Visible light facial recognition

April 2019 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Commercial (Industry)

Facial recognition is nothing new as there have been products in this field for years. The acceptance of facial recognition, on the other hand, has been limited due to the reliability of the technology in real-world situations (such as varying light conditions and the requirement to face the camera straight on), as well as the amount of processing power required to detect and identify a face.

These issues hampered the uptake of facial recognition for real-world, near real-time use. In addition to this, the many examples of people being able to fool facial recognition systems – known as spoofing – has also cast some doubt on the technology.

ZKTeco recently took a deeper step into the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products. The company says VLFR overcomes the shortcomings of previous facial recognition products and uses deep learning to improve recognition and reliability, and it is far better at catching fake faces.

ZK says its deep learning systems deals with the lighting situation, the not 100% dead-straight images of faces, as well as spoofing. By passing its recognition software through ‘continuous training’, it has been able to enhance the performance of its recognition algorithms to a stage where it is now ready for real-world use. As the company puts it: “The enhanced visible light facial recognition is rather an all-round upgraded version on previous facial recognition technology, not only qualified for general applications, but also competent for advanced recognition tasks under a dynamic environment. Especially for its cutting edge anti-spoofing function, any business with high-level security requirements will find it a more reliable technology solution over the rest.”

Capabilities in more depth

As mentioned, the VLFR system ZK developed beats fake faces through its anti-spoofing algorithm, which conducts liveness detection by learning how to differentiate lighting, texture and resolution. The system also uses two cameras. One is a visual light camera that is used for recognition and verification, the other is an infrared camera used to detect fake faces. People who try to verify a fake identity by using a picture on paper or on their phone or tablet, for example, will quickly find their access is denied. Even using a high-definition video of a face won’t be accepted.

The utility of these systems is in the flexibility of the verification process. Instead of having to stand directly in front of the cameras, people can be recognised ‘on the move’ as they approach the point of entry. The VLFR system will detect their face and track and identify them as they approach. It is also able to recognise an enrolled face with a deflection angle of 30% – left to right, and up and down. It can detect and recognise faces, more than one at a time, and it can also capture faces in a certain area, for example at a sporting event or in retail environments.

The 30% deflection means people will be recognised even if they are talking to someone next to them, walking and texting, or simply looking around. Wearing a cap or glasses will also not stop the system from its recognition job, unless the items hide a large proportion of the face.

Depending on the product chosen, the recognition process starts at a distance of 3 metres from the cameras (making it really ‘touchless’) and the verification takes 0.5 seconds, meaning access control in large buildings is possible, even outdoors. There are different ways in which an image can be captured for enrolment, one of which is the person can send a selfie of themselves.

Its facial recognition algorithm has been trained on databases with templates from more than 20 races in 180 countries. As with fingerprint biometrics, the system does not store an image of the individual’s face, but rather a template calculated from the image. The company says these templates only consume about 1 KB of storage each, meaning the onsite database is not huge and cumbersome, which means recognition is fast.

The system is also supplied with an API to allow it to be integrated with other security and business systems. This is in addition to ZK’s own management software, ZKBioSecurity, as well as the company’s ZKBioserver for template storage and retention.

VLFR systems available

ZK has integrated VLFR into various products, some new products dedicated to access control, as well as certain surveillance cameras. This means that access control is only one job these systems can perform. Currently the ZKTeco FI700, 710, and 710-L cameras have been equipped with VLFR and can support either 5000 or 20 000 facial templates on board, depending on the camera chosen. These cameras can be set up to monitor people in a variety of environments, single out blacklisted individuals or find missing persons in a mall, for example.

In the access control field, ZK has a range of products. Starting small, the SpeedFace H5 and V5 systems are designed for traditional access control and T&A tasks. They offer a 5-inch LCD display, can hold up to 6000 face templates and make use of multiple verification mechanisms – facial, fingerprint and RFID.

The FaceDepot series supports indoor or outdoor facial recognition, sporting a 7-inch LCD display and a 10 000 template capacity. The G4 is a multi-biometric attendance and access control terminal which holds up to 10 000 facial templates, 10 000 fingerprint templates and 10 000 Mifare card credentials. It also holds up to 1 000 000 transactions.

At the high end, the FaceKiosk series offers users a choice between 21-, 32- and 43-inch touch screens which can be placed in areas with heavy traffic. Some of the use cases for the kiosks include access control and attendance management, self-service kiosks, hospitality payment and queuing solutions, automatic ticket vending and so on. These products can detect faces at up to 5 metres and recognise between three and five people simultaneously, while holding 10 000 face templates.

Usage examples

While there are many instances where systems like the VLFR products can be used, Hendrik Combrinck, MD of ZKTeco SA offers three examples in which these products can streamline operations.

Event and conference registration: Using systems such as a facial recognition kiosk or the G4, conference delegates can be recognised as they arrive and provided with seating arrangements and other information. (They can register with a selfie.) The touch screen can also be used to register new visitors or collect additional information.

Know your client: In the banking world, the ‘know your client’ mantra is gaining traction and facial recognition kiosks can be used to greet people as they walk in, provide information and even direct newcomers. Should a VIP guest be recognised, the appropriate people can be notified to make sure they get the service they require.

Voter assistance: A kiosk could be used to recognise registered voters at a voting station and direct them. In time, these kiosks could even be used for electronic voting as well.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.