Your face tells a story

Access & Identity Management Handbook 2019 Access Control & Identity Management, Surveillance, Government and Parastatal (Industry)

There are many companies offering facial recognition today, most of them incorporating some form of artificial intelligence into their identification and authentication offerings. Unfortunately, facial recognition has not gained the best reputation over the years, although there are some success stories in controlled environments.

NEC XON held its seventh annual summit at Sun City in October and mixed in with the various discussions on Industry 4.0, safe cities and artificial intelligence (among other topics), facial recognition gathered more than a few mentions as a non-intrusive and reliable identification mechanism of the future.

Bertus Marais
Bertus Marais

Following the summit, Hi-Tech Security Solutions spoke to Bertus Marais, GM, public safety and security at NEC XON about facial recognition and NEC’s work in this regard.

When considering the previous lack of reliability of facial recognition, due in large part to issues such as uncontrolled lighting or people not looking directly at the camera, or wearing caps and other clothing that hides part of the face, Marais says environmental difficulties have always played a role and will continue to do so.

However, he adds that the algorithms behind facial recognition have improved so remarkably that things like the angle of a person’s face or the lighting make much less difference today. The camera hardware has also improved and continues to do so, but the biggest improvements have been in the algorithms that work behind the scenes to interpret the data they receive.

Indirect and old views

The issue of lighting and whether the subject is looking directly at the camera, or if he/she is wearing sunglasses or a cap (and even ageing) is no longer as big a hindrance to facial biometrics. Marais says NEC has made huge inroads in this regard.

“Performance will always be best if you have a fully visible and well-lit frontal image and an image pair within five to 10 years of each other, for example a passport and source that are maximum 10 years apart. However, the real world does not always work like that.

“In the real world people wear hats and glasses, their faces are often partially obscured, often at an angle and presented in various lighting conditions. The more the image of the face deviates from perfect, or the bigger the age gap becomes, the lower the match scores. A weak algorithm will deviate widely between good and poor quality images, while a strong algorithm’s accuracy will tail off, but with a gradual and predictable drop.”

When a face is enrolled into the NEC facial biometric system, he says the AI-enabled technology automatically simulates how the face would look, not only in ideal conditions, but also in a variety of lighting conditions and angles. Additionally, the technology does not need to see all of the face to get a good match.

Ageing does impact the match scores, but the tail-off is very predictable; we have many examples of a 30+ year age gap still yielding successful results. “As a general rule, if a human could identify someone from the facial picture, our algorithm is highly likely to as well; this usually translates to about 70% of the face being visible. Unlike a human, the algorithms can do this against many thousands of faces in real-time.”

Privacy and facial biometrics

If we assume that facial biometrics work well, the privacy issues of using it in public spaces needs to be addressed as there will be nothing to stop anyone from identifying you anywhere if there are no rules to manage the use of the technology.

Facial recognition offers a unique platform that can help in many areas of society, notes Marais, from providing benefits such as national security, law enforcement, and more. Other examples include speeding up and streamlining a traveller’s airport experience, to reducing fraud in the financial sector, to ensuring that aid reaches the intended recipient after a disaster, to ensuring that a self-registered problem gambler can get the help they need, all the way through to hospitality, VIP solutions and beyond. All of these areas offer a unique opportunity to provide benefits to society, but each has a very different context and use-case. These must be addresses with a privacy model appropriate to the use-case.

“The key to this question is, “What is the context of the use-case?” It is reasonable to assume that a national security agency acting on firm intelligence responding to a potential life-endangering scenario will take a very different view to a local retail outlet using the technology to provide a VIP customer experience,” states Marais. “Different use-cases will take different approaches to areas such as where the cameras are placed, what they are used for, who is captured, what records are stored, what records are enrolled, data retention periods, encryption and security, alerting mechanisms, audit, etc.

“As with all technologies, robust regulatory frameworks and policies should be encouraged to drive ethical and responsible adoption,” he continues. “The public, governments, corporations and customers have a role to play in this area. From a technological standpoint, the system is taking the exact same data as a regular CCTV camera; in fact, it is storing less information as most facial recognition systems tend not to store the entire video, but rather just the faces. The underlying point is that use of any facial recognition system should be subject to an appropriate level of control; this comes down to context of the use case and the governing frameworks.”

Facial biometrics closer to home?

Most of the concepts of facial recognition we hear about are in a safe-city scenario or being used in airports or public transport, but what about identity authentication in the workplace or even at home? Could your laptop’s webcam act as a touchless authentication mechanism to make online shopping or logging into your corporate network as simple as a glance?

Liveness detection is a crucial issue in this regard, adds Marais. Some specialised webcams have depth of field sensing, which is crucial to liveliness detection, but the technology is not widely adopted because it is expensive and not as mature as we would like for tasks such as identity-based access privileges to physical and virtual environments.

“Your average laptop camera or webcam is essentially a 2D view of the world. You can trick most of those into facial recognition with a good quality photograph or video of a person. The camera has no way of knowing if it’s looking at a live human being.

“Current high-end camera technology that gets a real 3D view of the world is far better and cannot be so easily tricked. But it’s expensive so it’s unusual to deploy it today. We prefer not to position facial biometrics for access control, but rather for surveillance.”

He continues, “we prefer to use a different, two-factor system for access control. For example, if the facial recognition system sees me walking past the restrooms it knows I’m not at my desk. It can check my laptop or desktop system and, if it’s still active, lock it down so nobody can access it. Or we use a fingerprint and a face check, or a normal magnetic access card combined with fingerprints or facial recognition.”

Real-world usage

Facial biometrics are being used worldwide for a number of applications, at ports of entry and exit they are used to scan hundreds of thousands of faces daily. They are used for public surveillance, such as is the case with an African authority that runs it across urban CCTV networks. They use it for safety and incident management. The same technology will be used for safety, monitoring, and management at the upcoming Olympics to be held in Japan. It’s already being used to help control hooliganism at soccer matches across Europe and it is being used for border control at several locations across Africa.

“NEC’s NeoFace Watch facial recognition software is now so advanced that it is scanning tens of thousands of faces in minutes, with many successful frames per face to record a match. That’s how fast it is,” Marais says. “But it obviously requires the right infrastructure to support it, which many cities and facilities now already have.

“You have to network all the cameras, feed the data to servers in a properly maintained data centre, analyse the huge volumes of data intelligently, return usable results with high accuracy for processing by humans so they can respond – and all of that in real time. It’s sophisticated, accurate, and dependable and organisations, from countries to cities, installations, structures and public venues can definitely use existing technologies such as CCTV and networks. They only add what’s missing from the total picture.”

For more information contact Mark Harris, NEC XON, +27 11 237-4500, mark@nec.xon.co.za, www.nec.xon.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.