New Telecomm Technologies Facial Recognition Essay

1162 words - 5 pages

Imagine you’ve come home from a long day at work. You get out of your car, sling your bag over your back, and think about the delicious meal that you’re going to eat for dinner. Just as you approach the door to your amazingly comfortable home, you realize that something is wrong – you’ve forgotten your keys and have exhausted all other options. Maybe you’re on route to board a plane to go to a very important meeting abroad and you realize that you’ve forgotten your ticket, and it’s too late to turn back. What do you do?
Fortunately, Facial Recognition technology could be the answer, and may not be as far off as we think. With just a simple computer device to scan your face, you may be able to have instant access to your house without even having to use a key, or to your ticket without even having it present. Facial recognition software has the potential to improve the security of an individual, whether it be financially, physically, or just for pure convenience sake -- and it’s already deep into development and use in other countries. Within the next decade or so, we should be looking forward to seeing this technology being used in everyday life.
Facial recognition technology works as a technological application through a computer source which can both identify and verify the identity of a person through a digital image. We see this sort of technology utilized in crime shows where a face can be crossed referenced to match a potential suspect – that’s the sort of thing we’re looking at for everyday life, security and convenience. But how does it work? Through a series of algorithms, Bonsor and Johnson (2001) explain that “3D facial recognition uses distinctive features of the face – where rigid tissue and bone is most apparent (…) to identify the subject”. However, the process isn’t as simple as it may seem on the surface.
The algorithm utilized goes through a series of steps to ensure complete accuracy. The first step is detection, where a picture of the subject must be acquired – whether it be through 3D surveillance or a simple picture of the subject. The second step is alignment, where the characteristics of the subject’s head is determined, including defining features such as the nose and eyes. The third step is measurement, which is where the curves and the scale of the face are measured to absolute precision. Then, for the fourth step, the images are translated into a code, which will then be used towards the fifth step, which is where the image is presented to a database of images to find a match. The final step is verification and identification, where the image is verified to be a precise match of the correct subject. As simple as it may seem, facial recognition technology isn’t very cut and dry – it goes through a multitude of process, all of which that are of equal importance. This technology is interesting because in the future, it can provide convenience and improved security that can positively affect our everyday...

Find Another Essay On New Telecomm Technologies - Facial Recognition - Essay

Biometrics: Are we the key? Essay

3032 words - 12 pages interested because iris scanning and surveillance using facial recognition has become a very powerful tool used for identification purposes. For example, In February 2002, a facial recognition biometric system was used during the Super Bowl in New Orleans. This system scanned all incoming spectators and personnel to compare those facial scans with known terrorists. [8]"Human identification is a key element in the reduction and investigation of crime and

September 11 Attack Essay

730 words - 3 pages , Mohamed Atta, one of the terrorists during the September 11 attacks (Gates 35). Facial recognition is a new media technology that should be used to identify terrorists faces with the help of the criminal database (Gates 36). Other biometrics such as fingerprints can help in relating the body and identity of the person hence helping in controlling citizenship benefits terrorists (Gates 37). Ideally, new technologies such facial identification

Emotions - Universal or A Learned Phenomenon

1703 words - 7 pages This essay concerns emotions and controversial arguments based on whether emotions are universal or a learned phenomenon. Most of the research in to cross cultural Psychology surround their attention on the biological aspect of emotions as being the primary source of the occurrence of emotions and has been the subject of numerous studies. However, culture is also known to affect and provoke emotional experiences. This essay will discuss the

Smile, You’re On Camera

848 words - 3 pages Mitchell Gray’s paper “Urban Surveillance and Panopticism: will we recognize the facial recognition society?” analyzes the effects of the use of facial recognition surveillance devices as a reaction to perceptions of “insecurity” in urban environments. Mitchell Gray views facial recognition systems as “part of an attempt to reduce insecurity through knowledge and vision, but, paradoxically, their use may add to insecurity by transforming society

Italy and Analysis

6064 words - 24 pages purchase a set top box from the company and pay monthly service charges. Because this is a substitute product it is a threat to Philips because the likelihood of consumers buying more that one set top box or service is highly unlikely. NEW ENTRANTS The threat of new entrants is two fold; one if you are referring to the new technologies being invented and offering an alternative and superior product, the threat is great. The Internet and

Facial Features Detection in Colour Images Based on Skin Colour Segmentation

924 words - 4 pages In case of intelligent biometric system facial features identification is a challenging task. Facial features like eye, mouth, lip are the critical factor to express human emotion. Face and facial features detection can be implemented automatically with the help of computer, but it is difficult work. In this paper we have proposed a new frame work for a fast and efficient detection of face and facial features like eyes, nose, mouth and lip from

Video Surveillance for Safer Cities

1914 words - 8 pages for expansion we need to look at four major components; the CCTV needs a more complete socialetal visualization of urban areas instead of having social exclusion, the acceptance of facial recognition systems to increase security and promote safer streets, the process of creating visually appealing space that directly impacts forms of crime and deviant acts which compliments the spatial production process, and ensuring space is being

Biometrics Introduction to Information Systems Security

622 words - 2 pages Biometrics is used in many places and there is a bright future for them. Finger print scanners are being used in many states of the US. They have been used to trace social welfare fraud. An iris pattern identification system is being used in Cook County, Illinois to ensure that right people are released from jail. ATM machines have been installed with finger scanners to prevent theft and fraud in Indiana (Jain, 2005).New biometric technologies

Looking To The Future: Iris Scan Technology

2064 words - 9 pages of identification and security. As reported by Jo Twist, a BBC News Online technology reporter, Biometric technology, simply put, is the recording of “unique physiological characteristics” specific to an individual. Twist describes the three main biometric technologies as iris, face, and, fingerprints.In Speilbergs’ Minority Report, we see the constant use of high-tech facial scanning, lasers tracking over peoples’ eyes, and

Critical Response Of Heidegger's The Age Of World Pictures

2590 words - 10 pages there 'animal technologies'? Perhaps these are questions for us to ponder towards our understanding of the power, autonomy and meaning of technology.BibliographyChow, Rey. "Atomic Bombs, Alterity, Area Studies." The Age of the World Target. Durham: Duke University Press, 2006. 25-43.Gates, Kelly. "Inventing the Security-conscious, Tech-savvy Citizen." Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance. New York


1520 words - 6 pages like the FBI, TWIC and RT are using such technologies. Many biometric identification systems have been installed in airports for security and preventing terrorism. New biometric technologies are being developed using diverse physiological and behavioral characteristics. These technologies are in various stages of development. Vein scan technology identifies a person based upon blood vessel patterns. This technology uses infrared light to detect

Similar Essays

Biometric Technology Essay

1270 words - 5 pages . Furthermore, Galton was the pioneer working on facial recognition; he experimented with composite photographic looking for the habitual criminal pattern. Although his experiment fail because he could not find the relationship between the facial features and the criminal behavior, his contribution to individual identification was enormous. By that time, Alphonse Bertillon, a French detective, created a new method to identify criminals. It consisted in

Telstra Swot Analysis And Marketing Strategies

2043 words - 8 pages access among the existing users.2.4 Threats•The mobile phone market nearly reaches saturation in Australia.•The customer behavior has significantly changed; Telstra will find it increasingly difficult to compete for new customers.•Telecomm equipment was damaged by bushfires.•ACCC mandated access to Telstra's local network by issuing local loop unbundling makes the competition fierce in Australian telecom market.3.0 Marketing

Image Processing Based Finger Vein Biometric Recognition System

2314 words - 9 pages used by humans to make a personal recognition. The major advancement in the past ten years has propelled the face recognition technology into the spotlight. Facial recognition technologies have recently developed into two areas and they are Facial metric and Eigen faces. Facial metric technology relies on the manufacture of the specific facial features. The Eigen Face method is based on categorizing faces according to the degree of it with a fixed

Analysis Power Of Computers

1249 words - 5 pages classified as belonging to one of the familiar subjects, as a new face, or as non-face. B. Facial Feature Extraction Besides holistic approach, in some literatures [15], [26] feature based face recognition frameworks are proposed. Locating the exact location of facial features (eyes, nose, mouth, and chin) is very important for these systems. Many methods have proposed to solve the problem. These methods can be classified in four geometric based