Black technology makes a sound again, how powerful is face recognition?

Date:2019-12-04



On January 14, the 2018 general college entrance examination of art in Guangdong Province was held. For the first time this year, the "face recognition system" was used in the unified examination, and all examinees were verified by "face brushing" in the examination room. Compared with the previous fingerprint identification, the process is more convenient, and each candidate only needs 2 to 3 seconds to "cross the machine".

b89e5ba71e734534a36f154d92395700.jpeg


Why face recognition?

Traditional authentication methods include ID card, voice and fingerprint. But the traditional authentication method has many limitations. For example:

1. ID card. The ID card is small, easy to carry, but easy to lose. There are also many cases of fraud on the Internet. Especially since 2012, the railway department has gradually strengthened the verification of identity card and its own identity. For those who need to travel far away, once the ID card is lost or forgotten to carry, it will be very troublesome to buy a ticket and check in the car.


1964711874b54025b104f79acbedccdb.jpeg


2. Voice. In the past few years, online fraud in the name of borrowing has emerged in an endless stream, not only using other people's social platforms, but also committing crimes by acquaintances. By recording audio and then processing it, voice is sent for fraud.


1d75d6e9623c423d91229c9787ee73a8.jpeg


3. Fingerprints. Compared with ID card and voice, fingerprint is more used to encrypt personal information and check personal data. Just like in recent years, fingerprint verification is needed before the entrance examination to continue the examination. But with the rise of smart phones, fingerprints are also widely used for unlocking and quick payment. But at the same time, there are also illegal transactions of "fingerprint inversion", which makes fingerprint not safe.


b7da0fa890524dcfb4a099443c141ab6.jpeg


Therefore, in order to carry out the verification method with more personal characteristics, the "face recognition" is gradually implemented.


26268db5b49b4a6e9facb65ffc38a0dd.jpeg


How does face recognition work?

1. Firstly, face information is collected by camera and processed into static or dynamic images;


bb087026ecfb465f813a084cdf916224.jpeg


2. Secondly, through the computer preprocessing system, the collected images are corrected. It mainly includes light compensation, gray-scale transformation, histogram equalization, normalization, geometric correction, filtering and sharpening. In order to eliminate the deviation caused by environment and light;


7260341070764640b31cfd152303fa72.jpeg


3. Then, according to the shape description of face organs and the distance between them, the feature data which is helpful for face classification is obtained, and then the face is modeled. The feature components usually include Euclidean distance, curvature and angle between feature points. For example, how many degrees is the angle between a person's glasses and his mouth;


acfcc94640844dfbb3d1e37e469f3e9a.jpeg


4. Finally, recognition, according to the collected face representation and modeling features, recognize and match the human face, and check the personal information.


0c74216ac3c446c089b8a22695e48857.jpeg


What can face recognition system be applied to?

1. Public security criminal investigation

Through face recognition, it will be helpful for the public security organs to compare the target portrait data with the feedback data of key screening places, so as to arrest the fugitives or pre screen the terrorists.


7fc6336e2c2143d4b836113fdfab7098.jpeg


2. Access control system

Using face recognition system in protected areas, such as residential and enterprise, can identify the identity of the person trying to enter conveniently and quickly, and reduce the risk.

a580e8040edf47cb9ac6a81faa8954fc.jpeg


3. Identification

By issuing e-passport or ID card, face recognition is carried out in the place where id card or passport needs to be presented, and relevant personal information is automatically retrieved to avoid damage or loss of passport or ID card.


b0e432ddba5c46d5b325034e624de1ff.jpeg


4. Online payment

To avoid fingerprint or password easily to be cracked, through the face recognition system encryption, to prevent non-user use of mobile phones bring adverse consequences.


e2bee2334de140e3847429d093916d05.jpeg