Difference between revisions of "Technology Trends/Face Recognition"
Line 111: | Line 111: | ||
<div style="display: none"> | <div style="display: none"> | ||
− | + | ||
<ref>Facial recognition system. (2019, July 16). Retrieved from <i>[https://en.wikipedia.org/wiki/Facial_recognition_system]</i></ref> | <ref>Facial recognition system. (2019, July 16). Retrieved from <i>[https://en.wikipedia.org/wiki/Facial_recognition_system]</i></ref> | ||
<ref>Gartner_Inc. (n.d.). Face Recognition Software: Anti-Terrorism Tool and More. Retrieved from <i>[https://www.gartner.com/doc/341020/face-recognition-software-antiterrorism-tool]</i></ref> | <ref>Gartner_Inc. (n.d.). Face Recognition Software: Anti-Terrorism Tool and More. Retrieved from <i>[https://www.gartner.com/doc/341020/face-recognition-software-antiterrorism-tool]</i></ref> | ||
Line 124: | Line 124: | ||
<ref>Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from <i>[https://www.upwork.com/hiring/for-clients/pros-cons-facial-recognition-technology-business/]</i></ref> | <ref>Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from <i>[https://www.upwork.com/hiring/for-clients/pros-cons-facial-recognition-technology-business/]</i></ref> | ||
<ref>Face ID Security. (2017, November). Retrieved from apple.com:<i>[https://www.apple.com/ca/business-docs/FaceID_Security_Guide.pdf]</i></ref> | <ref>Face ID Security. (2017, November). Retrieved from apple.com:<i>[https://www.apple.com/ca/business-docs/FaceID_Security_Guide.pdf]</i></ref> | ||
+ | </div> | ||
</div> | </div> | ||
Revision as of 08:31, 22 July 2019
|
|||||||
---|---|---|---|---|---|---|---|
[200px] | |||||||
Status | Translation | ||||||
Initial release | June 25, 2019 | ||||||
Latest version | July 22, 2019 | ||||||
Official publication | Face Recognition.pdf | ||||||
|
Face Recognition is a biometric technology that is used to establish an individual identity and capable of uniquely identifying and verifying a person. It uses a computer application, which is also known as a facial recognition system, to extract a digital image from a picture, video frame or 3D scan and create a faceprint, a set of characteristic measurements of a face structure, that uniquely identifies one person’s particular face for identity and authentication purposes.
Business Brief
Face recognition is a biometric technology that is used to establish an individual identity and capable of uniquely identifying and verifying a person. It uses a computer application, which is also known as a facial recognition system, to extract a digital image from a picture, video frame or 3D scan and create a faceprint, a set of characteristic measurements of a face structure, that uniquely identifies one person’s particular face for identity and authentication purposes.
The facial recognition technology has a wide variety of applications in access control, surveillance, and criminal investigations. It is also used in combination with other biometric technology to improve and enhance security measures.
Apple has been attempting to add movement capabilities to the system. The subject of a scanned face can now be talking or moving during the scan, which allows facial recognition to combine with other biometric security measures like voice recognition. Since moving subjects can be scanned, individuals can be identified in a crowd without intrusion by using facial recognition systems.
Technology Brief
Facial recognition systems can use either a 2D/3D image or video feed to create a digital image, establish the faceprint, and identify a face by comparing its digital image with the faceprints in a database. Every face has several “landmarks” and the system will flag these as “nodal points”. A human face can have up to 80 of these points. They represent areas of interest on the face that the system measures.
When the system scans a face, it will compare all these measurements to the records, faceprints, in the database.
Usually, there is a 4-stage process involved in the operation of this technology [1]:
Capture – a physical or behavioral sample is captured by the system during enrolment
Extraction – Unique data is extracted from the sample and a template is created
Comparison – the template is then compared with a new sample
Matching – the system then decides if the feature extracted from the new sample is a match or not
Industry Usage
Facial recognition offers another form of biometric identification and authentication. Several vendors have been leveraging face recognition as an access control and authentication tool either for their clients or for internal use. Its application is not limited to a form of security measure, but it can also be used for healthcare and retail.
The subject of a scanned face does not have to know when they were scanned, which demonstrates that the technology can be used in large crowds to identify threats quickly.
For example, Amazon has been developing a system, which allows users to pay for their items using an actionable image (selfie). A user can use a selfie in which he is moving or speaking a particular phrase as a password to verify their identity when paying for an item. The logic behind having the customer speak a phrase or make a movement, is to try to eliminate the possibility of fooling the system with a scanned 2D image of the person.
After purchasing Face.com in 2012, Facebook began using facial recognition technology to connect users with their photos. When a user uploads a photo, the software will automatically suggest other people to tag. When you are tagged in a photo, more content is shown in a grouped format about other tagged individuals.
Face ID is a technology developed by Apple and introduced in iPhone X. It provides intuitive and secure authentication enabled by the state-of-the-art TrueDepth camera system with advanced technologies to accurately map the geometry of your face. With a simple glance, Face ID securely unlocks your iPhone or iPad Pro.
Canadian Government Use
Facial recognition systems are also used in provincial casinos for identifying and locking out visitors with gambling addictions who have voluntarily entered themselves into self-exclusion lists[3]. It is worth noting that the system was developed jointly with the Ontario Privacy Commissioner to ensure a privacy-by-default design.
Passport Canada has been using facial recognition software for the past decade to compare new passport photos against its database to prevent passport fraud. One to one (1:1) comparisons are done to confirm a person’s identity, meaning that a recently taken image is compared to one already in the database that is associated with that person’s identity. One to many (1:N) comparisons are done to compare an image against the entire database of passport photos to make sure there are no duplicate applicants or individuals with multiple identities[4].
Bill C-309, An Act to Amend the Criminal Code has made the concealment of identity (using masks or disguises) unlawful while participating in riots or unlawful assemblies[6]. Although the Privacy Act and PIPEDA (Personal Information Protection and Electronic Documents Act) state that consent must be obtained before private information is collected, Bill C-309 paves the way for law enforcement to scan large crowds using facial recognition software and uncover the identities of participants.
Implications for Government Agencies
Value Proposition
SSC could leverage this technology by offering facial recognition as a service. SSC could utilise this technology to replace the current government employee security ID. A smart camera will instantly capture the biometric data of the individuals for local analysis and then open the gate to access the building. This service could reduce ongoing security costs associated with having a security team on site, but there probably will not be any savings in the short term due to the cost of developing the applications and installing the related equipment.
Two-factor authentication with a user’s face could also be used for accessing secure files with higher security classifications (such as secret documents).
A market research firm based in Hong Kong estimates that nearly 64% (or 1 billion) of all smartphones shipped worldwide will have facial recognition capabilities in 2020[7]. SSC can take advantage of this research and only issue phones with facial recognition capabilities to employees. This biometric information can be paired with any other type of authentication method to create a two-step verification process for all smartphones.
Although facial recognition requires a lot of computing power to process images in real time, Edge Computing can mitigate this concern. Image pre-processing tasks can be completed by the device that took the picture, or much closer to the device than the data center. The device would capture the image, scan it for faces, and then extract information like a faceprint from the image. Once the faceprint has been created, it is sent to the main server for authentication and the original image is discarded.
Challenges
If this technology were to be used to authenticate identities in multiple areas, there may be large amounts of hardware required for computing power. If facial recognition technology, with millions of scanned faceprints were to be adopted by one or multiple departments, the computing capacity being used to process the requirements and match the image information with the faceprint records in the database would be extensive. From this perspective, if SSC were to support such a project, the demanded computing power to support this technology could be provided either in the form of a private or public cloud to meet the computing demands.
There are also certain factors that can limit the accuracy of facial recognition systems. If the photo was taken in profile or if the image quality is too low, there may not be enough information available for the system to extract and generate a match. Haircuts, skin color, makeup, glasses, and face coverings such as surgical masks can also lower recognition accuracy. Considering that these systems are based on Artificial Intelligence (AI), there is also the possibility of improperly “training” them.
An AI for a facial recognition system should be manually supervised to “reward” correct matches, but if the training set only consists of a very specific demographic of people it will have difficulty with detecting other types of faces. The lack of a diverse training set creates recognition biases in the programs, which makes them better at detecting and correctly identifying individuals with specific attributes over others.
These systems also have fuzzy accuracy rates, meaning that matches are never 100% accurate when doing searches, for example, in a database of images. There is the real possibility of false positives, where matches are found but they aren’t for the right person, and of false negatives, where the real match exists within the database but the system is unable to create a match.
To deal with the issue of bad lighting or faces at unrecognizable angles, some systems are altering images so that they are more “readable”.
Since the software adjusts the image before being analysed, it creates a new concern that additional false positives will be created. If an image has been touched up and edited before it was “plugged-in” to a facial recognition system, this can alter the faceprint being analysed and the search results may be biased or incorrect.
Another limitation of these systems is that it can only recognize individuals whose images are already contained within its database.
Facial recognition system technology has not yet been regulated in Canada and organizations that currently use it must operate within a specific legal framework. Under the Canadian Privacy Act, federal government institutions can only use personal information for the specific purpose for which it was collected and consent of the individual must be obtained before that information can be used for another purpose. Under PIPEDA, an organization must inform individuals and receive consent to any use of their personal information[11].
These regulations ensure that databases containing personal information belonging to different GC departments cannot be shared between departments for purposes other than the specific use for which consent was obtained.
Considerations
Any wide-scale use case developed by SSC will need to be reported to the Office of the Privacy Commissioner (OPC) for assessment. They would also need to comply with the Privacy Act and PIPEDA. Use cases must also be justified with regards to possible privacy intrusions and the OPC has suggested a four-part test to determine this:[12]
- Is the measure demonstrably necessary to meet a specific need?
- Is it likely to be effective in meeting that need?
- Would the loss of privacy be proportionate to the benefit gained?
- Is there a less privacy-invasive way of achieving the same end?
If SSC were to adopt or develop facial recognition software, the software would need to be tested for recognition biases. Meaning, that it should have uniform recognition performance across all genders, skin types, and ages. If there are any biases present, the software would need to undergo more development and could garner more associated costs. Facial recognition applications purchased from a vendor would need to be closely scrutinized and evaluated since SSC would not know exactly how the application was trained and developed. Additionally, there are no industry standards for facial recognition products, meaning that there is no benchmarked performance level that needs to be achieved before a product goes to market. If SSC were to develop the software itself, it would have complete control and knowledge over the performance of the system.
References
- ↑ [1]
- ↑ Braga, Matthew. (March 2nd, 2017). Facial Recognition Technology is coming to Canadian Airports this spring. Canadian Broadcasting Corporation. Retrieved 17-05-2019 from: [2]
- ↑ Elash, Anita, and Luk, Vivian. (July 25th, 2011). Canadian Casinos, Banks, Police use Facial-Recognition Technology. The Globe and Mail. Toronto, Ontario. Retrieved 21-05-2019 from: [3]
- ↑ Mackrael, Kim, and Ha, Tu Thanh. (May 15th, 2014) Facial Recognition Program Allows RCMP to Identify Alleged Passport Fraud. The Globe and Mail. Toronto, Ontario. Retrieved 27-05-2019 from: [4]
- ↑ Office of the Privacy Commissioner of Canada. (March 2013). Automated Facial Recognition in the Public and Private Sectors. Government of Canada. Retrieved 23-05-2019 from: [5]
- ↑ Parliament of Canada. (June 19th, 2013). Bill C-309 An Act to Amend the Criminal Code (concealment of identity). Government of Canada. Retrieved 03-06-2019 from: [6]
- ↑ Naiya, Pavel. (February 7th, 2018) More than one billion smartphones to feature facial recognition in 2020. Counterpoint technology Market Research. Hong Kong, China. Retrieved 27-05-2019 from: [7]
- ↑ Lohr, Steve. (February 9th,2018). Facial Recognition is Accurate, if You’re a White Guy. New York Times. New York, USA. Retrieved 29-05-2019 from: [8]
- ↑ Burt, Chris. (May 28th, 2019). Toronto police using facial recognition as Canadian government ponders rules. Biometrics Research Group Inc. Retrieved 29-05-2019 from: [9]
- ↑ Panasonic. (February 20th, 2018) Panasonic to Launch Face Recognition Server Software Using Deep Learning Technology. Panasonic Corporation. Kadoma, Japan. Retrieved 15-05-2019 from: [10]
- ↑ Office of the Privacy Commissioner of Canada. (March 2013). Automated Facial Recognition in the Public and Private Sectors. Government of Canada. Retrieved 23-05-2019 from: [11]/
- ↑ Office of the Privacy Commissioner of Canada. (March 2013). Automated Facial Recognition in the Public and Private Sectors. Government of Canada. Retrieved 23-05-2019 from: [12]
- ↑ Facial recognition system. (2019, July 16). Retrieved from [13]
- ↑ Gartner_Inc. (n.d.). Face Recognition Software: Anti-Terrorism Tool and More. Retrieved from [14]
- ↑ Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from [15]
- ↑ 5 Applications of Facial Recognition Technology. (2017, July 09). Retrieved from [16]
- ↑ Biometric Facial Recognition. (n.d.). Retrieved from [17]
- ↑ How Facial Recognition Systems Work. (2001, September 04). Retrieved from [18]
- ↑ Virdee-Chapman, B. (2016, May 26). 5 Companies Using Facial Recognition to Change The World. Retrieved from [19]
- ↑ Sennaar, K. (2019, May 20). Facial Recognition Applications – Security, Retail, and Beyond. Retrieved from [20]
- ↑ Facial recognition technology is coming to Canadian airports this spring | CBC News. (2017, March 06). Retrieved from [21]
- ↑ Lee, J. (2016, June 09). Canadian government used facial recognition to detect passport fraudsters. Retrieved from [22]
- ↑ Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from [23]
- ↑ Face ID Security. (2017, November). Retrieved from apple.com:[24]