Visible light facial recognition

April 2019 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Commercial (Industry)

Facial recognition is nothing new as there have been products in this field for years. The acceptance of facial recognition, on the other hand, has been limited due to the reliability of the technology in real-world situations (such as varying light conditions and the requirement to face the camera straight on), as well as the amount of processing power required to detect and identify a face.

These issues hampered the uptake of facial recognition for real-world, near real-time use. In addition to this, the many examples of people being able to fool facial recognition systems – known as spoofing – has also cast some doubt on the technology.

ZKTeco recently took a deeper step into the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products. The company says VLFR overcomes the shortcomings of previous facial recognition products and uses deep learning to improve recognition and reliability, and it is far better at catching fake faces.

ZK says its deep learning systems deals with the lighting situation, the not 100% dead-straight images of faces, as well as spoofing. By passing its recognition software through ‘continuous training’, it has been able to enhance the performance of its recognition algorithms to a stage where it is now ready for real-world use. As the company puts it: “The enhanced visible light facial recognition is rather an all-round upgraded version on previous facial recognition technology, not only qualified for general applications, but also competent for advanced recognition tasks under a dynamic environment. Especially for its cutting edge anti-spoofing function, any business with high-level security requirements will find it a more reliable technology solution over the rest.”

Capabilities in more depth

As mentioned, the VLFR system ZK developed beats fake faces through its anti-spoofing algorithm, which conducts liveness detection by learning how to differentiate lighting, texture and resolution. The system also uses two cameras. One is a visual light camera that is used for recognition and verification, the other is an infrared camera used to detect fake faces. People who try to verify a fake identity by using a picture on paper or on their phone or tablet, for example, will quickly find their access is denied. Even using a high-definition video of a face won’t be accepted.

The utility of these systems is in the flexibility of the verification process. Instead of having to stand directly in front of the cameras, people can be recognised ‘on the move’ as they approach the point of entry. The VLFR system will detect their face and track and identify them as they approach. It is also able to recognise an enrolled face with a deflection angle of 30% – left to right, and up and down. It can detect and recognise faces, more than one at a time, and it can also capture faces in a certain area, for example at a sporting event or in retail environments.

The 30% deflection means people will be recognised even if they are talking to someone next to them, walking and texting, or simply looking around. Wearing a cap or glasses will also not stop the system from its recognition job, unless the items hide a large proportion of the face.

Depending on the product chosen, the recognition process starts at a distance of 3 metres from the cameras (making it really ‘touchless’) and the verification takes 0.5 seconds, meaning access control in large buildings is possible, even outdoors. There are different ways in which an image can be captured for enrolment, one of which is the person can send a selfie of themselves.

Its facial recognition algorithm has been trained on databases with templates from more than 20 races in 180 countries. As with fingerprint biometrics, the system does not store an image of the individual’s face, but rather a template calculated from the image. The company says these templates only consume about 1 KB of storage each, meaning the onsite database is not huge and cumbersome, which means recognition is fast.

The system is also supplied with an API to allow it to be integrated with other security and business systems. This is in addition to ZK’s own management software, ZKBioSecurity, as well as the company’s ZKBioserver for template storage and retention.

VLFR systems available

ZK has integrated VLFR into various products, some new products dedicated to access control, as well as certain surveillance cameras. This means that access control is only one job these systems can perform. Currently the ZKTeco FI700, 710, and 710-L cameras have been equipped with VLFR and can support either 5000 or 20 000 facial templates on board, depending on the camera chosen. These cameras can be set up to monitor people in a variety of environments, single out blacklisted individuals or find missing persons in a mall, for example.

In the access control field, ZK has a range of products. Starting small, the SpeedFace H5 and V5 systems are designed for traditional access control and T&A tasks. They offer a 5-inch LCD display, can hold up to 6000 face templates and make use of multiple verification mechanisms – facial, fingerprint and RFID.

The FaceDepot series supports indoor or outdoor facial recognition, sporting a 7-inch LCD display and a 10 000 template capacity. The G4 is a multi-biometric attendance and access control terminal which holds up to 10 000 facial templates, 10 000 fingerprint templates and 10 000 Mifare card credentials. It also holds up to 1 000 000 transactions.

At the high end, the FaceKiosk series offers users a choice between 21-, 32- and 43-inch touch screens which can be placed in areas with heavy traffic. Some of the use cases for the kiosks include access control and attendance management, self-service kiosks, hospitality payment and queuing solutions, automatic ticket vending and so on. These products can detect faces at up to 5 metres and recognise between three and five people simultaneously, while holding 10 000 face templates.

Usage examples

While there are many instances where systems like the VLFR products can be used, Hendrik Combrinck, MD of ZKTeco SA offers three examples in which these products can streamline operations.

Event and conference registration: Using systems such as a facial recognition kiosk or the G4, conference delegates can be recognised as they arrive and provided with seating arrangements and other information. (They can register with a selfie.) The touch screen can also be used to register new visitors or collect additional information.

Know your client: In the banking world, the ‘know your client’ mantra is gaining traction and facial recognition kiosks can be used to greet people as they walk in, provide information and even direct newcomers. Should a VIP guest be recognised, the appropriate people can be notified to make sure they get the service they require.

Voter assistance: A kiosk could be used to recognise registered voters at a voting station and direct them. In time, these kiosks could even be used for electronic voting as well.



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...