Visible light facial recognition

April 2019 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Commercial (Industry)

Facial recognition is nothing new as there have been products in this field for years. The acceptance of facial recognition, on the other hand, has been limited due to the reliability of the technology in real-world situations (such as varying light conditions and the requirement to face the camera straight on), as well as the amount of processing power required to detect and identify a face.

These issues hampered the uptake of facial recognition for real-world, near real-time use. In addition to this, the many examples of people being able to fool facial recognition systems – known as spoofing – has also cast some doubt on the technology.

ZKTeco recently took a deeper step into the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products. The company says VLFR overcomes the shortcomings of previous facial recognition products and uses deep learning to improve recognition and reliability, and it is far better at catching fake faces.

ZK says its deep learning systems deals with the lighting situation, the not 100% dead-straight images of faces, as well as spoofing. By passing its recognition software through ‘continuous training’, it has been able to enhance the performance of its recognition algorithms to a stage where it is now ready for real-world use. As the company puts it: “The enhanced visible light facial recognition is rather an all-round upgraded version on previous facial recognition technology, not only qualified for general applications, but also competent for advanced recognition tasks under a dynamic environment. Especially for its cutting edge anti-spoofing function, any business with high-level security requirements will find it a more reliable technology solution over the rest.”

Capabilities in more depth

As mentioned, the VLFR system ZK developed beats fake faces through its anti-spoofing algorithm, which conducts liveness detection by learning how to differentiate lighting, texture and resolution. The system also uses two cameras. One is a visual light camera that is used for recognition and verification, the other is an infrared camera used to detect fake faces. People who try to verify a fake identity by using a picture on paper or on their phone or tablet, for example, will quickly find their access is denied. Even using a high-definition video of a face won’t be accepted.

The utility of these systems is in the flexibility of the verification process. Instead of having to stand directly in front of the cameras, people can be recognised ‘on the move’ as they approach the point of entry. The VLFR system will detect their face and track and identify them as they approach. It is also able to recognise an enrolled face with a deflection angle of 30% – left to right, and up and down. It can detect and recognise faces, more than one at a time, and it can also capture faces in a certain area, for example at a sporting event or in retail environments.

The 30% deflection means people will be recognised even if they are talking to someone next to them, walking and texting, or simply looking around. Wearing a cap or glasses will also not stop the system from its recognition job, unless the items hide a large proportion of the face.

Depending on the product chosen, the recognition process starts at a distance of 3 metres from the cameras (making it really ‘touchless’) and the verification takes 0.5 seconds, meaning access control in large buildings is possible, even outdoors. There are different ways in which an image can be captured for enrolment, one of which is the person can send a selfie of themselves.

Its facial recognition algorithm has been trained on databases with templates from more than 20 races in 180 countries. As with fingerprint biometrics, the system does not store an image of the individual’s face, but rather a template calculated from the image. The company says these templates only consume about 1 KB of storage each, meaning the onsite database is not huge and cumbersome, which means recognition is fast.

The system is also supplied with an API to allow it to be integrated with other security and business systems. This is in addition to ZK’s own management software, ZKBioSecurity, as well as the company’s ZKBioserver for template storage and retention.

VLFR systems available

ZK has integrated VLFR into various products, some new products dedicated to access control, as well as certain surveillance cameras. This means that access control is only one job these systems can perform. Currently the ZKTeco FI700, 710, and 710-L cameras have been equipped with VLFR and can support either 5000 or 20 000 facial templates on board, depending on the camera chosen. These cameras can be set up to monitor people in a variety of environments, single out blacklisted individuals or find missing persons in a mall, for example.

In the access control field, ZK has a range of products. Starting small, the SpeedFace H5 and V5 systems are designed for traditional access control and T&A tasks. They offer a 5-inch LCD display, can hold up to 6000 face templates and make use of multiple verification mechanisms – facial, fingerprint and RFID.

The FaceDepot series supports indoor or outdoor facial recognition, sporting a 7-inch LCD display and a 10 000 template capacity. The G4 is a multi-biometric attendance and access control terminal which holds up to 10 000 facial templates, 10 000 fingerprint templates and 10 000 Mifare card credentials. It also holds up to 1 000 000 transactions.

At the high end, the FaceKiosk series offers users a choice between 21-, 32- and 43-inch touch screens which can be placed in areas with heavy traffic. Some of the use cases for the kiosks include access control and attendance management, self-service kiosks, hospitality payment and queuing solutions, automatic ticket vending and so on. These products can detect faces at up to 5 metres and recognise between three and five people simultaneously, while holding 10 000 face templates.

Usage examples

While there are many instances where systems like the VLFR products can be used, Hendrik Combrinck, MD of ZKTeco SA offers three examples in which these products can streamline operations.

Event and conference registration: Using systems such as a facial recognition kiosk or the G4, conference delegates can be recognised as they arrive and provided with seating arrangements and other information. (They can register with a selfie.) The touch screen can also be used to register new visitors or collect additional information.

Know your client: In the banking world, the ‘know your client’ mantra is gaining traction and facial recognition kiosks can be used to greet people as they walk in, provide information and even direct newcomers. Should a VIP guest be recognised, the appropriate people can be notified to make sure they get the service they require.

Voter assistance: A kiosk could be used to recognise registered voters at a voting station and direct them. In time, these kiosks could even be used for electronic voting as well.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.