Changes

Jump to navigation Jump to search
no edit summary
Line 18: Line 18:  
               <th>[[Tendances_Technologiques|Tendances Technologiques]]</th>
 
               <th>[[Tendances_Technologiques|Tendances Technologiques]]</th>
 
               <th> / </th>
 
               <th> / </th>
               <th>[[Tendances_Technologiques|Reconnaissance de Visage]]</th>
+
               <th>[[Tendances_Technologiques/Reconnaissance_Faciale|Reconnaissance Faciale]]</th>
 
             </tr>
 
             </tr>
 
           </table>
 
           </table>
Line 26: Line 26:  
       <tr>
 
       <tr>
 
         <th>Status</th>
 
         <th>Status</th>
         <td>Translation</td>
+
         <td>Published</td>
 
       </tr>
 
       </tr>
 
       <tr>
 
       <tr>
Line 38: Line 38:  
       <tr>
 
       <tr>
 
         <th>Official publication</th>
 
         <th>Official publication</th>
         <td>[[Media:EN_-_Face_Recognition_v0.1_EN.pdf|Face Recognition.pdf]]</td>
+
         <td>[[Media:EN_-_Technology_Trends_-_Face_Recognition.pdf|Face Recognition.pdf]]</td>
 
       </tr>
 
       </tr>
 
       <tr><td colspan="2" class="disclaimer"><table><tr>
 
       <tr><td colspan="2" class="disclaimer"><table><tr>
Line 47: Line 47:  
   </div>
 
   </div>
   −
   <br><p><b>Face Recognition</b> is a biometric technology that is used to establish an individual identity and capable of uniquely identifying and verifying a person. It uses a computer application, which is also known as a facial recognition system, to extract a digital image from a picture, video frame or 3D scan and create a faceprint, a set of characteristic measurements of a face structure, that uniquely identifies one person’s particular face for identity and authentication purposes. </p>
+
   <p><b>Face Recognition</b> is a biometric technology that is used to establish an individual identity and capable of uniquely identifying and verifying a person. It uses a computer application, which is also known as a facial recognition system, to extract a digital image from a picture, video frame or 3D scan and create a faceprint, a set of characteristic measurements of a face structure, that uniquely identifies one person’s particular face for identity and authentication purposes. </p>
    
   <div class="mw-collapsible-toggle btn" style="float: left; display: block;">
 
   <div class="mw-collapsible-toggle btn" style="float: left; display: block;">
Line 54: Line 54:     
   <h2>Business Brief</h2>
 
   <h2>Business Brief</h2>
<p class="expand inline mw-collapsible-content">  Generally, the authentication and identification is done by matching the corresponding facial features to the faceprints stored in a database record. </p><p class="inline">The facial recognition technology has a wide variety of applications in access control, surveillance, and criminal investigations. It is also used in combination with other biometric technology to improve and enhance security measures.</p>
+
  <p class="expand inline mw-collapsible-content">  Generally, the authentication and identification is done by matching the corresponding facial features to the faceprints stored in a database record. </p><p class="inline">The facial recognition technology has a wide variety of applications in access control, surveillance, and criminal investigations. It is also used in combination with other biometric technology to improve and enhance security measures.</p>
  <p class="inline-spacer"></p>
+
    <p class="inline-spacer"></p>
  <p class="expand inline mw-collapsible-content">Major technology companies like Apple, Google, Samsung, Facebook, and Amazon have begun to realize the impact that facial recognition can have on their existing security infrastructure. </p><p class="inline">Apple has been attempting to add movement capabilities to the system. The subject of a scanned face can now be talking or moving during the scan, which allows facial recognition to combine with other biometric security measures like voice recognition. Since moving subjects can be scanned, individuals can be identified in a crowd without intrusion by using facial recognition systems.</p>
+
    <p class="expand inline mw-collapsible-content">Major technology companies like Apple, Google, Samsung, Facebook, and Amazon have begun to realize the impact that facial recognition can have on their existing security infrastructure. </p><p class="inline">Apple has been attempting to add movement capabilities to the system. The subject of a scanned face can now be talking or moving during the scan, which allows facial recognition to combine with other biometric security measures like voice recognition. Since moving subjects can be scanned, individuals can be identified in a crowd without intrusion by using facial recognition systems.</p>
  <h2>Technology Brief</h2>
+
    <h2>Technology Brief</h2>
<p class="inline">Facial recognition systems can use either a 2D/3D image or video feed to create a digital image, establish the faceprint, and identify a face by comparing its digital image with the faceprints in a database. Every face has several “landmarks” and the system will flag these as “nodal points”. A human face can have up to 80 of these points.  They represent areas of interest on the face that the system measures. </p><p class="expand inline mw-collapsible-content">Some examples of these measurements would be, distance between the eyes, width of the nose, depth of the eye socket, and more. These measurements will be stored in a database as a faceprint. </p><p class="inline">When the system scans a face, it will compare all these measurements to the records, faceprints, in the database. </p><p class="expand inline mw-collapsible-content">Facial recognition systems employ an algorithm, such as the Facial Recognition Vendor Test, that can predict whether there’s a match based on the “nodal points” on an individual’s face. </p><p class="inline">Usually, there is a 4-stage process involved in the operation of this technology <ref><i>[http://www.ex-sight.com/technology.html]</i></ref>: </p>
+
  <p class="inline">Facial recognition systems can use either a 2D/3D image or video feed to create a digital image, establish the faceprint, and identify a face by comparing its digital image with the faceprints in a database. Every face has several “landmarks” and the system will flag these as “nodal points”. A human face can have up to 80 of these points.  They represent areas of interest on the face that the system measures. </p><p class="expand inline mw-collapsible-content">Some examples of these measurements would be, distance between the eyes, width of the nose, depth of the eye socket, and more. These measurements will be stored in a database as a faceprint. </p><p class="inline">When the system scans a face, it will compare all these measurements to the records, faceprints, in the database. </p><p class="expand inline mw-collapsible-content">Facial recognition systems employ an algorithm, such as the Facial Recognition Vendor Test, that can predict whether there’s a match based on the “nodal points” on an individual’s face. </p><p class="inline">Usually, there is a 4-stage process involved in the operation of this technology <ref><i>[http://www.ex-sight.com/technology.html]</i></ref>: </p>
<p>Capture – a physical or behavioral sample is captured by the system during enrolment</p>
+
  <ul>
<p>Extraction – Unique data is extracted from the sample and a template is created</p>
+
    <li><b>Capture</b> – a physical or behavioral sample is captured by the system during enrolment</li>
<p>Comparison – the template is then compared with a new sample</p>
+
    <li><b>Extraction</b> – Unique data is extracted from the sample and a template is created</li>
<p>Matching – the system then decides if the feature extracted from the new sample is a match or not</p>
+
    <li><b>Comparison</b> – the template is then compared with a new sample</li>
 +
    <li><b>Matching</b> – the system then decides if the feature extracted from the new sample is a match or not</li>
 +
  </ul>
 +
 
 
   <h2>Industry Usage</h2>
 
   <h2>Industry Usage</h2>
 
   <p class="inline">Facial recognition offers another form of biometric identification and authentication. Several vendors have been leveraging face recognition as an access control and authentication tool either for their clients or for internal use. Its application is not limited to a form of security measure, but it can also be used for healthcare and retail.</p><p class="expand inline mw-collapsible-content"> Although 2D face recognition may not be as accurate as other forms of biometric technology like fingerprint readers, it does have its advantages. </p><p class="inline">The subject of a scanned face does not have to know when they were scanned, which demonstrates that the technology can be used in large crowds to identify threats quickly.</p>
 
   <p class="inline">Facial recognition offers another form of biometric identification and authentication. Several vendors have been leveraging face recognition as an access control and authentication tool either for their clients or for internal use. Its application is not limited to a form of security measure, but it can also be used for healthcare and retail.</p><p class="expand inline mw-collapsible-content"> Although 2D face recognition may not be as accurate as other forms of biometric technology like fingerprint readers, it does have its advantages. </p><p class="inline">The subject of a scanned face does not have to know when they were scanned, which demonstrates that the technology can be used in large crowds to identify threats quickly.</p>
Line 69: Line 72:  
   <p>After purchasing Face.com in 2012, Facebook began using facial recognition technology to connect users with their photos. When a user uploads a photo, the software will automatically suggest other people to tag. When you are tagged in a photo, more content is shown in a grouped format about other tagged individuals. </p>
 
   <p>After purchasing Face.com in 2012, Facebook began using facial recognition technology to connect users with their photos. When a user uploads a photo, the software will automatically suggest other people to tag. When you are tagged in a photo, more content is shown in a grouped format about other tagged individuals. </p>
 
   <p class="inline">Face ID is a technology developed by Apple and introduced in iPhone X. It provides intuitive and secure authentication enabled by the state-of-the-art TrueDepth camera system with advanced technologies to accurately map the geometry of your face. With a simple glance, Face ID securely unlocks your iPhone or iPad Pro. </p><p class="expand inline mw-collapsible-content">You can use it to authorize purchases from the iTunes Store, App Store, and Apple Books, and make payments with Apple Pay.  The iPhone XR, XS, and XS Max are all packing the second-generation of Face ID, which is an updated version of the biometric authentication system that is supposed to be faster than the version introduced with the iPhone X.</p>
 
   <p class="inline">Face ID is a technology developed by Apple and introduced in iPhone X. It provides intuitive and secure authentication enabled by the state-of-the-art TrueDepth camera system with advanced technologies to accurately map the geometry of your face. With a simple glance, Face ID securely unlocks your iPhone or iPad Pro. </p><p class="expand inline mw-collapsible-content">You can use it to authorize purchases from the iTunes Store, App Store, and Apple Books, and make payments with Apple Pay.  The iPhone XR, XS, and XS Max are all packing the second-generation of Face ID, which is an updated version of the biometric authentication system that is supposed to be faster than the version introduced with the iPhone X.</p>
    <h2>Canadian Government Use</h2>
+
  <h2>Canadian Government Use</h2>
<p class="expand mw-collapsible-content">Unlike the private sector, Government use cases for facial recognition applications are primarily related to security, specifically for identity verification and fraud prevention. For example, the Canada Border Services Agency (CBSA) has recently launched the Primary Inspection Kiosk (PIK) program where passengers entering the country from airports must check-in using self-serve kiosks<ref>Braga, Matthew. (March 2nd, 2017). Facial Recognition Technology is coming to Canadian Airports this spring. Canadian Broadcasting Corporation. Retrieved 17-05-2019 from: <i>[https://www.cbc.ca/news/technology/cbsa-canada-airports-facial-recognition-kiosk-biometrics-1.4007344]</i></ref>.  These kiosks use facial recognition in order to clear passengers. The overall shift to un-maned kiosks has bolstered security while reducing congestion at airports and has been in development since 2015. Portuguese company Vision-Box has installed 130 Kiosks in the Toronto’s Pearson International Airport. The Kiosks are designed to take biometric data in two phases - facial recognition and fingerprint biometrics. The kiosks will also be able to obtain iris data, a feature reserved for people travelling under the NEXUS program.</p>
+
  <p class="expand mw-collapsible-content">Unlike the private sector, Government use cases for facial recognition applications are primarily related to security, specifically for identity verification and fraud prevention. For example, the Canada Border Services Agency (CBSA) has recently launched the Primary Inspection Kiosk (PIK) program where passengers entering the country from airports must check-in using self-serve kiosks<ref>Braga, Matthew. (March 2nd, 2017). Facial Recognition Technology is coming to Canadian Airports this spring. Canadian Broadcasting Corporation. Retrieved 17-05-2019 from: <i>[https://www.cbc.ca/news/technology/cbsa-canada-airports-facial-recognition-kiosk-biometrics-1.4007344]</i></ref>.  These kiosks use facial recognition in order to clear passengers. The overall shift to un-maned kiosks has bolstered security while reducing congestion at airports and has been in development since 2015. Portuguese company Vision-Box has installed 130 Kiosks in the Toronto’s Pearson International Airport. The Kiosks are designed to take biometric data in two phases - facial recognition and fingerprint biometrics. The kiosks will also be able to obtain iris data, a feature reserved for people travelling under the NEXUS program.</p>
<p class="inline">Facial recognition systems are also used in provincial casinos for identifying and locking out visitors with gambling addictions who have voluntarily entered themselves into self-exclusion lists<ref>Elash, Anita, and Luk, Vivian. (July 25th, 2011). Canadian Casinos, Banks, Police use Facial-Recognition Technology. The Globe and Mail. Toronto, Ontario. Retrieved 21-05-2019 from:  <i>[https://www.theglobeandmail.com/news/national/time-to-lead/canadian-casinos-banks-police-use-facial-recognition-technology/article590998/ ]</i></ref>.  It is worth noting that the system was developed jointly with the Ontario Privacy Commissioner to ensure a privacy-by-default design. </p><p class="expand inline mw-collapsible-content">In real time, the system scans customers entering the casino and compares their images with gamblers on the self-exclusion list. If there is a match, the system notifies security and if not, the system deletes the image automatically. Access to the database is restricted and information about an individual is only accessible if the person in the picture is physically present.</p>
+
  <p class="inline">Facial recognition systems are also used in provincial casinos for identifying and locking out visitors with gambling addictions who have voluntarily entered themselves into self-exclusion lists<ref>Elash, Anita, and Luk, Vivian. (July 25th, 2011). Canadian Casinos, Banks, Police use Facial-Recognition Technology. The Globe and Mail. Toronto, Ontario. Retrieved 21-05-2019 from:  <i>[https://www.theglobeandmail.com/news/national/time-to-lead/canadian-casinos-banks-police-use-facial-recognition-technology/article590998/ ]</i></ref>.  It is worth noting that the system was developed jointly with the Ontario Privacy Commissioner to ensure a privacy-by-default design. </p><p class="expand inline mw-collapsible-content">In real time, the system scans customers entering the casino and compares their images with gamblers on the self-exclusion list. If there is a match, the system notifies security and if not, the system deletes the image automatically. Access to the database is restricted and information about an individual is only accessible if the person in the picture is physically present.</p>
<p class="inline">Passport Canada has been using facial recognition software for the past decade to compare new passport photos against its database to prevent passport fraud. One to one (1:1) comparisons are done to confirm a person’s identity, meaning that a recently taken image is compared to one already in the database that is associated with that person’s identity. One to many (1:N) comparisons are done to compare an image against the entire database of passport photos to make sure there are no duplicate applicants or individuals with multiple identities<ref>Mackrael, Kim, and Ha, Tu Thanh. (May 15th, 2014) Facial Recognition Program Allows RCMP to Identify Alleged Passport Fraud. The Globe and Mail. Toronto, Ontario. Retrieved 27-05-2019 from: <i>[https://www.theglobeandmail.com/news/national/facial-recognition-program-allows-rcmp-to-nab-alleged-passport-fraudster/article18703608/]</i></ref>.  </p><p class="expand inline mw-collapsible-content">This initiative has been successfully used to catch individuals attempting to obtain multiple passports. This same concept is also used for driver’s licences being issued at the provincial level<ref>Office of the Privacy Commissioner of Canada. (March 2013). Automated Facial Recognition in the Public and Private Sectors. Government of Canada. Retrieved 23-05-2019 from: <i>[https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/fr_201303/]</i></ref>. </p>
+
  <p class="inline">Passport Canada has been using facial recognition software for the past decade to compare new passport photos against its database to prevent passport fraud. One to one (1:1) comparisons are done to confirm a person’s identity, meaning that a recently taken image is compared to one already in the database that is associated with that person’s identity. One to many (1:N) comparisons are done to compare an image against the entire database of passport photos to make sure there are no duplicate applicants or individuals with multiple identities<ref>Mackrael, Kim, and Ha, Tu Thanh. (May 15th, 2014) Facial Recognition Program Allows RCMP to Identify Alleged Passport Fraud. The Globe and Mail. Toronto, Ontario. Retrieved 27-05-2019 from: <i>[https://www.theglobeandmail.com/news/national/facial-recognition-program-allows-rcmp-to-nab-alleged-passport-fraudster/article18703608/]</i></ref>.  </p><p class="expand inline mw-collapsible-content">This initiative has been successfully used to catch individuals attempting to obtain multiple passports. This same concept is also used for driver’s licences being issued at the provincial level<ref>Office of the Privacy Commissioner of Canada. (March 2013). Automated Facial Recognition in the Public and Private Sectors. Government of Canada. Retrieved 23-05-2019 from: <i>[https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2013/fr_201303/]</i></ref>. </p>
<p>Bill C-309, An Act to Amend the Criminal Code has made the concealment of identity (using masks or disguises) unlawful while participating in riots or unlawful assemblies<ref> Parliament of Canada. (June 19th, 2013). Bill C-309 An Act to Amend the Criminal Code (concealment of identity). Government of Canada. Retrieved 03-06-2019 from: <i>[https://www.parl.ca/LegisInfo/BillDetails.aspx?Bill=C309&Language=E&Mode=1&Parl=41&Ses=1 ]</i></ref>.  Although the Privacy Act and PIPEDA (Personal Information Protection and Electronic Documents Act) state that consent must be obtained before private information is collected, Bill C-309 paves the way for law enforcement to scan large crowds using facial recognition software and uncover the identities of participants.</p>
+
  <p>Bill C-309, An Act to Amend the Criminal Code has made the concealment of identity (using masks or disguises) unlawful while participating in riots or unlawful assemblies<ref> Parliament of Canada. (June 19th, 2013). Bill C-309 An Act to Amend the Criminal Code (concealment of identity). Government of Canada. Retrieved 03-06-2019 from: <i>[https://www.parl.ca/LegisInfo/BillDetails.aspx?Bill=C309&Language=E&Mode=1&Parl=41&Ses=1 ]</i></ref>.  Although the Privacy Act and PIPEDA (Personal Information Protection and Electronic Documents Act) state that consent must be obtained before private information is collected, Bill C-309 paves the way for law enforcement to scan large crowds using facial recognition software and uncover the identities of participants.</p>
    
   <h2>Implications for Government Agencies</h2>
 
   <h2>Implications for Government Agencies</h2>
Line 108: Line 111:  
   <p>If SSC were to adopt or develop facial recognition software, the software would need to be tested for recognition biases. Meaning, that it should have uniform recognition performance across all genders, skin types, and ages. If there are any biases present, the software would need to undergo more development and could garner more associated costs. Facial recognition applications purchased from a vendor would need to be closely scrutinized and evaluated since SSC would not know exactly how the application was trained and developed. Additionally, there are no industry standards for facial recognition products, meaning that there is no benchmarked performance level that needs to be achieved before a product goes to market. If SSC were to develop the software itself, it would have complete control and knowledge over the performance of the system.</p>
 
   <p>If SSC were to adopt or develop facial recognition software, the software would need to be tested for recognition biases. Meaning, that it should have uniform recognition performance across all genders, skin types, and ages. If there are any biases present, the software would need to undergo more development and could garner more associated costs. Facial recognition applications purchased from a vendor would need to be closely scrutinized and evaluated since SSC would not know exactly how the application was trained and developed. Additionally, there are no industry standards for facial recognition products, meaning that there is no benchmarked performance level that needs to be achieved before a product goes to market. If SSC were to develop the software itself, it would have complete control and knowledge over the performance of the system.</p>
 
   <p class="expand mw-collapsible-content">Lastly, it is important to consider the legal context of any facial recognition systems deployed within SSC. Presently, the technology is not regulated and performance standards have not been set for developers. The legal landscape could change by the time SSC is ready to adopt the technology. An ongoing privacy assessment of current service offerings may help provide a better understanding of the impact that facial recognition technology would have.</p>
 
   <p class="expand mw-collapsible-content">Lastly, it is important to consider the legal context of any facial recognition systems deployed within SSC. Presently, the technology is not regulated and performance standards have not been set for developers. The legal landscape could change by the time SSC is ready to adopt the technology. An ongoing privacy assessment of current service offerings may help provide a better understanding of the impact that facial recognition technology would have.</p>
<h2>References</h2>
  −
<div style="display: none">
      +
  <h2>References</h2>
 +
 +
  <div style="display: none">
 +
    <ref>Facial recognition system. (2019, July 16). Retrieved from <i>[https://en.wikipedia.org/wiki/Facial_recognition_system]</i></ref>
 +
    <ref>Gartner_Inc. (n.d.). Face Recognition Software: Anti-Terrorism Tool and More. Retrieved from <i>[https://www.gartner.com/doc/341020/face-recognition-software-antiterrorism-tool]</i></ref>
 +
    <ref>Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from <i>[https://www.upwork.com/hiring/for-clients/pros-cons-facial-recognition-technology-business/]</i></ref>
 +
    <ref>5 Applications of Facial Recognition Technology. (2017, July 09). Retrieved from <i>[https://disruptionhub.com/5-applications-facial-recognition-technology/]</i></ref>
 +
    <ref>Biometric Facial Recognition. (n.d.). Retrieved from <i>[https://findbiometrics.com/solutions/facial-recognition/]</i></ref>
 +
    <ref>How Facial Recognition Systems Work. (2001, September 04). Retrieved from <i>[https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition2.htm]</i></ref>
 +
    <ref>Virdee-Chapman, B. (2016, May 26). 5 Companies Using Facial Recognition to Change The World. Retrieved from <i>[https://www.kairos.com/blog/5-companies-using-facial-recognition-to-change-the-world]</i></ref>
 +
    <ref>Sennaar, K. (2019, May 20). Facial Recognition Applications – Security, Retail, and Beyond. Retrieved from <i>[https://www.techemergence.com/facial-recognition-applications/]</i></ref>
 +
    <ref>Facial recognition technology is coming to Canadian airports this spring | CBC News. (2017, March 06). Retrieved from <i>[http://www.cbc.ca/news/technology/cbsa-canada-airports-facial-recognition-kiosk-biometrics-1.4007344]</i></ref>
 +
    <ref>Lee, J. (2016, June 09). Canadian government used facial recognition to detect passport fraudsters. Retrieved from <i>[https://www.biometricupdate.com/201606/canadian-government-used-facial-recognition-to-detect-passport-fraudsters]</i></ref>
 +
    <ref>Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from <i>[https://www.upwork.com/hiring/for-clients/pros-cons-facial-recognition-technology-business/]</i></ref>
 +
    <ref>Face ID Security. (2017, November). Retrieved from apple.com:<i>[https://www.apple.com/ca/business-docs/FaceID_Security_Guide.pdf]</i></ref>
 +
  </div>
   −
<ref>Facial recognition system. (2019, July 16). Retrieved from <i>[https://en.wikipedia.org/wiki/Facial_recognition_system]</i></ref>
  −
<ref>Gartner_Inc. (n.d.). Face Recognition Software: Anti-Terrorism Tool and More. Retrieved from <i>[https://www.gartner.com/doc/341020/face-recognition-software-antiterrorism-tool]</i></ref>
  −
<ref>Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from <i>[https://www.upwork.com/hiring/for-clients/pros-cons-facial-recognition-technology-business/]</i></ref>
  −
<ref>5 Applications of Facial Recognition Technology. (2017, July 09). Retrieved from <i>[https://disruptionhub.com/5-applications-facial-recognition-technology/]</i></ref>
  −
<ref>Biometric Facial Recognition. (n.d.). Retrieved from <i>[https://findbiometrics.com/solutions/facial-recognition/]</i></ref>
  −
<ref>How Facial Recognition Systems Work. (2001, September 04). Retrieved from <i>[https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition2.htm]</i></ref>
  −
<ref>Virdee-Chapman, B. (2016, May 26). 5 Companies Using Facial Recognition to Change The World. Retrieved from <i>[https://www.kairos.com/blog/5-companies-using-facial-recognition-to-change-the-world]</i></ref>
  −
<ref>Sennaar, K. (2019, May 20). Facial Recognition Applications – Security, Retail, and Beyond. Retrieved from <i>[https://www.techemergence.com/facial-recognition-applications/]</i></ref>
  −
<ref>Facial recognition technology is coming to Canadian airports this spring | CBC News. (2017, March 06). Retrieved from <i>[http://www.cbc.ca/news/technology/cbsa-canada-airports-facial-recognition-kiosk-biometrics-1.4007344]</i></ref>
  −
<ref>Lee, J. (2016, June 09). Canadian government used facial recognition to detect passport fraudsters. Retrieved from <i>[https://www.biometricupdate.com/201606/canadian-government-used-facial-recognition-to-detect-passport-fraudsters]</i></ref>
  −
<ref>Solutions, T. (2018, September 25). Pros and Cons of Facial Recognition Technology For Your Business. Retrieved from <i>[https://www.upwork.com/hiring/for-clients/pros-cons-facial-recognition-technology-business/]</i></ref>
  −
<ref>Face ID Security. (2017, November). Retrieved from apple.com:<i>[https://www.apple.com/ca/business-docs/FaceID_Security_Guide.pdf]</i></ref>
  −
</div>
   
</div>
 
</div>
  

Navigation menu

GCwiki