Your face is the key

SMART Estate Security 2023 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management, Risk Management & Resilience

Face is one of the easiest ways to distinguish one person from another. Even a toddler can recognise the mother’s face several days after birth. It is more intuitive to recognise a person by face than by other factors such as their walk, voice, and height.

Biometric authentication systems use physical traits such as fingerprint, face, iris and vein as a credential. Among others, facial authentication terminals use a face as a credential, which is the most familiar way for a human to recognise another person. Due to the nature of facial authentication technology, people feel comfortable performing facial authentication.

Fingerprint recognition devices, which are the most commonly used for biometric authentication, are equipped with an optical sensor. Facial authentication uses cameras to identify a person, so it does not require an optical sensor. Thus, it allows a user to perform authentication without physical contact. Since facial authentication terminals use IR (Infrared) technology, one of the major drawbacks is the limitation of installable location. A facial authentication terminal will perform poorly when it is installed outside or near windows because of the strong ambient light.

FaceStation 2, Suprema’s newest facial authentication terminal, goes beyond this limitation. It is an access control, time and attendance terminal, featuring a better user experience with Android 5.0 Lollipop and Suprema’s latest algorithm, hardware, and software. A wide range of functions and enhanced performance will provide users with a new non-contact biometric authentication experience.

Face authentication and near-infrared

Processing ambient light is critical to facial authentication performance. Most facial authentication terminals in the market have limited installable locations because the recognition performance varies depends on the strength of ambient light.

FaceStation 2 has 80 wide-angle near-infrared LEDs and 60 narrow-angle near-infrared LEDs, so it can recognise a face even in an environment with 25 000 lux, which is equivalent to an environment with full daylight (not direct sun). This allows users to install the terminals at indoor locations near windows, lobbies and building entries.

Another technology adopted by FaceStation 2 to enhance the performance is pixel intensity distribution analysis. One of the difficulties in using near-infrared LED technology is the effects of ambient lighting. Ambient lighting can make near-infrared LED lighting useless since it contains ultraviolet rays. Plus, the shadow on a face cast by ambient light can make extracting facial features difficult for the face feature extraction algorithm.

The three-dimensional pixel intensity distribution analysis minimises the effects of ambient light when acquiring facial images. As a result, the terminal acquires near-infrared images with minimal variation of contrast. It is easier for the algorithm to recognise the shape of the face with these uniform contrast images than with too bright or dark images, so it can extract more varied features, thus creating high-quality face templates. High-quality face templates are crucial for the performance of facial authentication.


Ergonomic design

The angle and position of the cameras on FaceStation 2 are determined so that tall users do not need to bend their backs too much. Plus, the different angles of view between the built-in visual and infrared cameras allow users to stand at a position that is most suitable for facial authentication (users can easily locate themselves by trying to locate their face at the correct position on the screen).

Authentication performance with 1.4 GHz quad-core processor

FaceStation 2 demonstrates exceptional performance, using its enhanced face template extraction technology and 1.4 GHz quad-core processor. It can perform up to 3000 matchings (1:N) within one second. The Group Matching feature can perform up to 30 000 matchings within one second.

Accommodating multi-RFID technologies

FaceStation 2 features multi-RFID technology, supporting 125 kHz and 13.56 MHz cards. If a customer is using 125 kHz cards such as EM and HID Prox and wants to change the access cards to more advanced and secure 13.56 MHz cards (Mifare, Mifare DESFire, Felica, iClass), then employees at the customer’s site can use both 125 kHz and 13.56 MHz during the transition period. FaceStation 2 also supports NFC and BLE communication technologies.

SIP-based VoIP videophone

FaceStation 2 also works as a SIP (session initiation protocol) videophone, eliminating the need to install a separate videophone. If a SIP server is already installed at the site, you can use the existing SIP infrastructure. Otherwise, customers can install a well-known open-source SIP server recommended and tested by Suprema to use FaceStation 2 as a videophone.

Live Face Detection

FaceStation 2 analyses the actual photo and the IR image based on its dual camera system and intelligent machine learning algorithm. Hardware-dependent live face detection systems (e.g., facial thermogram recognition, facial vein recognition) require expensive hardware components and provide less accurate matches and slower performance in authentication. Suprema’s live face detection technology gives users ideal accuracy and speed for access control and time and attendance management.

Find out more at www.securitysa.com/*suprema6. The company also has a guideline for facial authentication at www.securitysa.com/*suprema7.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
What you can expect from digital identity in 2024
Access Control & Identity Management Security Services & Risk Management
As biometric identity becomes a central tenet in secure access to finance, government, telecommunications, healthcare services and more, 2024 is expected to be a year where biometrics evolve and important regulatory conversations occur.

Read more...
AI-driven identity verification for access control
C3 Shared Services Editor's Choice
Facial authentication solutions combine advanced AI and 3D sensing technologies with ease of use to create a frictionless, touchless experience. The deployment of this technology in an access control system keeps users and administration moving.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Eliminate privacy concerns and enhance security
Suprema Access Control & Identity Management IoT & Automation
Suprema’s Template on Mobile enables secure access to corporate facilities and assets using facial recognition biometric devices, while protecting users’ privacy.

Read more...
Prepare for cyber-physical attacks
Gallagher Information Security Access Control & Identity Management
As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
PQC, AI & sustainability: five cybersecurity trends for 2024
Editor's Choice
In this article, Nils Gerhardt looks at some of the most important developments that Utimaco experts see coming in 2024, both in technology and the wider world it intersects with.

Read more...