Your face tells a story

Access & Identity Management Handbook 2019 Access Control & Identity Management, Surveillance, Government and Parastatal (Industry)

There are many companies offering facial recognition today, most of them incorporating some form of artificial intelligence into their identification and authentication offerings. Unfortunately, facial recognition has not gained the best reputation over the years, although there are some success stories in controlled environments.

NEC XON held its seventh annual summit at Sun City in October and mixed in with the various discussions on Industry 4.0, safe cities and artificial intelligence (among other topics), facial recognition gathered more than a few mentions as a non-intrusive and reliable identification mechanism of the future.

Bertus Marais
Bertus Marais

Following the summit, Hi-Tech Security Solutions spoke to Bertus Marais, GM, public safety and security at NEC XON about facial recognition and NEC’s work in this regard.

When considering the previous lack of reliability of facial recognition, due in large part to issues such as uncontrolled lighting or people not looking directly at the camera, or wearing caps and other clothing that hides part of the face, Marais says environmental difficulties have always played a role and will continue to do so.

However, he adds that the algorithms behind facial recognition have improved so remarkably that things like the angle of a person’s face or the lighting make much less difference today. The camera hardware has also improved and continues to do so, but the biggest improvements have been in the algorithms that work behind the scenes to interpret the data they receive.

Indirect and old views

The issue of lighting and whether the subject is looking directly at the camera, or if he/she is wearing sunglasses or a cap (and even ageing) is no longer as big a hindrance to facial biometrics. Marais says NEC has made huge inroads in this regard.

“Performance will always be best if you have a fully visible and well-lit frontal image and an image pair within five to 10 years of each other, for example a passport and source that are maximum 10 years apart. However, the real world does not always work like that.

“In the real world people wear hats and glasses, their faces are often partially obscured, often at an angle and presented in various lighting conditions. The more the image of the face deviates from perfect, or the bigger the age gap becomes, the lower the match scores. A weak algorithm will deviate widely between good and poor quality images, while a strong algorithm’s accuracy will tail off, but with a gradual and predictable drop.”

When a face is enrolled into the NEC facial biometric system, he says the AI-enabled technology automatically simulates how the face would look, not only in ideal conditions, but also in a variety of lighting conditions and angles. Additionally, the technology does not need to see all of the face to get a good match.

Ageing does impact the match scores, but the tail-off is very predictable; we have many examples of a 30+ year age gap still yielding successful results. “As a general rule, if a human could identify someone from the facial picture, our algorithm is highly likely to as well; this usually translates to about 70% of the face being visible. Unlike a human, the algorithms can do this against many thousands of faces in real-time.”

Privacy and facial biometrics

If we assume that facial biometrics work well, the privacy issues of using it in public spaces needs to be addressed as there will be nothing to stop anyone from identifying you anywhere if there are no rules to manage the use of the technology.

Facial recognition offers a unique platform that can help in many areas of society, notes Marais, from providing benefits such as national security, law enforcement, and more. Other examples include speeding up and streamlining a traveller’s airport experience, to reducing fraud in the financial sector, to ensuring that aid reaches the intended recipient after a disaster, to ensuring that a self-registered problem gambler can get the help they need, all the way through to hospitality, VIP solutions and beyond. All of these areas offer a unique opportunity to provide benefits to society, but each has a very different context and use-case. These must be addresses with a privacy model appropriate to the use-case.

“The key to this question is, “What is the context of the use-case?” It is reasonable to assume that a national security agency acting on firm intelligence responding to a potential life-endangering scenario will take a very different view to a local retail outlet using the technology to provide a VIP customer experience,” states Marais. “Different use-cases will take different approaches to areas such as where the cameras are placed, what they are used for, who is captured, what records are stored, what records are enrolled, data retention periods, encryption and security, alerting mechanisms, audit, etc.

“As with all technologies, robust regulatory frameworks and policies should be encouraged to drive ethical and responsible adoption,” he continues. “The public, governments, corporations and customers have a role to play in this area. From a technological standpoint, the system is taking the exact same data as a regular CCTV camera; in fact, it is storing less information as most facial recognition systems tend not to store the entire video, but rather just the faces. The underlying point is that use of any facial recognition system should be subject to an appropriate level of control; this comes down to context of the use case and the governing frameworks.”

Facial biometrics closer to home?

Most of the concepts of facial recognition we hear about are in a safe-city scenario or being used in airports or public transport, but what about identity authentication in the workplace or even at home? Could your laptop’s webcam act as a touchless authentication mechanism to make online shopping or logging into your corporate network as simple as a glance?

Liveness detection is a crucial issue in this regard, adds Marais. Some specialised webcams have depth of field sensing, which is crucial to liveliness detection, but the technology is not widely adopted because it is expensive and not as mature as we would like for tasks such as identity-based access privileges to physical and virtual environments.

“Your average laptop camera or webcam is essentially a 2D view of the world. You can trick most of those into facial recognition with a good quality photograph or video of a person. The camera has no way of knowing if it’s looking at a live human being.

“Current high-end camera technology that gets a real 3D view of the world is far better and cannot be so easily tricked. But it’s expensive so it’s unusual to deploy it today. We prefer not to position facial biometrics for access control, but rather for surveillance.”

He continues, “we prefer to use a different, two-factor system for access control. For example, if the facial recognition system sees me walking past the restrooms it knows I’m not at my desk. It can check my laptop or desktop system and, if it’s still active, lock it down so nobody can access it. Or we use a fingerprint and a face check, or a normal magnetic access card combined with fingerprints or facial recognition.”

Real-world usage

Facial biometrics are being used worldwide for a number of applications, at ports of entry and exit they are used to scan hundreds of thousands of faces daily. They are used for public surveillance, such as is the case with an African authority that runs it across urban CCTV networks. They use it for safety and incident management. The same technology will be used for safety, monitoring, and management at the upcoming Olympics to be held in Japan. It’s already being used to help control hooliganism at soccer matches across Europe and it is being used for border control at several locations across Africa.

“NEC’s NeoFace Watch facial recognition software is now so advanced that it is scanning tens of thousands of faces in minutes, with many successful frames per face to record a match. That’s how fast it is,” Marais says. “But it obviously requires the right infrastructure to support it, which many cities and facilities now already have.

“You have to network all the cameras, feed the data to servers in a properly maintained data centre, analyse the huge volumes of data intelligently, return usable results with high accuracy for processing by humans so they can respond – and all of that in real time. It’s sophisticated, accurate, and dependable and organisations, from countries to cities, installations, structures and public venues can definitely use existing technologies such as CCTV and networks. They only add what’s missing from the total picture.”

For more information contact Mark Harris, NEC XON, +27 11 237-4500, mark@nec.xon.co.za, www.nec.xon.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From the editor's desk: When the rules change
Technews Publishing News & Events
         Welcome to the SMART Surveillance & AI Handbook 2026. We were a bit nervous about including AI in the title, since it either has a good or bad reputation depending on the individual – very few people ...

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
From false alarm filtering to intelligent decision-making
DeepAlert AI & Data Analytics Surveillance
As AI continues to evolve, the most successful surveillance operations will be those that not only reduce nuisance alerts, but also derive meaningful business intelligence from video data.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
Camera Selection Guide 2026
Camera Selection Guide Surveillance
The Camera Selection Guide 2026 features a range of cameras designed to meet a wide variety of needs and use cases for professional security operations.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.