes, and the
widows peak A widow's peak is a V-shaped point in the hairline in the center of the forehead. Hair growth on the forehead is suppressed in a bilateral pair of periorbital fields. Without a widow's peak, these fields join in the middle of the forehead so as ...
in the hairline. The coordinates were used to calculate 20 distances, including the width of the mouth and of the eyes. A human could process about 40 pictures an hour in this manner and so build a database of the computed distances. A computer would then automatically compare the distances for each photograph, calculate the difference between the distances and return the closed records as a possible match. In 1970,
Takeo Kanade is a Japanese computer scientist and one of the world's foremost researchers in computer vision. He is U.A. and Helen Whitaker Professor at Carnegie Mellon University. He has approximately 300 peer-reviewed academic publications and holds aroun ...
publicly demonstrated a face-matching system that located anatomical features such as the chin and calculated the distance ratio between facial features without human intervention. Later tests revealed that the system could not always reliably identify facial features. Nonetheless, interest in the subject grew and in 1977 Kanade published the first detailed book on facial recognition technology. In 1993, the
Defense Advanced Research Project Agency The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Ad ...
(DARPA) and the
Army Research Laboratory The U.S. Army Combat Capabilities Development Command Army Research Laboratory (DEVCOM ARL) is the U.S. Army's foundational research laboratory. ARL is headquartered at the Adelphi Laboratory Center (ALC) in Adelphi, Maryland. Its largest sing ...
(ARL) established the face recognition technology program FERET to develop "automatic face recognition capabilities" that could be employed in a productive real life environment "to assist security, intelligence, and law enforcement personnel in the performance of their duties." Face recognition systems that had been trialed in research labs were evaluated and the FERET tests found that while the performance of existing automated facial recognition systems varied, a handful of existing methods could viably be used to recognize faces in still images taken in a controlled environment. The FERET tests spawned three US companies that sold automated facial recognition systems. Vision Corporation and Miros Inc were both founded in 1994, by researchers who used the results of the FERET tests as a selling point. Viisage Technology was established by a
identification card An identity document (also called ID or colloquially as papers) is any document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card (IC, ID card, citizen ca ...
defense contractor in 1996 to commercially exploit the rights to the facial recognition algorithm developed by
Alex Pentland Alex Paul "Sandy" Pentland (born 1951) is an American computer scientist, the Toshiba Professor at Massachusetts Institute of Technology, MIT, and serial entrepreneur. Education Pentland received his bachelor's degree from the University of M ...
at
MIT The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the m ...
. Following the 1993 FERET face-recognition vendor test the Department of Motor Vehicles (DMV) offices in
West Virginia West Virginia is a state in the Appalachian, Mid-Atlantic and Southeastern regions of the United States.The Census Bureau and the Association of American Geographers classify West Virginia as part of the Southern United States while the B ...
and
New Mexico ) , population_demonym = New Mexican ( es, Neomexicano, Neomejicano, Nuevo Mexicano) , seat = Santa Fe , LargestCity = Albuquerque , LargestMetro = Tiguex , OfficialLang = None , Languages = English, Spanish ( New Mexican), Navajo, Ke ...
were the first DMV offices to use automated facial recognition systems as a way to prevent and detect people obtaining multiple driving licenses under different names.
Driver's licenses in the United States In the United States, driver's licenses are issued by each individual state, territory, and the District of Columbia rather than by the federal government due to federalism. Drivers are normally required to obtain a license from their state of r ...
were at that point a commonly accepted form of
photo identification Photo identification or photo ID is an identity document that includes a photograph of the holder, usually only their face. The most commonly accepted forms of photo ID are those issued by government authorities, such as driver's licenses, ide ...
. DMV offices across the United States were undergoing a technological upgrade and were in the process of establishing databases of digital ID photographs. This enabled DMV offices to deploy the facial recognition systems on the market to search photographs for new driving licenses against the existing DMV database. DMV offices became one of the first major markets for automated facial recognition technology and introduced US citizens to facial recognition as a standard method of identification. The increase of the US prison population in the 1990s prompted U.S. states to established connected and automated identification systems that incorporated digital
biometric Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify in ...
databases, in some instances this included facial recognition. In 1999,
Minnesota Minnesota () is a state in the upper midwestern region of the United States. It is the 12th largest U.S. state in area and the 22nd most populous, with over 5.75 million residents. Minnesota is home to western prairies, now given over to ...
incorporated the facial recognition system FaceIT by Visionics into a
mug shot A mug shot or mugshot (an informal term for police photograph or booking photograph) is a photographic portrait of a person from the shoulders up, typically taken after a person is arrested. The original purpose of the mug shot was to allow law ...
booking system that allowed police, judges and court officers to track criminals across the state. Until the 1990s, facial recognition systems were developed primarily by using
photographic portrait Portrait photography, or portraiture, is a type of photography aimed toward capturing the personality of a person or group of people by using effective lighting, backdrops, and poses. A portrait photograph may be artistic or clinical. Frequentl ...
s of human faces. Research on face recognition to reliably locate a face in an image that contains other objects gained traction in the early 1990s with the
principle component analysis Principal component analysis (PCA) is a popular technique for analyzing large datasets containing a high number of dimensions/features per observation, increasing the interpretability of data while preserving the maximum amount of information, and ...
(PCA). The PCA method of face detection is also known as
Eigenface An eigenface () is the name given to a set of eigenvectors when used in the computer vision problem of human face recognition. The approach of using eigenfaces for recognition was developed by Sirovich and Kirby and used by Matthew Turk and Ale ...
and was developed by Matthew Turk and Alex Pentland. Turk and Pentland combined the conceptual approach of the Karhunen–Loève theorem and
factor analysis Factor analysis is a statistical method used to describe variability among observed, correlated variables in terms of a potentially lower number of unobserved variables called factors. For example, it is possible that variations in six observed ...
, to develop a
linear model In statistics, the term linear model is used in different ways according to the context. The most common occurrence is in connection with regression models and the term is often taken as synonymous with linear regression model. However, the term ...
. Eigenfaces are determined based on global and orthogonal features in human faces. A human face is calculated as a weighted combination of a number of Eigenfaces. Because few Eigenfaces were used to encode human faces of a given population, Turk and Pentland's PCA face detection method greatly reduced the amount of data that had to be processed to detect a face. Pentland in 1994 defined Eigenface features, including eigen eyes, eigen mouths and eigen noses, to advance the use of PCA in facial recognition. In 1997, the PCA Eigenface method of face recognition was improved upon using linear discriminant analysis (LDA) to produce Fisherfaces. LDA Fisherfaces became dominantly used in PCA feature based face recognition. While Eigenfaces were also used for face reconstruction. In these approaches no global structure of the face is calculated which links the facial features or parts. Purely feature based approaches to facial recognition were overtaken in the late 1990s by the Bochum system, which used Gabor filter to record the face features and computed a
grid Grid, The Grid, or GRID may refer to: Common usage * Cattle grid or stock grid, a type of obstacle is used to prevent livestock from crossing the road * Grid reference, used to define a location on a map Arts, entertainment, and media * News ...
of the face structure to link the features. Christoph von der Malsburg and his research team at the
University of Bochum The Ruhr University Bochum (, ) is a public research university located in the southern hills of the central Ruhr area, Bochum, Germany. It was founded in 1962 as the first new public university in Germany after World War II. Instruction began in ...
developed Elastic Bunch Graph Matching in the mid-1990s to extract a face out of an image using skin segmentation. By 1997, the face detection method developed by Malsburg outperformed most other facial detection systems on the market. The so-called "Bochum system" of face detection was sold commercially on the market as ZN-Face to operators of airports and other busy locations. The software was "robust enough to make identifications from less-than-perfect face views. It can also often see through such impediments to identification as mustaches, beards, changed hairstyles and glasses—even sunglasses". Real-time face detection in video footage became possible in 2001 with the
Viola–Jones object detection framework The Viola–Jones object detection framework is a machine learning object detection framework proposed in 2001 by Paul Viola and Michael Jones. It was motivated primarily by the problem of face detection, although it can be adapted to the detecti ...
for faces.
Paul Viola Paul Viola is a computer vision researcher, and Distinguished Engineer at Microsoft. He is a former MIT professor, and a former vice president of science for Amazon Air. He is best known for his seminal work in facial recognition and machine ...
and Michael Jones combined their face detection method with the Haar-like feature approach to object recognition in digital images to launch
AdaBoost AdaBoost, short for ''Adaptive Boosting'', is a statistical classification meta-algorithm formulated by Yoav Freund and Robert Schapire in 1995, who won the 2003 Gödel Prize for their work. It can be used in conjunction with many other types of ...
, the first real-time frontal-view face detector. By 2015, the Viola–Jones algorithm had been implemented using small low power
detectors A sensor is a device that produces an output signal for the purpose of sensing a physical phenomenon. In the broadest definition, a sensor is a device, module, machine, or subsystem that detects events or changes in its environment and sends ...
on
handheld devices A mobile device (or handheld computer) is a computer small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physical ...
and
embedded systems An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system. It is ''embedded'' ...
. Therefore, the Viola–Jones algorithm has not only broadened the practical application of face recognition systems but has also been used to support new features in
user interfaces In the industrial design field of human–computer interaction, a user interface (UI) is the space where interactions between humans and machines occur. The goal of this interaction is to allow effective operation and control of the machine fr ...
and
teleconferencing A teleconference is the live exchange of information among several people remote from one another but linked by a telecommunications system. Terms such as audio conferencing, telephone conferencing and phone conferencing are also sometimes used t ...
. Ukraine is using the US-based
Clearview AI Clearview AI is an American facial recognition company, providing software to companies, law enforcement, universities, and individuals. The company's algorithm matches faces to a database of more than 20 billion images indexed from the Interne ...
facial recognition software to identify dead Russian soldiers. Ukraine has conducted 8,600 searches and identified the families of 582 deceased Russian soldiers. The IT volunteer section of the Ukrainian army using the software is subsequently contacting the families of the deceased soldiers to raise awareness of Russian activities in Ukraine. The main goal is to destabilise the Russian government. It can be seen as a form of
psychological warfare Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and M ...
. About 340 Ukrainian government officials in five government ministries are using the technology. It is used to catch spies that might try to enter Ukraine. Clearview AI's facial recognition database is only available to government agencies who may only use the technology to assist in the course of law enforcement investigations or in connection with national security. The software was donated to Ukraine by Clearview AI. Russia is thought to be using it to find anti-war activists. Clearview AI was originally designed for US law enforcement. Using it in war raises new ethical concerns. One London based surveillance expert, Stephen Hare, is concerned it might make the Ukrainians appear inhuman: "Is it actually working? Or is it making ussianssay: 'Look at these lawless, cruel Ukrainians, doing this to our boys'?"


Techniques for face recognition

While humans can recognize faces without much effort, facial recognition is a challenging
pattern recognition Pattern recognition is the automated recognition of patterns and regularities in data. It has applications in statistical data analysis, signal processing, image analysis, information retrieval, bioinformatics, data compression, computer graphics ...
problem in
computing Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, ...
. Facial recognition systems attempt to identify a human face, which is three-dimensional and changes in appearance with lighting and facial expression, based on its two-dimensional image. To accomplish this computational task, facial recognition systems perform four steps. First
face detection Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. Face detection also refers to the psychological process by which humans locate and attend to faces in a visual scene. ...
is used to segment the face from the image background. In the second step the segmented face image is aligned to account for face pose, image size and photographic properties, such as illumination and
grayscale In digital photography, computer-generated imagery, and colorimetry, a grayscale image is one in which the value of each pixel is a single sample representing only an ''amount'' of light; that is, it carries only intensity information. Graysc ...
. The purpose of the alignment process is to enable the accurate localization of facial features in the third step, the facial feature extraction. Features such as eyes, nose and mouth are pinpointed and measured in the image to represent the face. The so established
feature vector In machine learning and pattern recognition, a feature is an individual measurable property or characteristic of a phenomenon. Choosing informative, discriminating and independent features is a crucial element of effective algorithms in pattern r ...
of the face is then, in the fourth step, matched against a database of faces.


Traditional

Some face recognition
algorithms In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...
identify facial features by extracting landmarks, or features, from an image of the subject's face. For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for other images with matching features. Other algorithms normalize a gallery of face images and then compress the face data, only saving the data in the image that is useful for face recognition. A probe image is then compared with the face data. One of the earliest successful systems is based on template matching techniques applied to a set of salient facial features, providing a sort of compressed face representation. Recognition algorithms can be divided into two main approaches: geometric, which looks at distinguishing features, or photo-metric, which is a statistical approach that distills an image into values and compares the values with templates to eliminate variances. Some classify these algorithms into two broad categories: holistic and feature-based models. The former attempts to recognize the face in its entirety while the feature-based subdivide into components such as according to features and analyze each as well as its spatial location with respect to other features. Popular recognition algorithms include principal component analysis using
eigenface An eigenface () is the name given to a set of eigenvectors when used in the computer vision problem of human face recognition. The approach of using eigenfaces for recognition was developed by Sirovich and Kirby and used by Matthew Turk and Ale ...
s, linear discriminant analysis, elastic bunch graph matching using the Fisherface algorithm, the
hidden Markov model A hidden Markov model (HMM) is a statistical Markov model in which the system being modeled is assumed to be a Markov process — call it X — with unobservable ("''hidden''") states. As part of the definition, HMM requires that there be an o ...
, the
multilinear subspace learning Multilinear subspace learning is an approach to dimensionality reduction.M. A. O. Vasilescu, D. Terzopoulos (2003"Multilinear Subspace Analysis of Image Ensembles" "Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVP ...
using
tensor In mathematics, a tensor is an algebraic object that describes a multilinear relationship between sets of algebraic objects related to a vector space. Tensors may map between different objects such as vectors, scalars, and even other tensor ...
representation, and the neuronal motivated dynamic link matching. Modern facial recognition systems make increasing use of machine learning techniques such as deep learning.


Human identification at a distance (HID)

To enable human identification at a distance (HID) low-resolution images of faces are enhanced using face hallucination. In CCTV imagery faces are often very small. But because facial recognition algorithms that identify and plot facial features require high resolution images, resolution enhancement techniques have been developed to enable facial recognition systems to work with imagery that has been captured in environments with a high signal-to-noise ratio. Face hallucination algorithms that are applied to images prior to those images being submitted to the facial recognition system use example-based machine learning with pixel substitution or nearest neighbour distribution indexes that may also incorporate demographic and age related facial characteristics. Use of face hallucination techniques improves the performance of high resolution facial recognition algorithms and may be used to overcome the inherent limitations of super-resolution algorithms. Face hallucination techniques are also used to pre-treat imagery where faces are disguised. Here the disguise, such as sunglasses, is removed and the face hallucination algorithm is applied to the image. Such face hallucination algorithms need to be trained on similar face images with and without disguise. To fill in the area uncovered by removing the disguise, face hallucination algorithms need to correctly map the entire state of the face, which may be not possible due to the momentary facial expression captured in the low resolution image.


3-dimensional recognition

Three-dimensional face recognition Three-dimensional face recognition (3D face recognition) is a modality of facial recognition methods in which the three-dimensional geometry of the human face is used. It has been shown that 3D face recognition methods can achieve significantly h ...
technique uses 3D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin. One advantage of 3D face recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view. Three-dimensional data points from a face vastly improve the precision of face recognition. 3D-dimensional face recognition research is enabled by the development of sophisticated sensors that project structured light onto the face. 3D matching technique are sensitive to expressions, therefore researchers at Technion applied tools from
metric geometry In mathematics, a metric space is a set together with a notion of ''distance'' between its elements, usually called points. The distance is measured by a function called a metric or distance function. Metric spaces are the most general settin ...
to treat expressions as
isometries In mathematics, an isometry (or congruence, or congruent transformation) is a distance-preserving transformation between metric spaces, usually assumed to be bijective. The word isometry is derived from the Ancient Greek: ἴσος ''isos'' mea ...
. A new method of capturing 3D images of faces uses three tracking cameras that point at different angles; one camera will be pointing at the front of the subject, second one to the side, and third one at an angle. All these cameras will work together so it can track a subject's face in real-time and be able to face detect and recognize.


Thermal cameras

A different form of taking input data for face recognition is by using thermal cameras, by this procedure the cameras will only detect the shape of the head and it will ignore the subject accessories such as glasses, hats, or makeup. Unlike conventional cameras, thermal cameras can capture facial imagery even in low-light and nighttime conditions without using a flash and exposing the position of the camera. However, the databases for face recognition are limited. Efforts to build databases of thermal face images date back to 2004. By 2016, several databases existed, including the IIITD-PSE and the Notre Dame thermal face database. Current thermal face recognition systems are not able to reliably detect a face in a thermal image that has been taken of an outdoor environment. In 2018, researchers from the U.S. Army Research Laboratory (ARL) developed a technique that would allow them to match facial imagery obtained using a thermal camera with those in databases that were captured using a conventional camera. Known as a cross-spectrum synthesis method due to how it bridges facial recognition from two different imaging modalities, this method synthesize a single image by analyzing multiple facial regions and details. It consists of a non-linear regression model that maps a specific thermal image into a corresponding visible facial image and an optimization issue that projects the latent projection back into the image space. ARL scientists have noted that the approach works by combining global information (i.e. features across the entire face) with local information (i.e. features regarding the eyes, nose, and mouth). According to performance tests conducted at ARL, the multi-region cross-spectrum synthesis model demonstrated a performance improvement of about 30% over baseline methods and about 5% over state-of-the-art methods.


Application


Social media

Founded in 2013, Looksery went on to raise money for its face modification app on Kickstarter. After successful crowdfunding, Looksery launched in October 2014. The application allows video chat with others through a special filter for faces that modifies the look of users. Image augmenting applications already on the market, such as
Facetune Facetune is a photo editing application used to edit, enhance, and retouch photos on a user's iOS or Android device created by Lightricks. The app is often used for portrait and selfie editing. The app implements a number of beauty filters ...
and Perfect365, were limited to static images, whereas Looksery allowed augmented reality to live videos. In late 2015 SnapChat purchased Looksery, which would then become its landmark lenses function. Snapchat filter applications use face detection technology and on the basis of the facial features identified in an image a 3D mesh mask is layered over the face.
DeepFace DeepFace is a deep learning facial recognition system created by a research group at Facebook. It identifies human faces in digital images. The program employs a nine-layer neural network with over 120 million connection weights and was trained o ...
is a deep learning facial recognition system created by a research group at
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Mosk ...
. It identifies human faces in digital images. It employs a nine-layer
neural net Artificial neural networks (ANNs), usually simply called neural networks (NNs) or neural nets, are computing systems inspired by the biological neural networks that constitute animal brains. An ANN is based on a collection of connected units ...
with over 120 million connection weights, and was trained on four million images uploaded by Facebook users. The system is said to be 97% accurate, compared to 85% for the FBI's
Next Generation Identification Next Generation Identification (NGI) is a project of the Federal Bureau of Investigation (FBI). The project's goal is to expand the capabilities of the Integrated Automated Fingerprint Identification System (IAFIS), which is currently used by law e ...
system.
TikTok TikTok, known in China as Douyin (), is a short-form video hosting service owned by the Chinese company ByteDance. It hosts user-submitted videos, which can range in duration from 15 seconds to 10 minutes. TikTok is an international version o ...
's algorithm has been regarded as especially effective, but many were left to wonder at the exact programming that caused the app to be so effective in guessing the user's desired content. In June 2020, TikTok released a statement regarding the "For You" page, and how they recommended videos to users, which did not include facial recognition. In February 2021, however, TikTok agreed to a $92 million settlement to a US lawsuit which alleged that the app had used facial recognition in both user videos and its algorithm to identify age, gender and ethnicity.


ID verification

The emerging use of facial recognition is in the use of
ID verification service An identity verification service is used by businesses to ensure that users or customers provide information that is associated with the identity of a real person. The service may verify the authenticity of physical identity documents such as a driv ...
s. Many companies and others are working in the market now to provide these services to banks, ICOs, and other e-businesses. Face recognition has been leveraged as a form of biometric
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
for various computing platforms and devices; Android 4.0 "Ice Cream Sandwich" added facial recognition using a
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
's front camera as a means of unlocking devices, while
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washin ...
introduced face recognition login to its
Xbox 360 The Xbox 360 is a home video game console developed by Microsoft. As the successor to the original Xbox, it is the second console in the Xbox series. It competed with Sony's PlayStation 3 and Nintendo's Wii as part of the seventh generati ...
video game console through its Kinect accessory, as well as
Windows 10 Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on J ...
via its "Windows Hello" platform (which requires an infrared-illuminated camera). In 2017, Apple's
iPhone X The iPhone X (Roman numeral "X" pronounced "ten", also known as iPhone 10) is a smartphone designed, developed and marketed by Apple Inc. It is part of the 11th generation of the iPhone. Available for pre-order from October 27, 2017, it was re ...
smartphone introduced facial recognition to the product line with its "
Face ID Face ID is a facial recognition system designed and developed by Apple Inc. for the iPhone and iPad Pro. The system allows biometric authentication for unlocking a device, making payments, accessing sensitive data, providing detailed facial ex ...
" platform, which uses an infrared illumination system.


Face ID

Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, where its wild ancestor, ' ...
introduced
Face ID Face ID is a facial recognition system designed and developed by Apple Inc. for the iPhone and iPad Pro. The system allows biometric authentication for unlocking a device, making payments, accessing sensitive data, providing detailed facial ex ...
on the flagship iPhone X as a biometric authentication successor to the
Touch ID Touch ID is an electronic fingerprint recognition feature designed and released by Apple Inc. that allows users to unlock devices, make purchases in the various Apple digital media stores (iTunes Store, App Store, and Apple Books Store), and au ...
, a
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
based system. Face ID has a facial recognition sensor that consists of two parts: a "Romeo" module that projects more than 30,000 infrared dots onto the user's face, and a "Juliet" module that reads the pattern. The pattern is sent to a local "Secure Enclave" in the device's
central processing unit A central processing unit (CPU), also called a central processor, main processor or just Processor (computing), processor, is the electronic circuitry that executes Instruction (computing), instructions comprising a computer program. The CPU per ...
(CPU) to confirm a match with the phone owner's face. The facial pattern is not accessible by Apple. The system will not work with eyes closed, in an effort to prevent unauthorized access. The technology learns from changes in a user's appearance, and therefore works with hats, scarves, glasses, and many sunglasses, beard and makeup. It also works in the dark. This is done by using a "Flood Illuminator", which is a dedicated
infrared Infrared (IR), sometimes called infrared light, is electromagnetic radiation (EMR) with wavelengths longer than those of visible light. It is therefore invisible to the human eye. IR is generally understood to encompass wavelengths from around ...
flash that throws out invisible infrared light onto the user's face to properly read the 30,000 facial points.


Healthcare

Facial recognition algorithms can help in diagnosing some diseases using specific features on the nose, cheeks and other part of the
human face The face is the front of an animal's head that features the eyes, nose and mouth, and through which animals express many of their emotions. The face is crucial for human identity, and damage such as scarring or developmental deformities may aff ...
. Relying on developed data sets, machine learning has been used to identify genetic abnormalities just based on facial dimensions. FRT has also been used to verify patients before surgery procedures. In March, 2022 according to a publication by Forbes, FDNA, an AI development company claimed that in the space of 10 years, they have worked with geneticists to develop a database of about 5,000 diseases and 1500 of them can be detected with facial recognition algorithms.


Deployment of FRT for availing government services


India

In an interview, the National Health Authority chief Dr. R.S. Sharma said that facial recognition technology would be used in conjunction with
Aadhaar Aadhaar ( hi, आधार, ādhār, lit=base, foundation, bn, আধার) is a 12-digit unique identity number that can be obtained voluntarily by the citizens of India and resident foreign nationals who have spent over 182 days in twelve ...
to authenticate the identity of people seeking vaccines. Ten human rights and digital rights organizations and more than 150 individuals signed a statement by the
Internet Freedom Foundation Internet Freedom Foundation (IFF) is an Indian non-governmental organisation that conducts advocacy on digital rights and liberties, based in New Delhi. IFF files petitions and undertakes advocacy campaigns to defend online freedom, privacy, net ...
that raised alarm against the deployment of facial recognition technology in the central government's vaccination drive process. Implementation of an error-prone system without adequate legislation containing mandatory safeguards, would deprive citizens of essential services and linking this untested technology to the vaccination roll-out in India will only exclude persons from the vaccine delivery system. In July, 2021, a press release by the Government of Meghalaya stated that facial recognition technology (FRT) would be used to verify the identity of pensioners to issue a Digital Life Certificate using “Pensioner’s Life Certification Verification” mobile application. The notice, according to the press release, purports to offer pensioners “a secure, easy and hassle-free interface for verifying their liveness to the Pension Disbursing Authorities from the comfort of their homes using smart phones”. Mr. Jade Jeremiah Lyngdoh, a law student, sent a legal notice to the relevant authorities highlighting that “The application has been rolled out without any anchoring legislation which governs the processing of personal data and thus, lacks lawfulness and the Government is not empowered to process data.”


Deployment in security services


Commonwealth

The
Australian Border Force The Australian Border Force (ABF) is a federal law enforcement agency, part of the Department of Home Affairs, responsible for offshore and onshore border control enforcement, investigations, compliance and detention operations in Australia. Thr ...
and
New Zealand Customs Service The New Zealand Customs Service (Customs, Māori: ''Te Mana Ārai o Aotearoa'') is a state sector organisation in New Zealand whose role is to provide border control and protect the community from potential risks arising from international tra ...
have set up an automated border processing system called
SmartGate SmartGate (eGate in New Zealand) is an automated self-service border control system operated by the Australian Border Force and New Zealand Customs Service and located at immigration checkpoints in departure and arrival halls in ten Australian in ...
that uses face recognition, which compares the face of the traveller with the data in the
e-passport A biometric passport (also known as an e-passport or a digital passport) is a traditional passport that has an embedded electronic microprocessor chip which contains biometric information that can be used to authenticate the identity of the p ...
microchip. All Canadian international airports use facial recognition as part of the Primary Inspection Kiosk program that compares a traveler face to their photo stored on the
ePassport A biometric passport (also known as an e-passport or a digital passport) is a traditional passport that has an embedded electronic microprocessor chip which contains biometric information that can be used to authenticate the identity of the pas ...
. This program first came to
Vancouver International Airport Vancouver International Airport is an international airport located on Sea Island in Richmond, British Columbia, serving the city of Vancouver and the Lower Mainland region. It is located from Downtown Vancouver. It is the second busie ...
in early 2017 and was rolled up to all remaining international airports in 2018–2019. Police forces in the United Kingdom have been trialing live facial recognition technology at public events since 2015. In May 2017, a man was arrested using an automatic facial recognition (AFR) system mounted on a van operated by the South Wales Police. Ars Technica reported that "this appears to be the first time FRhas led to an arrest". However, a 2018 report by Big Brother Watch found that these systems were up to 98% inaccurate. The report also revealed that two UK police forces,
South Wales Police South Wales Police ( cy, Heddlu De Cymru) is one of the four territorial police forces in Wales. It is headquartered in Bridgend. The force was formed as South Wales Constabulary on 1 June 1969, by the amalgamation of the former Glamorgan Cons ...
and the Metropolitan Police, were using live facial recognition at public events and in public spaces. In September 2019, South Wales Police use of facial recognition was ruled lawful. Live facial recognition has been trialled since 2016 in the streets of London and will be used on a regular basis from Metropolitan Police from beginning of 2020. In August 2020 the Court of Appeal ruled that the way the facial recognition system had been used by the South Wales Police in 2017 and 2018 violated human rights.


United States

The
U.S. Department of State The United States Department of State (DOS), or State Department, is an executive department of the U.S. federal government responsible for the country's foreign policy and relations. Equivalent to the ministry of foreign affairs of other ...
operates one of the largest face recognition systems in the world with a database of 117 million American adults, with photos typically drawn from driver's license photos. Although it is still far from completion, it is being put to use in certain cities to give clues as to who was in the photo. The FBI uses the photos as an investigative tool, not for positive identification. As of 2016, facial recognition was being used to identify people in photos taken by police in
San Diego San Diego ( , ; ) is a city on the Pacific Ocean coast of Southern California located immediately adjacent to the Mexico–United States border. With a 2020 population of 1,386,932, it is the eighth most populous city in the United State ...
and Los Angeles (not on real-time video, and only against booking photos) and use was planned in
West Virginia West Virginia is a state in the Appalachian, Mid-Atlantic and Southeastern regions of the United States.The Census Bureau and the Association of American Geographers classify West Virginia as part of the Southern United States while the B ...
and
Dallas Dallas () is the List of municipalities in Texas, third largest city in Texas and the largest city in the Dallas–Fort Worth metroplex, the List of metropolitan statistical areas, fourth-largest metropolitan area in the United States at 7.5 ...
. In recent years Maryland has used face recognition by comparing people's faces to their driver's license photos. The system drew controversy when it was used in Baltimore to arrest unruly protesters after the
death of Freddie Gray On April 12, 2015, Freddie Carlos Gray Jr., a 25-year-old African American, was arrested by the Baltimore Police Department over his legal possession of a knife. While being transported in a police van, Gray sustained injuries and was taken to ...
in police custody. Many other states are using or developing a similar system however some states have laws prohibiting its use. The
FBI The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
has also instituted its
Next Generation Identification Next Generation Identification (NGI) is a project of the Federal Bureau of Investigation (FBI). The project's goal is to expand the capabilities of the Integrated Automated Fingerprint Identification System (IAFIS), which is currently used by law e ...
program to include face recognition, as well as more traditional biometrics like
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
s and iris scans, which can pull from both criminal and civil databases. The federal General Accountability Office criticized the FBI for not addressing various concerns related to privacy and accuracy. Starting in 2018,
U.S. Customs and Border Protection United States Customs and Border Protection (CBP) is the largest federal law enforcement agency of the United States Department of Homeland Security. It is the country's primary border control organization, charged with regulating and facilit ...
deployed "biometric face scanners" at U.S. airports. Passengers taking outbound international flights can complete the check-in, security and the boarding process after getting facial images captured and verified by matching their ID photos stored on CBP's database. Images captured for travelers with U.S. citizenship will be deleted within up to 12-hours.
Transportation Security Administration The Transportation Security Administration (TSA) is an agency of the United States Department of Homeland Security (DHS) that has authority over the security of transportation systems within, and connecting to the United States. It was created ...
(TSA) had expressed its intention to adopt a similar program for domestic air travel during the security check process in the future. The
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
is one of the organizations against the program, concerning that the program will be used for surveillance purposes. In 2019, researchers reported that
Immigration and Customs Enforcement The U.S. Immigration and Customs Enforcement (ICE) is a federal law enforcement agency under the U.S. Department of Homeland Security. ICE's stated mission is to protect the United States from the cross-border crime and illegal immigration th ...
uses facial recognition software against state driver's license databases, including for some states that provide licenses to undocumented immigrants. In December 2022, 16 major domestic airports in the US started testing facial-recognition tech where kiosks with cameras are checking the photos on travelers' IDs to make sure that passengers are not impostors.


China

In 2006, the Skynet Project was initiated by the Chinese Government to implement CCTV surveillance nationwide and as of 2018, there has been 20 million cameras, many of which capable of real-time facial recognition, deployed across the country for this project Some official claim that the current Skynet system can scan the entire Chinese population in one second and the world population in two seconds. In 2017, the Qingdao police was able to identify twenty-five wanted suspects using facial recognition equipment at the Qingdao International Beer Festival, one of which had been on the run for 10 years. The equipment works by recording a 15-second video clip and taking multiple snapshots of the subject. That data is compared and analyzed with images from the police department's database and within 20 minutes, the subject can be identified with a 98.1% accuracy. In 2018, Chinese police in Zhengzhou and Beijing were using smart glasses to take photos which are compared against a government database using facial recognition to identify suspects, retrieve an address, and track people moving beyond their home areas. As of late 2017, China has deployed facial recognition and
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech r ...
technology in
Xinjiang Xinjiang, SASM/GNC: ''Xinjang''; zh, c=, p=Xīnjiāng; formerly romanized as Sinkiang (, ), officially the Xinjiang Uygur Autonomous Region (XUAR), is an autonomous region of the People's Republic of China (PRC), located in the northwest ...
. Reporters visiting the region found surveillance cameras installed every hundred meters or so in several cities, as well as facial recognition checkpoints at areas like gas stations, shopping centers, and mosque entrances. In May 2019,
Human Rights Watch Human Rights Watch (HRW) is an international non-governmental organization, headquartered in New York City, that conducts research and advocacy on human rights. The group pressures governments, policy makers, companies, and individual human r ...
reported finding Face++ code in the Integrated Joint Operations Platform (IJOP), a police surveillance app used to collect data on, and track the Uighur community in
Xinjiang Xinjiang, SASM/GNC: ''Xinjang''; zh, c=, p=Xīnjiāng; formerly romanized as Sinkiang (, ), officially the Xinjiang Uygur Autonomous Region (XUAR), is an autonomous region of the People's Republic of China (PRC), located in the northwest ...
. Human Rights Watch released a correction to its report in June 2019 stating that the Chinese company
Megvii Megvii () is a Chinese technology company that designs image recognition and deep-learning software. Based in Beijing, the company develops artificial intelligence (AI) technology for businesses and for the public sector. In 2019, the company wa ...
did not appear to have collaborated on IJOP, and that the Face++ code in the app was inoperable. In February 2020, following the Coronavirus outbreak, Megvii applied for a bank loan to optimize the body temperature screening system it had launched to help identify people with symptoms of a Coronavirus infection in crowds. In the loan application Megvii stated that it needed to improve the accuracy of identifying masked individuals. Many public places in China are implemented with facial recognition equipment, including railway stations, airports, tourist attractions, expos, and office buildings. In October 2019, a professor at Zhejiang Sci-Tech University sued the Hangzhou Safari Park for abusing private biometric information of customers. The safari park uses facial recognition technology to verify the identities of its Year Card holders. An estimated 300 tourist sites in China have installed facial recognition systems and use them to admit visitors. This case is reported to be the first on the use of facial recognition systems in China. In August 2020, Radio Free Asia reported that in 2019 Geng Guanjun, a citizen of Taiyuan City who had used the
WeChat WeChat () is a Chinese instant messaging, social media, and mobile payment app developed by Tencent. First released in 2011, it became the world's largest standalone mobile app in 2018, with over 1 billion monthly active users. WeChat has b ...
app by
Tencent Tencent Holdings Ltd. () is a Chinese multinational technology and entertainment conglomerate and holding company headquartered in Shenzhen. It is one of the highest grossing multimedia companies in the world based on revenue. It is also the wo ...
to forward a video to a friend in the United States was subsequently convicted on the charge of the crime "picking quarrels and provoking troubles". The Court documents showed that the Chinese police used a facial recognition system to identify Geng Guanjun as an "overseas democracy activist" and that China's network management and propaganda departments directly monitor WeChat users. In 2019, Protestors in Hong Kong destroyed smart lampposts amid concerns they could contain cameras and facial recognition system used for surveillance by Chinese authorities.


India

Even though facial recognition technology (FRT) is not fully accurate, it is being increasingly deployed for identification purposes by the police in India. FRT systems generate a probability match score, or a confidence score between the suspect who is to be identified and the database of identified criminals that is available with the police. The National Automated Facial Recognition System (AFRS) is already being developed by the National Crime Records Bureau (NCRB), a body constituted under the Ministry of Home Affairs. The project seeks to develop and deploy a national database of photographs which would comport with a facial recognition technology system by the central and state security agencies. The
Internet Freedom Foundation Internet Freedom Foundation (IFF) is an Indian non-governmental organisation that conducts advocacy on digital rights and liberties, based in New Delhi. IFF files petitions and undertakes advocacy campaigns to defend online freedom, privacy, net ...
has flagged concerns regarding the project. The NGO has highlighted that the accuracy of FRT systems are "routinely exaggerated and the real numbers leave much to be desired. The implementation of such faulty FRT systems would lead to high rates of false positives and false negatives in this recognition process.”  Under the Supreme Court of India's decision in ''Justice K.S. Puttaswamy vs Union of India'' (22017 10 SCC 1), any justifiable intrusion by the State into people's right to privacy, which is protected as a fundamental right under Article 21 of the Constitution, must confirm to certain thresholds, namely: legality, necessity, proportionality and procedural safeguards. As per the Internet Freedom Foundation, the National Automated Facial Recognition System (AFRS) proposal fails to meet any of these thresholds, citing "absence of legality," "manifest arbitrariness," and "absence of safeguards and accountability." While the national level AFRS project is still in the works, police departments in various states in India are already deploying facial recognition technology systems, such as: TSCOP + CCTNS in Telangana, Punjab Artificial Intelligence System (PAIS) in Punjab, Trinetra in Uttar Pradesh, Police Artificial Intelligence System in Uttarakhand, AFRS in Delhi, Automated Multimodal Biometric Identification System (AMBIS) in Maharashtra, FaceTagr in Tamil Nadu. The Crime and Criminal Tracking Network and Systems (CCTNS), which is a Mission Mode Project under the National e-Governance Plan (NeGP), is viewed as a system which would connect police stations across India, and help them "talk" to each other. The project's objective is to digitize all FIR-related information, including FIRs registered, as well as cases investigated, charge sheets filed, and suspects and wanted persons in all police stations. This shall constitute a national database of crime and criminals in India. CCTNS is being implemented without a data protection law in place. CCTNS is proposed to be integrated with the AFRS, a repository of all crime and criminal related facial data which can be deployed to purportedly identify or verify a person from a variety of inputs ranging from images to videos. This has raised privacy concerns from civil society organizations and privacy experts. Both the projects have been censured as instruments of "mass surveillance" at the hands of the state. In Rajasthan, 'RajCop,' a police app has been recently integrated with a facial recognition module which can match the face of a suspect against a database of known persons in real-time. Rajasthan police is in currently working to widen the ambit of this module by making it mandatory to upload photographs of all arrested persons in CCTNS database, which will "help develop a rich database of known offenders." Helmets fixed with camera have been designed and being used by Rajasthan police in law and order situations to capture police action and activities of “the miscreants, which can later serve as evidence during the investigation of such cases.” PAIS (Punjab Artificial Intelligence System), App employs deep learning, machine learning, and face recognition for the identification of criminals to assist police personnel. The state of Telangana has installed 8 lakh CCTV cameras, with its capital city Hyderabad slowly turning into a surveillance capital. A false positive happens when facial recognition technology misidentifies a person to be someone they are not, that is, it yields an incorrect positive result. They often results in discrimination and strengthening of existing biases. For example, in 2018, Delhi Police reported that its FRT system had an accuracy rate of 2%, which sank to 1% in 2019. The FRT system even failed to distinguish accurately between different sexes. The government of Delhi in collaboration with Indian Space Research Organisation (ISRO) is developing a new technology called Crime Mapping Analytics and Predictive System (CMAPS). The project aims to deploy space technology for "controlling crime and maintaining law and order." The system will be connected to a database containing data of criminals. The technology is envisaged to be deployed to collect real-time data at the crime scene. In a reply dated November 25, 2020 to a Right to Information request filed by the Internet Freedom Foundation seeking information about the facial recognition system being used by the Delhi Police (with reference number DEPOL/R/E/20/07128), the Office of the Deputy Commissioner of Police cum Public Information Officer: Crime stated that they cannot provide the information under section 8(d) of the Right to Information Act, 2005. A Right to Information (RTI) request dated July 30, 2020 was filed with the Office of the Commissioner, Kolkata Police, seeking information about the facial recognition technology that the department was using. The information sought was denied stating that the department was exempted from disclosure under section 24(4) of the RTI Act.


Latin America

In the
2000 Mexican presidential election General elections were held in Mexico on Sunday, 2 July 2000. Voters went to the polls to elect a new president to serve a single six-year term, replacing President Ernesto Zedillo Ponce de León, who was ineligible for re-election under the 1 ...
, the Mexican government employed face recognition software to prevent
voter fraud Electoral fraud, sometimes referred to as election manipulation, voter fraud or vote rigging, involves illegal interference with the process of an election, either by increasing the vote share of a favored candidate, depressing the vote share of ...
. Some individuals had been registering to vote under several different names, in an attempt to place multiple votes. By comparing new face images to those already in the voter database, authorities were able to reduce duplicate registrations. In Colombia public transport busses are fitted with a facial recognition system by FaceFirst Inc to identify passengers that are sought by the
National Police of Colombia The National Police of Colombia (Spanish: ''Policía Nacional de Colombia'') is the national police force of the Republic of Colombia. Although the National Police is not part of the Military Forces of Colombia (Army, Navy, and Air Force), it ...
. FaceFirst Inc also built the facial recognition system for
Tocumen International Airport Tocumen International Airport ( es, Aeropuerto Internacional de Tocumen) is the primary international airport serving Panama City, the capital of Panama. The airport serves as the homebase for Copa Airlines and is a regional hub to and from Th ...
in Panama. The face recognition system is deployed to identify individuals among the travelers that are sought by the
Panamanian National Police The National Police of Panama ( es, Polícia Nacional de Panamá) is a civilian governmental body associated with the Panamanian Public Forces. Established by the National Police Act No. 18 of June 3, 1997, it is responsible for maintaining publi ...
or
Interpol The International Criminal Police Organization (ICPO; french: link=no, Organisation internationale de police criminelle), commonly known as Interpol ( , ), is an international organization that facilitates worldwide police cooperation and cri ...
. Tocumen International Airport operates an airport-wide surveillance system using hundreds of live face recognition cameras to identify wanted individuals passing through the airport. The face recognition system was initially installed as part of a US$11 million contract and included a computer cluster of sixty computers, a
fiber-optic cable A fiber-optic cable, also known as an optical-fiber cable, is an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light. The optical fiber elements are typically individually coated with ...
network for the airport buildings, as well as the installation of 150 surveillance cameras in the
airport terminal An airport terminal is a building at an airport where passengers transfer between ground transportation and the facilities that allow them to board and disembark from an aircraft. Within the terminal, passengers purchase tickets, transfer t ...
and at about 30
airport gate A gate is an area in an airport terminal that controls access to a passenger aircraft. While the exact specifications vary from airport to airport and country to country, most gates consist of a seated waiting area, a counter and a doorway leading ...
s. At the 2014 FIFA World Cup in Brazil the
Federal Police of Brazil The Federal Police of Brazil (Portuguese: ''Polícia Federal'') is a federal law enforcement agency of Brazil and one of the three national police forces. The other two are the Federal Highway Police, and the National Force. From 1944 to 1967 ...
used face recognition
goggles Goggles, or safety glasses, are forms of protective eyewear that usually enclose or protect the area surrounding the eye in order to prevent particulates, water or chemicals from striking the eyes. They are used in chemistry laboratories and ...
. Face recognition systems "made in China" were also deployed at the 2016 Summer Olympics in Rio de Janeiro. Nuctech Company provided 145 insepction terminals for Maracanã Stadium and 55 terminals for the
Deodoro Olympic Park The Deodoro Olympic Park was a cluster of venues in Deodoro, Rio de Janeiro for the 2016 Summer Olympics and 2016 Summer Paralympics. Along with the Barra Olympic Park, it was one of two Olympic Parks used for the 2016 Olympics and Paralympics. GC - ...
.


European Union

Police forces in at least 21 countries of the European Union use, or plan to use, facial recognition systems, either for administrative or criminal purposes.


= Greece

= Greek police passed a contract with Intracom-Telecom for the provision of at least 1,000 devices equipped with live facial recognition system. The delivery is expected before the summer 2021. The total value of the contract is over 4 million euros, paid for in large part by the Internal Security Fund of the
European Commission The European Commission (EC) is the executive of the European Union (EU). It operates as a cabinet government, with 27 members of the Commission (informally known as "Commissioners") headed by a President. It includes an administrative body ...
.


= Italy

= Italian police acquired a face recognition system in 2017, Sistema Automatico Riconoscimento Immagini (SARI). In November 2020, the Interior ministry announced plans to use it in real-time to identify people suspected of seeking asylum.


= The Netherlands

= The
Netherlands ) , anthem = ( en, "William of Nassau") , image_map = , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of the Netherlands , established_title = Before independence , established_date = Spanish Netherl ...
has deployed facial recognition and artificial intelligence technology since 2016. The database of the Dutch police currently contains over 2.2 million pictures of 1.3 million Dutch citizens. This accounts for about 8% of the population. In The Netherlands, face recognition is not used by the police on municipal CCTV.


South Africa

In South Africa, in 2016, the city of Johannesburg announced it was rolling out smart CCTV cameras complete with automatic number plate recognition and facial recognition.


Deployment in retail stores

The US firm 3VR, now Identiv, is an example of a
vendor In a supply chain, a vendor, supplier, provider or a seller, is an enterprise that contributes goods or services. Generally, a supply chain vendor manufactures inventory/stock items and sells them to the next link in the chain. Today, these terms ...
which began offering facial recognition systems and services to retailers as early as 2007. In 2012, the company advertised benefits such as "dwell and queue line analytics to decrease customer wait times", "facial surveillance analytic to facilitate personalized customer greetings by employees" and the ability to " eate loyalty programs by combining Point of sale (POS) data with facial recognition".


United States

In 2018, the National Retail Federation Loss Prevention Research Council called facial recognition technology "a promising new tool" worth evaluating. In July 2020, the
Reuters Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world. The agency was esta ...
news agency reported that during the 2010s the pharmacy chain
Rite Aid Rite Aid Corporation is an American drugstore chain based in Philadelphia, Pennsylvania. It was founded in 1962 in Scranton, Pennsylvania, by Alex Grass under the name Thrift D Discount Center. The company ranked No. 148 in the Fortune 500 l ...
had deployed facial recognition
video surveillance Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly tr ...
systems and components from FaceFirst, DeepCam LLC, and other vendors at some retail locations in the United States. Cathy Langley, Rite Aid's vice president of asset protection, used the phrase "feature matching" to refer to the systems and said that usage of the systems resulted in less violence and organized crime in the company's stores, while former vice president of asset protection Bob Oberosler emphasized improved safety for staff and a reduced need for the involvement of law enforcement organizations. In a 2020 statement to Reuters in response to the reporting, Rite Aid said that it had ceased using the facial recognition software and switched off the cameras. According to director Read Hayes of the National Retail Federation Loss Prevention Research Council, Rite Aid's surveillance program was either the largest or one of the largest programs in retail.
The Home Depot The Home Depot, Inc., is an American multinational home improvement retail corporation that sells tools, construction products, appliances, and services, including fuel and transportation rentals. Home Depot is the largest home improvement re ...
,
Menards Menards is an American home improvement retail company headquartered in Eau Claire, Wisconsin. Menards is owned by founder John Menard Jr. through his privately held company, Menard, Inc. It has 335 stores in 15 states: Illinois, Indiana, Iowa, ...
,
Walmart Walmart Inc. (; formerly Wal-Mart Stores, Inc.) is an American multinational retail corporation that operates a chain of hypermarkets (also called supercenters), discount department stores, and grocery stores from the United States, headquarter ...
, and 7-Eleven are among other US retailers also engaged in large-scale pilot programs or deployments of facial recognition technology. Of the Rite Aid stores examined by Reuters in 2020, those in communities where
people of color The term "person of color" ( : people of color or persons of color; abbreviated POC) is primarily used to describe any person who is not considered "white". In its current meaning, the term originated in, and is primarily associated with, the U ...
made up the largest racial or ethnic group were three times as likely to have the technology installed, raising concerns related to the substantial history of
racial segregation Racial segregation is the systematic separation of people into race (human classification), racial or other Ethnicity, ethnic groups in daily life. Racial segregation can amount to the international crime of apartheid and a crimes against hum ...
and
racial profiling in the United States Racial profiling by law enforcement at the local, state, and federal levels, leads to discrimination against people in the African American, Native American, Asian, Pacific Islander, Latino, Arab, and Muslim communities of the United States. Exam ...
. Rite Aid said that the selection of locations was "data-driven", based on the theft histories of individual stores, local and national crime data, and site infrastructure.


Australia

In 2019, facial recognition to prevent theft was in use at Sydney's Star Casino and was also deployed at gaming venues in New Zealand. In June 2022, consumer group
CHOICE A choice is the range of different things from which a being can choose. The arrival at a choice may incorporate motivators and models. For example, a traveler might choose a route for a journey based on the preference of arriving at a give ...
reported facial recognition was in use in Australia at Kmart, Bunnings, and The Good Guys. The Good Guys subsequently suspended the technology pending a legal challenge by CHOICE to the Office of the Australian Information Commissioner, while Bunnings kept the technology in use and Kmart maintained its trial of the technology.


Additional uses

At the
American football American football (referred to simply as football in the United States and Canada), also known as gridiron, is a team sport played by two teams of eleven players on a rectangular field with goalposts at each end. The offense, the team wi ...
championship game
Super Bowl XXXV Super Bowl XXXV was an American football game between the American Football Conference (AFC) champion Baltimore Ravens and the National Football Conference (NFC) champion New York Giants to decide the National Football League (NFL) champion for ...
in January 2001, police in
Tampa Bay, Florida Tampa Bay is a large natural harbor and shallow estuary connected to the Gulf of Mexico on the west-central coast of Florida, comprising Hillsborough Bay, McKay Bay, Old Tampa Bay, Middle Tampa Bay, and Lower Tampa Bay. The largest freshwater in ...
used Viisage face recognition software to search for potential criminals and terrorists in attendance at the event. 19 people with minor criminal records were potentially identified. Face recognition systems have also been used by photo management software to identify the subjects of photographs, enabling features such as searching images by person, as well as suggesting photos to be shared with a specific contact if their presence were detected in a photo. By 2008 facial recognition systems were typically used as access control in
security systems Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
. The United States'
popular music Popular music is music with wide appeal that is typically distributed to large audiences through the music industry. These forms and styles can be enjoyed and performed by people with little or no musical training.Popular Music. (2015). ''Fu ...
and
country music Country (also called country and western) is a genre of popular music that originated in the Southern and Southwestern United States in the early 1920s. It primarily derives from blues, church music such as Southern gospel and spirituals, ...
celebrity
Taylor Swift Taylor Alison Swift (born December 13, 1989) is an American singer-songwriter. Her discography spans multiple genres, and her vivid songwriting—often inspired by her personal life—has received critical praise and wide media coverage. Bor ...
surreptitiously employed facial recognition technology at a concert in 2018. The camera was embedded in a kiosk near a ticket booth and scanned concert-goers as they entered the facility for known
stalkers Stalking is unwanted and/or repeated surveillance by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. The term ...
. On August 18, 2019, ''
The Times ''The Times'' is a British daily national newspaper based in London. It began in 1785 under the title ''The Daily Universal Register'', adopting its current name on 1 January 1788. ''The Times'' and its sister paper '' The Sunday Times'' (f ...
'' reported that the UAE-owned Manchester City hired a Texas-based firm, Blink Identity, to deploy facial recognition systems in a driver program. The club has planned a single super-fast lane for the supporters at the
Etihad stadium The City of Manchester Stadium in Manchester, England, also known as the Etihad Stadium for sponsorship reasons, is the home of Premier League club Manchester City F.C., with a domestic football capacity of 53,400, making it the 6th-largest ...
. However, civil rights groups cautioned the club against the introduction of this technology, saying that it would risk "normalising a mass surveillance tool". The policy and campaigns officer at
Liberty Liberty is the ability to do as one pleases, or a right or immunity enjoyed by prescription or by grant (i.e. privilege). It is a synonym for the word freedom. In modern politics, liberty is understood as the state of being free within society fr ...
, Hannah Couchman said that Man City's move is alarming, since the fans will be obliged to share deeply sensitive personal information with a private company, where they could be tracked and monitored in their everyday lives. In 2019, casinos in Australia and New Zealand rolled out facial recognition to prevent theft, and a representative of Sydney's Star Casino said they would also provide 'customer service' like welcoming a patron back to a bar. In August 2020, amid the COVID-19 pandemic in the United States, American football stadiums of New York and Los Angeles announced the installation of facial recognition for upcoming matches. The purpose is to make the entry process as touchless as possible. Disney's
Magic Kingdom Magic Kingdom Park, previously known as Walt Disney World Magic Kingdom (1971–1994) and The Magic Kingdom (1994–2017), is a theme park at the Walt Disney World Resort in Bay Lake, Florida, near Orlando, Florida. Owned and operated by The ...
, near Orlando, Florida, likewise announced a test of facial recognition technology to create a touchless experience during the pandemic; the test was originally slated to take place between March 23 and April 23, 2021, but the limited timeframe had been removed as of late April. Media companies have begun using face recognition technology to streamline their tracking, organizing, and archiving pictures and videos.


Advantages and disadvantages


Compared to other biometric systems

In 2006, the performance of the latest face recognition algorithms was evaluated in the Face Recognition Grand Challenge (FRGC). High-resolution face images, 3-D face scans, and iris images were used in the tests. The results indicated that the new algorithms are 10 times more accurate than the face recognition algorithms of 2002 and 100 times more accurate than those of 1995. Some of the algorithms were able to outperform human participants in recognizing faces and could uniquely identify identical twins. One key advantage of a facial recognition system that it is able to perform mass identification as it does not require the cooperation of the test subject to work. Properly designed systems installed in airports, multiplexes, and other public places can identify individuals among the crowd, without passers-by even being aware of the system. However, as compared to other biometric techniques, face recognition may not be most reliable and efficient. Quality measures are very important in facial recognition systems as large degrees of variations are possible in face images. Factors such as illumination, expression, pose and noise during face capture can affect the performance of facial recognition systems. Among all biometric systems, facial recognition has the highest false acceptance and rejection rates, thus questions have been raised on the effectiveness of face recognition software in cases of railway and airport security.


Weaknesses

Ralph Gross, a researcher at the Carnegie Mellon Robotics Institute in 2008, describes one obstacle related to the viewing angle of the face: "Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been problems." Besides the pose variations, low-resolution face images are also very hard to recognize. This is one of the main obstacles of face recognition in surveillance systems. Face recognition is less effective if
facial expression A facial expression is one or more motions or positions of the muscles beneath the skin of the face. According to one set of controversial theories, these movements convey the emotional state of an individual to observers. Facial expressions are ...
s vary. A big smile can render the system less effective. For instance: Canada, in 2009, allowed only neutral facial expressions in passport photos. There is also inconstancy in the datasets used by researchers. Researchers may use anywhere from several subjects to scores of subjects and a few hundred images to thousands of images. It is important for researchers to make available the datasets they used to each other, or have at least a standard dataset.Albiol, A., Albiol, A., Oliver, J., Mossi, J.M.(2012)
Who is who at different cameras: people re-identification using depth cameras
Computer Vision, IET. Vol 6(5), 378–387.
Facial recognition systems have been criticized for upholding and judging based on a binary gender assumption. When classifying the faces of
cisgender Cisgender (often shortened to cis; sometimes cissexual) is a term used to describe a person whose gender identity corresponds to their sex assigned at birth. The word ''cisgender'' is the antonym of '' transgender''. The prefix '' cis-'' is L ...
individuals into male or female, these systems are often very accurate, however were typically confused or unable to determine the
gender identity Gender identity is the personal sense of one's own gender. Gender identity can correlate with a person's assigned sex or can differ from it. In most individuals, the various biological determinants of sex are congruent, and consistent with the ...
of
transgender A transgender (often abbreviated as trans) person is someone whose gender identity or gender expression does not correspond with their sex assigned at birth. Many transgender people experience dysphoria, which they seek to alleviate through ...
and
non-binary Non-binary and genderqueer are umbrella terms for gender identities that are not solely male or femaleidentities that are outside the gender binary. Non-binary identities fall under the transgender umbrella, since non-binary people typically ...
people.
Gender norms A gender role, also known as a sex role, is a social role encompassing a range of behaviors and attitudes that are generally considered acceptable, appropriate, or desirable for a person based on that person's sex. Gender roles are usually cent ...
are being upheld by these systems, so much so that even when shown a photo of a cisgender male with long hair, algorithms was split between following the gender norm of males having short hair, and the masculine facial features and became confused. This accidental misgendering of people can be very harmful for those who do not identify with their
sex assigned at birth Sex assignment (sometimes known as gender assignment) is the discernment of an infant's sex at or before birth. A relative, midwife, nurse or physician inspects the external genitalia when the baby is delivered and, in more than 99.95% of bi ...
, by disregarding and invalidating their gender identity. This is also harmful for people who do not ascribe to traditional gender norms, because it invalidates their
gender expression Gender expression, or gender presentation, is a person's behavior, mannerisms, interests, and appearance that are associated with gender, specifically with the categories of femininity or masculinity. This also includes gender roles. These cate ...
, regardless of their
gender identity Gender identity is the personal sense of one's own gender. Gender identity can correlate with a person's assigned sex or can differ from it. In most individuals, the various biological determinants of sex are congruent, and consistent with the ...
.


Ineffectiveness

Critics of the technology complain that the London Borough of Newham scheme has, , never recognized a single criminal, despite several criminals in the system's database living in the Borough and the system has been running for several years. "Not once, as far as the police know, has Newham's automatic face recognition system spotted a live target." This information seems to conflict with claims that the system was credited with a 34% reduction in crime (hence why it was rolled out to Birmingham also). An experiment in 2002 by the local police department in Tampa, Florida, had similarly disappointing results. A system at Boston's
Logan Airport General Edward Lawrence Logan International Airport , also known as Boston Logan International Airport and commonly as Boston Logan, Logan Airport or simply Logan, is an international airport that is located mostly in East Boston and partiall ...
was shut down in 2003 after failing to make any matches during a two-year test period. In 2014, Facebook stated that in a standardized two-option facial recognition test, its online system scored 97.25% accuracy, compared to the human benchmark of 97.5%. Systems are often advertised as having accuracy near 100%; this is misleading as the studies often use much smaller sample sizes than would be necessary for large scale applications. Because facial recognition is not completely accurate, it creates a list of potential matches. A human operator must then look through these potential matches and studies show the operators pick the correct match out of the list only about half the time. This causes the issue of targeting the wrong suspect.


Controversies


Privacy violations

Civil rights organizations and privacy campaigners such as the Electronic Frontier Foundation, Big Brother Watch and the ACLU express concern that privacy is being compromised by the use of surveillance technologies. Face recognition can be used not just to identify an individual, but also to unearth other personal data associated with an individual – such as other photos featuring the individual, blog posts, social media profiles, Internet behavior, and travel patterns. Concerns have been raised over who would have access to the knowledge of one's whereabouts and people with them at any given time. Moreover, individuals have limited ability to avoid or thwart face recognition tracking unless they hide their faces. This fundamentally changes the dynamic of day-to-day privacy by enabling any marketer, government agency, or random stranger to secretly collect the identities and associated personal information of any individual captured by the face recognition system. Consumers may not understand or be aware of what their data is being used for, which denies them the ability to consent to how their personal information gets shared. In July 2015, the
United States Government Accountability Office The U.S. Government Accountability Office (GAO) is a legislative branch government agency that provides auditing, evaluative, and investigative services for the United States Congress. It is the supreme audit institution of the federal govern ...
conducted a Report to the Ranking Member, Subcommittee on Privacy, Technology and the Law, Committee on the Judiciary, U.S. Senate. The report discussed facial recognition technology's commercial uses, privacy issues, and the applicable federal law. It states that previously, issues concerning facial recognition technology were discussed and represent the need for updating the
privacy laws of the United States Privacy laws of the United States deal with several different legal concepts. One is the ''invasion of privacy'', a tort based in common law allowing an aggrieved party to bring a lawsuit against an individual who unlawfully intrudes into thei ...
so that federal law continually matches the impact of advanced technologies. The report noted that some industry, government, and private organizations were in the process of developing, or have developed, "voluntary privacy guidelines". These guidelines varied between the stakeholders, but their overall aim was to gain consent and inform citizens of the intended use of facial recognition technology. According to the report the voluntary privacy guidelines helped to counteract the privacy concerns that arise when citizens are unaware of how their personal data gets put to use. In 2016, Russian company NtechLab caused a privacy scandal in the international media when it launched the FindFace face recognition system with the promise that Russian users could take photos of strangers in the street and link them to a social media profile on the social media platform
Vkontakte VK (short for its original name ''VKontakte''; russian: ВКонтакте, meaning ''InContact'') is a Russian online social media and social networking service based in Saint Petersburg. VK is available in multiple languages but it is predomin ...
(VT). In December 2017, Facebook rolled out a new feature that notifies a user when someone uploads a photo that includes what Facebook thinks is their face, even if they are not tagged. Facebook has attempted to frame the new functionality in a positive light, amidst prior backlashes. Facebook's head of privacy, Rob Sherman, addressed this new feature as one that gives people more control over their photos online. "We've thought about this as a really empowering feature," he says. "There may be photos that exist that you don't know about." Facebook's
DeepFace DeepFace is a deep learning facial recognition system created by a research group at Facebook. It identifies human faces in digital images. The program employs a nine-layer neural network with over 120 million connection weights and was trained o ...
has become the subject of several class action lawsuits under the Biometric Information Privacy Act, with claims alleging that Facebook is collecting and storing face recognition data of its users without obtaining informed consent, in direct violation of the 2008
Biometric Information Privacy Act Illinois set forth the Biometric Information Privacy Act on October 3, 2008, in an effort to regulate the collection, use, and handling of biometric identifiers and information by private entities. Notably, the Act does not apply to government en ...
(BIPA). The most recent case was dismissed in January 2016 because the court lacked jurisdiction. In the US, surveillance companies such as
Clearview AI Clearview AI is an American facial recognition company, providing software to companies, law enforcement, universities, and individuals. The company's algorithm matches faces to a database of more than 20 billion images indexed from the Interne ...
are relying on the
First Amendment to the United States Constitution The First Amendment (Amendment I) to the United States Constitution prevents the government from making laws that regulate an establishment of religion, or that prohibit the free exercise of religion, or abridge the freedom of speech, the ...
to data scrape
user accounts A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), accoun ...
on social media platforms for data that can be used in the development of facial recognition systems. In 2019, the
Financial Times The ''Financial Times'' (''FT'') is a British daily newspaper printed in broadsheet and published digitally that focuses on business and economic current affairs. Based in London, England, the paper is owned by a Japanese holding company, Ni ...
first reported that facial recognition software was in use in the King's Cross area of London. The development around London's King's Cross mainline station includes shops, offices, Google's UK HQ and part of St Martin's College. According to the UK
Information Commissioner's Office The Information Commissioner's Office (ICO) is a non-departmental public body which reports directly to the Parliament of the United Kingdom and is sponsored by the Department for Digital, Culture, Media and Sport (DCMS). It is the independe ...
: "Scanning people's faces as they lawfully go about their daily lives, in order to identify them, is a potential threat to privacy that should concern us all." The UK Information Commissioner Elizabeth Denham launched an investigation into the use of the King's Cross facial recognition system, operated by the company Argent. In September 2019 it was announced by Argent that facial recognition software would no longer be used at King's Cross. Argent claimed that the software had been deployed between May 2016 and March 2018 on two cameras covering a pedestrian street running through the centre of the development. In October 2019, a report by the deputy London mayor
Sophie Linden Sophie Linden (born 27 February 1970) is a British politician, and currently the Deputy Mayor for Policing and Crime in London. She is a member of the Labour Party. Education Linden was educated at Emmanuel College, Cambridge from 1989 to 199 ...
revealed that in a secret deal the Metropolitan Police had passed photos of seven people to Argent for use in their King's cross facial recognition system. Automated Facial Recognition was trialled by the
South Wales Police South Wales Police ( cy, Heddlu De Cymru) is one of the four territorial police forces in Wales. It is headquartered in Bridgend. The force was formed as South Wales Constabulary on 1 June 1969, by the amalgamation of the former Glamorgan Cons ...
on multiple occasions between 2017 and 2019. The use of the technology was challenged in court by a private individual, Edward Bridges, with support from the charity
Liberty Liberty is the ability to do as one pleases, or a right or immunity enjoyed by prescription or by grant (i.e. privilege). It is a synonym for the word freedom. In modern politics, liberty is understood as the state of being free within society fr ...
(case known as R (Bridges) v Chief Constable South Wales Police). The case was heard in the Court of Appeal and a judgement was given in August 2020. The case argued that the use of Facial Recognition was a privacy violation on the basis that there was insufficient legal framework or proportionality in the use of Facial Recognition and that its use was in violation of the Data Protection Acts
1998 1998 was designated as the ''International Year of the Ocean''. Events January * January 6 – The ''Lunar Prospector'' spacecraft is launched into orbit around the Moon, and later finds evidence for frozen water, in soil in permanently s ...
and
2018 File:2018 Events Collage.png, From top left, clockwise: The 2018 Winter Olympics opening ceremony in PyeongChang, South Korea; Protests erupt following the Assassination of Jamal Khashoggi; March for Our Lives protests take place across the Unit ...
. The case was decided in favour of Bridges and did not award damages. The case was settled via a declaration of wrongdoing. In response to the case, the British Government has repeatedly attempted to pass a Bill regulating the use of Facial Recognition in public spaces. The proposed Bills have attempted to appoint a Commissioner with the ability to regulate Facial Recognition use by Government Services in a similar manner to the Commissioner for CCTV. Such a Bill has yet to come into force orrect as of September 2021


Imperfect technology in law enforcement

, it is still contested as to whether or not facial recognition technology works less accurately on people of color. One study by
Joy Buolamwini Joy Adowaa Buolamwini is a Ghanaian-American-Canadian computer scientist and digital activist based at the MIT Media Lab. Buolamwini introduces herself as a poet of code, daughter of art and science. She founded the Algorithmic Justice League ...
(MIT Media Lab) and
Timnit Gebru Timnit Gebru ( am, ትምኒት ገብሩ; born 1983/1984) is an American computer scientist who works on algorithmic bias and data mining. She is an advocate for diversity in technology and co-founder of Black in AI, a community of Black resea ...
(Microsoft Research) found that the error rate for gender recognition for women of color within three commercial facial recognition systems ranged from 23.8% to 36%, whereas for lighter-skinned men it was between 0.0 and 1.6%. Overall accuracy rates for identifying men (91.9%) were higher than for women (79.4%), and none of the systems accommodated a non-binary understanding of gender. It also showed that the datasets used to train commercial facial recognition models were unrepresentative of the broader population and skewed toward lighter-skinned males. However, another study showed that several commercial facial recognition software sold to law enforcement offices around the country had a lower false non-match rate for black people than for white people. Experts fear that face recognition systems may actually be hurting citizens the police claims they are trying to protect. It is considered an imperfect biometric, and in a study conducted by Georgetown University researcher Clare Garvie, she concluded that "there's no consensus in the scientific community that it provides a positive identification of somebody." It is believed that with such large margins of error in this technology, both legal advocates and facial recognition software companies say that the technology should only supply a portion of the case – no evidence that can lead to an arrest of an individual. The lack of regulations holding facial recognition technology companies to requirements of racially biased testing can be a significant flaw in the adoption of use in law enforcement. CyberExtruder, a company that markets itself to law enforcement said that they had not performed testing or research on bias in their software. CyberExtruder did note that some skin colors are more difficult for the software to recognize with current limitations of the technology. "Just as individuals with very dark skin are hard to identify with high significance via facial recognition, individuals with very pale skin are the same," said Blake Senftner, a senior software engineer at CyberExtruder. The United States' National Institute of Standards and Technology (NIST) carried out extensive testing of FRT system 1:1 verification and 1:many identification. It also tested for the differing accuracy of FRT across different demographic groups. The independent study concluded at present, no FRT system has 100% accuracy.


Data protection

In 2010,
Peru , image_flag = Flag of Peru.svg , image_coat = Escudo nacional del Perú.svg , other_symbol = Great Seal of the State , other_symbol_type = National seal , national_motto = "Firm and Happy f ...
passed the Law for Personal Data Protection, which defines biometric information that can be used to identify an individual as sensitive data. In 2012, Colombia passed a comprehensive Data Protection Law which defines biometric data as senstivite information. According to Article 9(1) of the EU's 2016 General Data Protection Regulation (GDPR) the processing of biometric data for the purpose of "uniquely identifying a natural person" is sensitive and the facial recognition data processed in this way becomes sensitive personal data. In response to the GDPR passing into the law of EU member states, EU based researchers voiced concern that if they were required under the GDPR to obtain individual's consent for the processing of their facial recognition data, a face database on the scale of MegaFace could never be established again. In September 2019 the
Swedish Data Protection Authority The Swedish Authority for Privacy Protection ( sv, Integritetsskyddsmyndigheten), formerly the Swedish Data Protection Authority ( sv, Datainspektionen), is a Swedish government agency, organized under the Ministry of Justice, tasked to protect ...
(DPA) issued its first ever financial penalty for a violation of the EU's General Data Protection Regulation (GDPR) against a school that was using the technology to replace time-consuming roll calls during class. The DPA found that the school illegally obtained the biometric data of its students without completing an impact assessment. In addition the school did not make the DPA aware of the pilot scheme. A 200,000 SEK fine (€19,000/$21,000) was issued. In the United States of America several U.S. states have passed laws to protect the privacy of biometric data. Examples include the Illinois
Biometric Information Privacy Act Illinois set forth the Biometric Information Privacy Act on October 3, 2008, in an effort to regulate the collection, use, and handling of biometric identifiers and information by private entities. Notably, the Act does not apply to government en ...
(BIPA) and the
California Consumer Privacy Act The California Consumer Privacy Act (CCPA) is a state statute intended to enhance privacy rights and consumer protection for residents of California, United States. The bill was passed by the California State Legislature and signed into law by Je ...
(CCPA). In March 2020 California residents filed a
class action A class action, also known as a class-action lawsuit, class suit, or representative action, is a type of lawsuit where one of the parties is a group of people who are represented collectively by a member or members of that group. The class actio ...
against
Clearview AI Clearview AI is an American facial recognition company, providing software to companies, law enforcement, universities, and individuals. The company's algorithm matches faces to a database of more than 20 billion images indexed from the Interne ...
, alleging that the company had illegally collected biometric data online and with the help of face recognition technology built up a database of biometric data which was sold to companies and police forces. At the time Clearview AI already faced two lawsuits under BIPA and an investigation by the
Privacy Commissioner of Canada The privacy commissioner of Canada (french: Commissaire à la protection de la vie privée du Canada) is a non-partisan ombudsman and officer of the Parliament of Canada. The commissioner investigates complaints regarding violations of the fed ...
for compliance with the Personal Information Protection and Electronic Documents Act (PIPEDA).


Bans on the use of facial recognition technology

In May 2019, San Francisco, California became the first major United States city to ban the use of facial recognition software for police and other local government agencies' usage. San Francisco Supervisor,
Aaron Peskin Aaron Dan Peskin (born June 17, 1964) is an American elected official in San Francisco, California. He serves as a member of the San Francisco Board of Supervisors representing District 3, and is currently Dean of the Board. He was elected in ...
, introduced regulations that will require agencies to gain approval from the San Francisco Board of Supervisors to purchase surveillance technology. The regulations also require that agencies publicly disclose the intended use for new surveillance technology. In June 2019, Somerville, Massachusetts became the first city on the East Coast to ban face surveillance software for government use, specifically in police investigations and municipal surveillance. In July 2019,
Oakland, California Oakland is the largest city and the county seat of Alameda County, California, United States. A major West Coast of the United States, West Coast port, Oakland is the largest city in the East Bay region of the San Francisco Bay Area, the third ...
banned the usage of facial recognition technology by city departments. The
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
("ACLU") has campaigned across the United States for transparency in surveillance technology and has supported both San Francisco and Somerville's ban on facial recognition software. The ACLU works to challenge the secrecy and surveillance with this technology. In January 2020, the
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been de ...
suggested, but then quickly scrapped, a proposed moratorium on facial recognition in public spaces. During the
George Floyd protests The George Floyd protests were a series of protests and civil unrest against police brutality and racism that began in Minneapolis on May 26, 2020, and largely took place during 2020. The civil unrest and protests began as part of internat ...
, use of facial recognition by city government was banned in
Boston Boston (), officially the City of Boston, is the state capital and most populous city of the Commonwealth of Massachusetts, as well as the cultural and financial center of the New England region of the United States. It is the 24th- mo ...
, Massachusetts. As of June 10, 2020, municipal use has been banned in: *
Berkeley, California Berkeley ( ) is a city on the eastern shore of San Francisco Bay in northern Alameda County, California, United States. It is named after the 18th-century Irish bishop and philosopher George Berkeley. It borders the cities of Oakland and E ...
*
Oakland, California Oakland is the largest city and the county seat of Alameda County, California, United States. A major West Coast of the United States, West Coast port, Oakland is the largest city in the East Bay region of the San Francisco Bay Area, the third ...
*
Boston Boston (), officially the City of Boston, is the state capital and most populous city of the Commonwealth of Massachusetts, as well as the cultural and financial center of the New England region of the United States. It is the 24th- mo ...
,
Massachusetts Massachusetts (Massachusett: ''Muhsachuweesut Massachusett_writing_systems.html" ;"title="nowiki/> məhswatʃəwiːsət.html" ;"title="Massachusett writing systems">məhswatʃəwiːsət">Massachusett writing systems">məhswatʃəwiːsət'' En ...
– June 30, 2020 * Brookline, Massachusetts *
Cambridge, Massachusetts Cambridge ( ) is a city in Middlesex County, Massachusetts, United States. As part of the Boston metropolitan area, the cities population of the 2020 U.S. census was 118,403, making it the fourth most populous city in the state, behind Boston ...
* Northampton, Massachusetts * Springfield, Massachusetts *
Somerville, Massachusetts Somerville ( ) is a city located directly to the northwest of Boston, and north of Cambridge, in Middlesex County, Massachusetts, United States. As of the 2020 United States Census, the city had a total population of 81,045 people. With an area o ...
*
Portland, Oregon Portland (, ) is a port city in the Pacific Northwest and the list of cities in Oregon, largest city in the U.S. state of Oregon. Situated at the confluence of the Willamette River, Willamette and Columbia River, Columbia rivers, Portland is ...
– September 2020 The West Lafayette, Indiana City Council passed an ordinance banning facial recognition surveillance technology. On October 27, 2020, 22 human rights groups called upon the
University of Miami The University of Miami (UM, UMiami, Miami, U of M, and The U) is a private research university in Coral Gables, Florida. , the university enrolled 19,096 students in 12 colleges and schools across nearly 350 academic majors and programs, i ...
to ban facial recognition technology. This came after the students accused the school of using the software to identify student protesters. The allegations were, however, denied by the university. The European " Reclaim Your Face" coalition launched in October 2020. The coalition calls for a ban on facial recognition and launched a
European Citizens' Initiative The European Citizens' Initiative (ECI) is a European Union (EU) mechanism aimed at increasing direct democracy by enabling "EU citizens to participate directly in the development of EU policies", introduced with the Treaty of Lisbon in 2007. The ...
in February 2021. More than 60 organizations call on the
European Commission The European Commission (EC) is the executive of the European Union (EU). It operates as a cabinet government, with 27 members of the Commission (informally known as "Commissioners") headed by a President. It includes an administrative body ...
to strictly regulate the use of biometric surveillance technologies. A state police reform law in Massachusetts will take effect in July 2021; a ban passed by the legislature was rejected by governor
Charlie Baker Charles Duane Baker Jr. (born November 13, 1956) is an American politician and businessman serving as the 72nd governor of Massachusetts since 2015. A member of the Republican Party, Baker was a cabinet official under two governors of Massach ...
. Instead, the law requires a judicial warrant, limit the personnel who can perform the search, record data about how the technology is used, and create a commission to make recommendations about future regulations.


Emotion recognition

In the 18th and 19th century, the belief that facial expressions revealed the moral worth or true inner state of a human was widespread and
physiognomy Physiognomy (from the Greek , , meaning "nature", and , meaning "judge" or "interpreter") is the practice of assessing a person's character or personality from their outer appearance—especially the face. The term can also refer to the genera ...
was a respected science in the Western world. From the early 19th century onwards photography was used in the physiognomic analysis of facial features and facial expression to detect
insanity Insanity, madness, lunacy, and craziness are behaviors performed by certain abnormal mental or behavioral patterns. Insanity can be manifest as violations of societal norms, including a person or persons becoming a danger to themselves or t ...
and
dementia Dementia is a disorder which manifests as a set of related symptoms, which usually surfaces when the brain is damaged by injury or disease. The symptoms involve progressive impairments in memory, thinking, and behavior, which negatively affe ...
. In the 1960s and 1970s the study of human emotions and its expressions was reinvented by psychologists, who tried to define a normal range of emotional responses to events. The research on automated
emotion recognition Emotion recognition is the process of identifying human emotion. People vary widely in their accuracy at recognizing the emotions of others. Use of technology to help people with emotion recognition is a relatively nascent research area. Genera ...
has since the 1970s focused on
facial expression A facial expression is one or more motions or positions of the muscles beneath the skin of the face. According to one set of controversial theories, these movements convey the emotional state of an individual to observers. Facial expressions are ...
s and speech, which are regarded as the two most important ways in which humans communicate
emotions Emotions are mental states brought on by neurophysiological changes, variously associated with thoughts, feelings, behavioral responses, and a degree of pleasure or displeasure. There is currently no scientific consensus on a definition. ...
to other humans. In the 1970s the
Facial Action Coding System The Facial Action Coding System (FACS) is a system to taxonomize human facial movements by their appearance on the face, based on a system originally developed by a Swedish anatomist named Carl-Herman Hjortsjö. It was later adopted by Paul Ek ...
(FACS) categorization for the physical expression of emotions was established. Its developer
Paul Ekman Paul Ekman (born February 15, 1934) is an American psychologist and professor emeritus at the University of California, San Francisco who is a pioneer in the study of emotions and their relation to facial expressions. He was ranked 59th out of ...
maintains that there are six emotions that are universal to all human beings and that these can be coded in facial expressions. Research into automatic emotion specific expression recognition has in the past decades focused on frontal view images of human faces. In 2016, facial feature emotion recognition algorithms were among the new technologies, alongside high-definition CCTV,
high resolution Image resolution is the detail an image holds. The term applies to digital images, film images, and other types of images. "Higher resolution" means more image detail. Image resolution can be measured in various ways. Resolution quantifies how ...
3D face recognition and
iris recognition Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can ...
, that found their way out of university research labs. In 2016, Facebook acquired FacioMetrics, a facial feature emotion recognition
corporate spin-off A corporate spin-off, also known as a spin-out, or starburst or hive-off, is a type of corporate action where a company "splits off" a section as a separate business or creates a second incarnation, even if the first is still active. Characte ...
by Carnegie Mellon University. In the same year
Apple Inc. Apple Inc. is an American multinational technology company headquartered in Cupertino, California, United States. Apple is the largest technology company by revenue (totaling in 2021) and, as of June 2022, is the world's biggest company ...
acquired the facial feature emotion recognition start-up Emotient. By the end of 2016, commercial vendors of facial recognition systems offered to integrate and deploy emotion recognition algorithms for facial features. The MIT's Media Lab spin-off
Affectiva Affectiva is a software company that builds artificial intelligence. The company claims its AI understands human emotions, cognitive states, activities and the objects people use, by analyzing facial and vocal expressions. An offshoot of MIT Media ...
by late 2019 offered a facial expression emotion detection product that can recognize emotions in humans while
driving Driving is the controlled operation and movement of a vehicle, including cars, motorcycles, trucks, buses, and bicycles. Permission to drive on public highways is granted based on a set of conditions being met and drivers are required to f ...
.


Anti-facial recognition systems

The development of anti-facial recognition technology is effectively an arms race between privacy researchers and big data companies. Big data companies increasingly use convolutional AI technology to create ever more advanced facial recognition models. Solutions to block facial recognition may not work on newer software, or on different types of facial recognition models. One popular cited example of facial-recognition blocking is the CVDazzle makeup and haircut system, but the creators note on their website that it has been outdated for quite some time as it was designed to combat a particular facial recognition algorithm and may not work. Another example is the emergence of facial recognition that can identify people wearing facemasks and sunglasses, especially after the COVID-19 pandemic. Given that big data companies have much more funding than privacy researchers, it is very difficult for anti-facial recognition systems to keep up. There is also no guarantee that obfuscation techniques that were used for images taken in the past and stored, such as masks or software obfuscation, would protect users from facial-recognition analysis of those images by future technology. In January 2013, Japanese researchers from the
National Institute of Informatics The is a Japanese research institute located in Chiyoda, Tokyo, Japan. NII was established in April 2000 for the purpose of advancing the study of informatics. This institute also works on creating systems to facilitate the spread of scienti ...
created 'privacy visor' glasses that use nearly infrared light to make the face underneath it unrecognizable to face recognition software that use infrared. The latest version uses a titanium frame, light-reflective material and a mask which uses angles and patterns to disrupt facial recognition technology through both absorbing and bouncing back light sources. However, these methods are used to prevent infrared facial recognition and would not work on AI facial recognition of plain images. Some projects use
adversarial machine learning Adversarial machine learning is the study of the attacks on machine learning algorithms, and of the defenses against such attacks. A recent survey exposes the fact that practitioners report a dire need for better protecting machine learning syste ...
to come up with new printed patterns that confuse existing face recognition software. One method that may work to protect from facial recognition systems are specific haircuts and make-up patterns that prevent the used algorithms to detect a face, known as computer vision dazzle. Incidentally, the makeup styles popular with Juggalos may also protect against facial recognition. Facial masks that are worn to protect from contagious viruses can reduce the accuracy of facial recognition systems. A 2020 NIST study, tested popular one-to-one matching systems and found a failure rate between five and fifty percent on masked individuals. ''
The Verge ''The Verge'' is an American technology news website operated by Vox Media, publishing news, feature stories, guidebooks, product reviews, consumer electronics news, and podcasts. The website launched on November 1, 2011, and uses Vox Media ...
'' speculated that the accuracy rate of mass surveillance systems, which were not included in the study, would be even less accurate than the accuracy of one-to-one matching systems. The facial recognition of
Apple Pay Apple Pay is a mobile payment service by Apple Inc. that allows users to make payments in person, in iOS apps, and on the web. It is supported on these Apple devices: iPhone, Apple Watch, iPad, and Mac. It digitizes and can replace a cred ...
can work through many barriers, including heavy makeup, thick beards and even sunglasses, but fails with masks. However, facial recognition of masked faces is increasingly getting more reliable. Another solution is the application of obfuscation to images that may fool facial recognition systems while still appearing normal to a human user. These could be used for when images are posted online or on social media. However, as it is hard to remove images once they are on the internet, the obfuscation on these images may be defeated and the face of the user identified by future advances in technology. Two examples of this technique, developed in 2020, are the ANU's 'Camera Adversaria' camera app, and the
University of Chicago The University of Chicago (UChicago, Chicago, U of C, or UChi) is a private university, private research university in Chicago, Illinois. Its main campus is located in Chicago's Hyde Park, Chicago, Hyde Park neighborhood. The University of Chic ...
's Fawkes image cloaking software algorithm which applies obfuscation to already taken photos. However, by 2021 the Fawkes obfuscation algorithm had already been specifically targeted by Microsoft Azure which changed its algorithm to lower Fawkes' effectiveness.


See also

*
AI effect :''For the magnitude of effect of a pesticide, see Pesticide application. Of change in farming practices, see Agricultural intensification.'' The AI effect occurs when onlookers discount the behavior of an artificial intelligence program by argu ...
* Amazon Rekognition *
Applications of artificial intelligence Artificial intelligence (AI) has been used in applications to alleviate certain problems throughout industry and academia. AI, like electricity or computers, is a general purpose technology that has a multitude of applications. It has been used ...
*
Artificial intelligence for video surveillance Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects, attributes, and events. Security contractors pro ...
*
Automatic number plate recognition Automatic number-plate recognition (ANPR; see also other names below) is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit te ...
* Biometric technology in access control * Coke Zero Facial Profiler * Computer processing of body language * Computer vision *
DeepFace DeepFace is a deep learning facial recognition system created by a research group at Facebook. It identifies human faces in digital images. The program employs a nine-layer neural network with over 120 million connection weights and was trained o ...
*
Face perception Facial perception is an individual's understanding and interpretation of the face. Here, perception implies the presence of consciousness and hence excludes automated facial recognition systems. Although facial recognition is found in other sp ...
*
Face Recognition Grand Challenge 250px The Face Recognition Grand Challenge (FRGC) was conducted from May 2004 until March 2006 in an effort to promote and advance face recognition technology. It was the successor of the Face Recognition Vendor Test. Overview The primary goal ...
* FindFace *
Glasgow Face Matching Test The Glasgow Face Matching Test (GFMT) was created by researchers at the University of Glasgow and at Glasgow Caledonian University.The Glasgow face matching test. Burton, A. M., White,D. & McNeill, A. (2010). Behavior Research Methods, 42, pp 286 ...
* ISO/IEC 19794-5 * MALINTENT * National biometric id card *
Multimedia information retrieval Multimedia information retrieval (MMIR or MIR) is a research discipline of computer science that aims at extracting semantic information from multimedia data sources.H Eidenberger. ''Fundamental Media Understanding'', atpress, 2011, p. 1. Data sour ...
*
Multilinear subspace learning Multilinear subspace learning is an approach to dimensionality reduction.M. A. O. Vasilescu, D. Terzopoulos (2003"Multilinear Subspace Analysis of Image Ensembles" "Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVP ...
*
Pattern recognition Pattern recognition is the automated recognition of patterns and regularities in data. It has applications in statistical data analysis, signal processing, image analysis, information retrieval, bioinformatics, data compression, computer graphics ...
, analogy and
case-based reasoning In artificial intelligence and philosophy, case-based reasoning (CBR), broadly construed, is the process of solving new problems based on the solutions of similar past problems. In everyday life, an auto mechanic who fixes an engine by recallin ...
*
Retinal scan A retinal scan is a biometric technique that uses unique patterns on a person's retina blood vessels. It is not to be confused with other ocular-based technologies: iris recognition, commonly called an "iris scan", and eye vein verification that ...
* SenseTime * Super recognisers * Template matching *
Three-dimensional face recognition Three-dimensional face recognition (3D face recognition) is a modality of facial recognition methods in which the three-dimensional geometry of the human face is used. It has been shown that 3D face recognition methods can achieve significantly h ...
*
Vein matching Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. Though used by the Federal Bureau of Investigation and the Cen ...
*
Gait analysis Gait analysis is the systematic study of animal locomotion, more specifically the study of human motion, using the eye and the brain of observers, augmented by instrumentation for measuring body movements, body mechanics, and the activity of the ...
*
Fawkes (image cloaking software) ''Fawkes'' is a facial image cloaking software created by the SAND (Security, Algorithms, Networking and Data) Laboratory of the University of Chicago. It is a free tool that is available as a standalone executable.Ledford, B 2021, ''An Assessment ...
; Lists *
List of computer vision topics The following outline is provided as an overview of and topical guide to computer vision: Computer vision – interdisciplinary field that deals with how computers can be made to gain high-level understanding from digital images or videos. ...
* List of emerging technologies
  • Outline of artificial intelligence The following outline is provided as an overview of and topical guide to artificial intelligence: Artificial intelligence (AI) – intelligence exhibited by machines or software. It is also the name of the scientific field which studies how to ...

  • References


    Further reading

    *
    "The Face Detection Algorithm Set to Revolutionize Image Search"
    (Feb. 2015), ''
    MIT Technology Review ''MIT Technology Review'' is a bimonthly magazine wholly owned by the Massachusetts Institute of Technology, and editorially independent of the university. It was founded in 1899 as ''The Technology Review'', and was re-launched without "The" in ...
    '' * ** Interview with Alvaro Bedoya, executive director of the Center on Privacy & Technology at Georgetown Law and co-author of ''Perpetual Line Up: Unregulated Police Face Recognition in America''.


    External links

    *
    ''A Photometric Stereo Approach to Face Recognition''
    (master's thesis). The
    University of the West of England, Bristol The University of the West of England (also known as UWE Bristol) is a public research university, located in and around Bristol, England. The institution was know as the Bristol Polytechnic in 1970; it received university status in 1992 and ...
    . {{DEFAULTSORT:Face Recognition System Automatic identification and data capture Machine learning task Surveillance Video surveillance