Your face is the key

SMART Estate Security 2023 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management

Face is one of the easiest ways to distinguish one person from another. Even a toddler can recognise the mother’s face several days after birth. It is more intuitive to recognise a person by face than by other factors such as their walk, voice, and height.

Biometric authentication systems use physical traits such as fingerprint, face, iris and vein as a credential. Among others, facial authentication terminals use a face as a credential, which is the most familiar way for a human to recognise another person. Due to the nature of facial authentication technology, people feel comfortable performing facial authentication.

Fingerprint recognition devices, which are the most commonly used for biometric authentication, are equipped with an optical sensor. Facial authentication uses cameras to identify a person, so it does not require an optical sensor. Thus, it allows a user to perform authentication without physical contact. Since facial authentication terminals use IR (Infrared) technology, one of the major drawbacks is the limitation of installable location. A facial authentication terminal will perform poorly when it is installed outside or near windows because of the strong ambient light.

FaceStation 2, Suprema’s newest facial authentication terminal, goes beyond this limitation. It is an access control, time and attendance terminal, featuring a better user experience with Android 5.0 Lollipop and Suprema’s latest algorithm, hardware, and software. A wide range of functions and enhanced performance will provide users with a new non-contact biometric authentication experience.

Face authentication and near-infrared

Processing ambient light is critical to facial authentication performance. Most facial authentication terminals in the market have limited installable locations because the recognition performance varies depends on the strength of ambient light.

FaceStation 2 has 80 wide-angle near-infrared LEDs and 60 narrow-angle near-infrared LEDs, so it can recognise a face even in an environment with 25 000 lux, which is equivalent to an environment with full daylight (not direct sun). This allows users to install the terminals at indoor locations near windows, lobbies and building entries.

Another technology adopted by FaceStation 2 to enhance the performance is pixel intensity distribution analysis. One of the difficulties in using near-infrared LED technology is the effects of ambient lighting. Ambient lighting can make near-infrared LED lighting useless since it contains ultraviolet rays. Plus, the shadow on a face cast by ambient light can make extracting facial features difficult for the face feature extraction algorithm.

The three-dimensional pixel intensity distribution analysis minimises the effects of ambient light when acquiring facial images. As a result, the terminal acquires near-infrared images with minimal variation of contrast. It is easier for the algorithm to recognise the shape of the face with these uniform contrast images than with too bright or dark images, so it can extract more varied features, thus creating high-quality face templates. High-quality face templates are crucial for the performance of facial authentication.


Ergonomic design

The angle and position of the cameras on FaceStation 2 are determined so that tall users do not need to bend their backs too much. Plus, the different angles of view between the built-in visual and infrared cameras allow users to stand at a position that is most suitable for facial authentication (users can easily locate themselves by trying to locate their face at the correct position on the screen).

Authentication performance with 1.4 GHz quad-core processor

FaceStation 2 demonstrates exceptional performance, using its enhanced face template extraction technology and 1.4 GHz quad-core processor. It can perform up to 3000 matchings (1:N) within one second. The Group Matching feature can perform up to 30 000 matchings within one second.

Accommodating multi-RFID technologies

FaceStation 2 features multi-RFID technology, supporting 125 kHz and 13.56 MHz cards. If a customer is using 125 kHz cards such as EM and HID Prox and wants to change the access cards to more advanced and secure 13.56 MHz cards (Mifare, Mifare DESFire, Felica, iClass), then employees at the customer’s site can use both 125 kHz and 13.56 MHz during the transition period. FaceStation 2 also supports NFC and BLE communication technologies.

SIP-based VoIP videophone

FaceStation 2 also works as a SIP (session initiation protocol) videophone, eliminating the need to install a separate videophone. If a SIP server is already installed at the site, you can use the existing SIP infrastructure. Otherwise, customers can install a well-known open-source SIP server recommended and tested by Suprema to use FaceStation 2 as a videophone.

Live Face Detection

FaceStation 2 analyses the actual photo and the IR image based on its dual camera system and intelligent machine learning algorithm. Hardware-dependent live face detection systems (e.g., facial thermogram recognition, facial vein recognition) require expensive hardware components and provide less accurate matches and slower performance in authentication. Suprema’s live face detection technology gives users ideal accuracy and speed for access control and time and attendance management.

Find out more at www.securitysa.com/*suprema6. The company also has a guideline for facial authentication at www.securitysa.com/*suprema7.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Videofied SA Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...