Facial recognition Q&A

May 2005 Access Control & Identity Management

What is facial recognition technology?

Facial recognition systems are built on computer programs that analyse images of human faces for the purpose of identifying them. The programs take a facial image, measure characteristics such as the distance between the eyes, the length of the nose, and the angle of the jaw, and create a unique file called a 'template.' Using templates, the software then compares that image with another image and produces a score that measures how similar the images are to each other. Typical sources of images for use in facial recognition include video camera signals and pre-existing photos such as those in driver's licence databases.

How is facial recognition technology currently being used?

Unlike other biometric systems, facial recognition can be used for general surveillance, usually in combination with public video cameras. There have been three such uses of face-recognition in the US so far. The first is in airports, where they have been proposed - and in a few cases adopted - in the wake of the terrorist attacks of 11 September. Airports that have announced adoption of the technology include Logan Airport in Boston, T.F. Green Airport in Providence, R.I., and San Francisco International Airport and the Fresno Airport in California.

A second use of the technology was at the 2001 Super Bowl in Tampa, where pictures were taken of every attendee as they entered the stadium through the turnstiles and compared against a database of some undisclosed kind. The authorities would not say who was in that database, but the software did flag 19 individuals. The police indicated that some of those were false alarms, and no one flagged by the system was anything more than a petty criminal such as a ticket scalper. Press reports indicate that NewOrleans authorities are considering using it again at the 2002 Super Bowl.

The technology has also been deployed by a part of Tampa, Ybor City, which has trained cameras on busy public sidewalks in the hopes of spotting criminals. As with the Super Bowl, it is unclear what criteria were used for including photos in the database. The operators have not yet caught any criminals. In addition, in England, where public, police-operated video cameras are widespread, the town of Newham has also experimented with the technology.

How well does facial recognition work?

Computers can do increasingly amazing things, but they are not magic. If human beings often cannot identify the subject of a photograph, why should computers be able to do it any more reliably? The human brain is highly adapted for recognising faces - infants, for example, remember faces better than other patterns, and prefer to look at them over other patterns. The human brain is also far better than computers at compensating for changes in lighting and angle. The fact is that faces are highly complex patterns that often differ in only subtle ways, and that it can be impossible for man or machine to match images when there are differences in lighting, camera or camera angle, let alone changes in the appearance of the face itself.

Not surprisingly, government studies of face-recognition software have found high rates of both 'false positives' (wrongly matching innocent people with photos in the database) and 'false negatives' (not catching people even when their photo is in the database). One problem is that unlike our fingerprints or irises, our faces do not stay the same over time. These systems are easily tripped up by changes in hairstyle, facial hair, or body weight, by simple disguises, and by the effects of ageing.

A study by the government's National Institute of Standards and Technology (NIST), for example, found false-negative rates for face-recognition verification of 43% using photos of subjects taken just 18 months earlier, for example. And those photos were taken in perfect conditions, significant because facial recognition software is terrible at handling changes in lighting or camera angle or images with busy backgrounds. The NIST study also found that a change of 45° in the camera angle rendered the software useless. The technology works best under tightly controlled conditions, when the subject is staring directly into the camera under bright lights - although another study by the Department of Defense found high error rates even in those ideal conditions. Grainy, dated video surveillance photographs of the type likely to be on file for suspected terrorists would be of very little use.

In addition, questions have been raised about how well the software works on dark-skinned people, whose features may not appear clearly on lenses optimised for light-skinned people.

Samir Nanavati of the International Biometric Group, a consulting firm, sums it up: "You could expect a surveillance system using biometrics to capture a very, very small percentage of known criminals in a given database."

What is the government's previous experience with facial recognition?

Several government agencies have abandoned facial-recognition systems after finding they did not work as advertised, including the Immigration and Naturalisation Service, which experimented with using the technology to identify people in cars at the Mexico-US border.

However, the government also has possession of a huge, ready-made facial image database - driver's licence photos - and is looking into how they can be used. By law, the government cannot sell those photos to private companies, but there are no prohibitions on their use for surveillance purposes by the government itself. The Federal government has begun to fund pilot projects on expanding the use of driver's licence photos to facial recognition databases.

Should we deploy face-recognition in airports to prevent terrorism?

It makes no sense to use face-recognition in airports. To begin with, there is no photo database of terrorists. Only two of the 19 hijackers on 11 September were known to the CIA and FBI - and surviving terrorists are not exactly lining up to have their photo taken by the US government. In addition, the technology simply is not reliable enough for such an important security application. It would work especially poorly in the frenetic environment of an airport, where fast-moving crowds and busy background images would further reduce its already limited effectiveness. The evidence suggests that these systems would miss a high proportion of suspects included in the photo database, and flag huge numbers of innocent people - lessening vigilance, wasting precious manpower resources and creating a false sense of security.

Should we use the technology in other public places?

If facial recognition is unjustified in airports and at public events such as the Super Bowl, its use for general surveillance is even more inappropriate. The security threat on a public street is far lower than in airports, and sociological studies of closed-circuit television monitoring of public places in Britain have shown that it has not reduced crime. The balance between the risks and benefits of facial recognition is even more unfavourable in such locations than in airports.

How does facial recognition technology threaten privacy?

One threat is the fact that facial recognition, in combination with wider use of video surveillance, would be likely to grow increasingly invasive over time. Once installed, this kind of a surveillance system rarely remains confined to its original purpose. New ways of using it suggest themselves, the authorities or operators find them to be an irresistible expansion of their power, and citizens' privacy suffers another blow. Ultimately, the threat is that widespread surveillance will change the character, feel, and quality of American life.

Another problem is the threat of abuse. The use of facial recognition in public places like airports depends on widespread video monitoring, an intrusive form of surveillance that can record in graphic detail personal and private behaviour. And experience tells us that video monitoring will be misused. Video camera systems are operated by humans, after all, who bring to the job all their existing prejudices and biases. In Great Britain, for example, which has experimented with the widespread installation of closed circuit video cameras in public places, camera operators have been found to focus disproportionately on people of colour, and the mostly male operators frequently focus voyeuristically on women.

While video surveillance by the police is not as widespread in the US, an investigation by the Detroit Free Press (and follow up) shows the kind of abuses that can happen. Looking at how a database available to Michigan law enforcement was used, the newspaper found that officers had used it to help their friends or themselves stalk women, threaten motorists, track estranged spouses - even to intimidate political opponents. The unavoidable truth is that the more people who have access to a database, the more likely that there will be abuse.

Facial recognition is especially subject to abuse because it can be used in a passive way that does not require the knowledge, consent, or participation of the subject. It is possible to put a camera up anywhere and train it on people; modern cameras can easily view faces from over 100 yards away. People act differently when they are being watched, and have the right to know if their movements and identities are being captured.

The bottom line: how do we decide whether to install facial recognition systems?

Facial recognition - or any security technology - should not be deployed until two questions are answered. First, is the technology effective? Does it significantly increase our safety and security? If the answer is no, then further discussion is beside the point. If the answer is yes, then it must be asked whether the technology violates the appropriate balance between security and liberty. In fact, facial recognition fails on both counts: because it does not work reliably, it will not significantly protect our security - but it would pose a significant threat to our privacy.

Source: American Civil Liberties Union





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...