Your face is the key

SMART Estate Security 2023 Editor's Choice, Access Control & Identity Management, Security Services & Risk Management

Face is one of the easiest ways to distinguish one person from another. Even a toddler can recognise the mother’s face several days after birth. It is more intuitive to recognise a person by face than by other factors such as their walk, voice, and height.

Biometric authentication systems use physical traits such as fingerprint, face, iris and vein as a credential. Among others, facial authentication terminals use a face as a credential, which is the most familiar way for a human to recognise another person. Due to the nature of facial authentication technology, people feel comfortable performing facial authentication.

Fingerprint recognition devices, which are the most commonly used for biometric authentication, are equipped with an optical sensor. Facial authentication uses cameras to identify a person, so it does not require an optical sensor. Thus, it allows a user to perform authentication without physical contact. Since facial authentication terminals use IR (Infrared) technology, one of the major drawbacks is the limitation of installable location. A facial authentication terminal will perform poorly when it is installed outside or near windows because of the strong ambient light.

FaceStation 2, Suprema’s newest facial authentication terminal, goes beyond this limitation. It is an access control, time and attendance terminal, featuring a better user experience with Android 5.0 Lollipop and Suprema’s latest algorithm, hardware, and software. A wide range of functions and enhanced performance will provide users with a new non-contact biometric authentication experience.

Face authentication and near-infrared

Processing ambient light is critical to facial authentication performance. Most facial authentication terminals in the market have limited installable locations because the recognition performance varies depends on the strength of ambient light.

FaceStation 2 has 80 wide-angle near-infrared LEDs and 60 narrow-angle near-infrared LEDs, so it can recognise a face even in an environment with 25 000 lux, which is equivalent to an environment with full daylight (not direct sun). This allows users to install the terminals at indoor locations near windows, lobbies and building entries.

Another technology adopted by FaceStation 2 to enhance the performance is pixel intensity distribution analysis. One of the difficulties in using near-infrared LED technology is the effects of ambient lighting. Ambient lighting can make near-infrared LED lighting useless since it contains ultraviolet rays. Plus, the shadow on a face cast by ambient light can make extracting facial features difficult for the face feature extraction algorithm.

The three-dimensional pixel intensity distribution analysis minimises the effects of ambient light when acquiring facial images. As a result, the terminal acquires near-infrared images with minimal variation of contrast. It is easier for the algorithm to recognise the shape of the face with these uniform contrast images than with too bright or dark images, so it can extract more varied features, thus creating high-quality face templates. High-quality face templates are crucial for the performance of facial authentication.


Ergonomic design

The angle and position of the cameras on FaceStation 2 are determined so that tall users do not need to bend their backs too much. Plus, the different angles of view between the built-in visual and infrared cameras allow users to stand at a position that is most suitable for facial authentication (users can easily locate themselves by trying to locate their face at the correct position on the screen).

Authentication performance with 1.4 GHz quad-core processor

FaceStation 2 demonstrates exceptional performance, using its enhanced face template extraction technology and 1.4 GHz quad-core processor. It can perform up to 3000 matchings (1:N) within one second. The Group Matching feature can perform up to 30 000 matchings within one second.

Accommodating multi-RFID technologies

FaceStation 2 features multi-RFID technology, supporting 125 kHz and 13.56 MHz cards. If a customer is using 125 kHz cards such as EM and HID Prox and wants to change the access cards to more advanced and secure 13.56 MHz cards (Mifare, Mifare DESFire, Felica, iClass), then employees at the customer’s site can use both 125 kHz and 13.56 MHz during the transition period. FaceStation 2 also supports NFC and BLE communication technologies.

SIP-based VoIP videophone

FaceStation 2 also works as a SIP (session initiation protocol) videophone, eliminating the need to install a separate videophone. If a SIP server is already installed at the site, you can use the existing SIP infrastructure. Otherwise, customers can install a well-known open-source SIP server recommended and tested by Suprema to use FaceStation 2 as a videophone.

Live Face Detection

FaceStation 2 analyses the actual photo and the IR image based on its dual camera system and intelligent machine learning algorithm. Hardware-dependent live face detection systems (e.g., facial thermogram recognition, facial vein recognition) require expensive hardware components and provide less accurate matches and slower performance in authentication. Suprema’s live face detection technology gives users ideal accuracy and speed for access control and time and attendance management.

Find out more at www.securitysa.com/*suprema6. The company also has a guideline for facial authentication at www.securitysa.com/*suprema7.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.