SlideShare a Scribd company logo
1 of 10
Facial Recognition
Definition
Facial recognition is the process of identifying or
verifying the identity of a person using their face. It
captures, analyzes, and compares patterns based on
the person's facial details (thalesgroup.com).
• The face detection process is an essential step
as it detects and locates human faces in images
and videos.
• The face capture process transforms analog
information (a face) into a set of digital information
(data) based on the person's facial features.
• The face match process verifies if two faces
belong to the same person.
(thalesgroup.com)
Identifying and verifying
• Biometrics are used to identify and authenticate a person
using a set of recognizable and verifiable data unique and
specific to that person.
• Identification answers the question: "Who are you?"
• Authentication answers the question: "Are you really who
you say you are?"
These automated systems can be used to identify or check
the identity of individuals in just a few seconds based on
their facial features: spacing of the eyes, bridge of the nose,
the contour of the lips, ears, chin, etc.
(thalesgroup.com)
Why facial recognition?
• Facial biometrics continues to be the preferred
biometric benchmark.
• That's because it's easy to deploy and implement.
There is no physical interaction required by the end-
user.
• Face detection and face match processes for
verification/identification are speedy.
 Google, Apple, Facebook, Amazon, and Microsoft
are also very much in the mix of using this
technology.
(thalesgroup.com)
Possibility of disruption?
• Facial recognition will benefit different users differently. Governments around the world have begun
experimenting with it’s in law enforcement, military, and intelligence operations. Additionally, it has
the potential to benefit governments in other functions, such as the provision of humanitarian
services. Corporations will realize benefits from facial recognition in innumerable ways over time,
but some immediate examples exist in security, marketing, banking, retail, and health care
(lawfareblog.com) .
• Companies are beginning to employ facial recognition software for commercial or convenience
purposes. Some retailers have begun to use it to identify their customers’ preferences based on
what items they pick up and what path they take in the store (lawfareblog.com) .
• Conclusion: Facial recognition isn’t disruptive. It encourages technology use, and it helps to
improve certain work-environments and jobs.
Examples
 Owners of the iPhone X have already been introduced to facial recognition
technology. However, Apple's Face ID biometric solution was heavily criticized
in China in late 2017 because of its inability to differentiate between
individual Chinese faces (thalesgroup.com).
 Facebook has always given you control over whether we us face
recognition technology to recognize you in photos. This setting was
previously called tag suggestions because Facebook only used face
recognition technology to automatically suggest tags of your friends in
photos (fb.com).
Marketing used:
There is a system designed by Facebook where sales staff are provided
with customer information taken from their social media profiles to
produce expertly customized responses (thalesgroup.com).
Other known examples
Identify and track criminals
• Face recognition CCTV can be used to enable police to track
and identify past criminals. Police can also take preventive
actions. By using an image of a known criminal from a video
or an external picture (or a database), operators can use to
detect matches in live video and react before it’s too late
(thalesgroup.com).
Find missing children and disoriented adults
• Isolating the appearances of specific individuals in a video
sequence is critical. It can accelerate investigators’ jobs
in child exploitation cases as well (thalesgroup.com).
> Video analytics can help build chronologies, track activity on a
map, reveal details, and discover non-obvious connections
among the players in a case (thalesgroup.com).
Gartner
Deployment risk high:
• Many jurisdictions have put this technology “on hold,” as
it raises complex ethical dilemmas (gartner.com) .
• There is a strong negative sentiment against the use of
face recognition technology. It is seen as an invasion of
privacy and a step towards mass surveillance
(gartner.com) .
• Currently, there are no widely used or accepted
regulations governing facial recognition, which means
data and analytics leaders need to turn to digital ethics
to use facial recognition technology responsibly
(gartner.com).
Gartner
Enterprise value low:
• To deliver successful facial recognition products, technology and
service providers must get ahead of the market disruptions and
buyer paralysis driven by technology and regulatory changes in a
volatile threat environment (gartner.com) .
• One commonly raised concern is that Facial recognition is not 100
percent accurate. Using a particular image to search through a facial
database is sure to produce false positives (gartner.com) .
Example: it could mean that the company mis-identifies a job
applicant as having a criminal record and denies him the job.
Also:
• Government abuse
• Criminal abuse
• Hacking,…
Resources
• Poll: Are You Creeped Out By Facial Recognition? | Threatpost
• Facial recognition in 2020 (7 trends to watch) (thalesgroup.com)
• Market Trends: Facial Recognition for Enhanced Physical Security — Differentiating the Good, the Bad and the
Ugly (gartner.com)
• Use Facial Recognition Technology Responsibly and Ethically (gartner.com)
• The security and privacy risks of face recognition authentication – TechTalks (bdtechtalks.com)
• Finally, progress on regulating facial recognition - Microsoft On the Issues
• The Face in Facebook Now Has New Meaning | Movie TV Tech Geeks News
• An Update About Face Recognition on Facebook - About Facebook (fb.com)
• 2020-2022 Emerging Technology Roadmap for Large Enterprises (gartner.com)
• China's facial recognition cameras pick man out of crowd of 60,000 (smh.com.au)
• Facial Recognition Software: Costs and Benefits - Lawfare (lawfareblog.com)
• File:Google, Apple, Facebook, Amazon and Microsoft.png - Wikimedia Commons

More Related Content

What's hot

The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...RES
 
Open Text Content World - Executive Summit presentation
Open Text Content World - Executive Summit presentationOpen Text Content World - Executive Summit presentation
Open Text Content World - Executive Summit presentationJohn Mancini
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Case study presentation
Case study presentationCase study presentation
Case study presentationenglettk
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Symantec
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskFiona Lew
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security surveyCarlo Del Bo
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Facial Recognition: Doorway to AI Economy v4
Facial Recognition: Doorway to AI Economy v4Facial Recognition: Doorway to AI Economy v4
Facial Recognition: Doorway to AI Economy v4Chaiyoot Chamnanlertkit
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 

What's hot (18)

The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...
 
Open Text Content World - Executive Summit presentation
Open Text Content World - Executive Summit presentationOpen Text Content World - Executive Summit presentation
Open Text Content World - Executive Summit presentation
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
2010 report data security survey
2010 report  data security survey2010 report  data security survey
2010 report data security survey
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Facial Recognition: Doorway to AI Economy v4
Facial Recognition: Doorway to AI Economy v4Facial Recognition: Doorway to AI Economy v4
Facial Recognition: Doorway to AI Economy v4
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
(Webinar Slides) Tips and Tricks for Managing Social Media
(Webinar Slides) Tips and Tricks for Managing Social Media(Webinar Slides) Tips and Tricks for Managing Social Media
(Webinar Slides) Tips and Tricks for Managing Social Media
 

Similar to Facial recognition e-skills assignment

facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdfgulfam ali
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]christeenamoses
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Overview of data mining
Overview of data miningOverview of data mining
Overview of data miningMasterM0212
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxAnkitSakhuja4
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detectionStudentRocks
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 

Similar to Facial recognition e-skills assignment (20)

facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]
 
Frs
FrsFrs
Frs
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Overview of data mining
Overview of data miningOverview of data mining
Overview of data mining
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Face recognition
Face recognition Face recognition
Face recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Facial recognition e-skills assignment

  • 2. Definition Facial recognition is the process of identifying or verifying the identity of a person using their face. It captures, analyzes, and compares patterns based on the person's facial details (thalesgroup.com). • The face detection process is an essential step as it detects and locates human faces in images and videos. • The face capture process transforms analog information (a face) into a set of digital information (data) based on the person's facial features. • The face match process verifies if two faces belong to the same person. (thalesgroup.com)
  • 3. Identifying and verifying • Biometrics are used to identify and authenticate a person using a set of recognizable and verifiable data unique and specific to that person. • Identification answers the question: "Who are you?" • Authentication answers the question: "Are you really who you say you are?" These automated systems can be used to identify or check the identity of individuals in just a few seconds based on their facial features: spacing of the eyes, bridge of the nose, the contour of the lips, ears, chin, etc. (thalesgroup.com)
  • 4. Why facial recognition? • Facial biometrics continues to be the preferred biometric benchmark. • That's because it's easy to deploy and implement. There is no physical interaction required by the end- user. • Face detection and face match processes for verification/identification are speedy.  Google, Apple, Facebook, Amazon, and Microsoft are also very much in the mix of using this technology. (thalesgroup.com)
  • 5. Possibility of disruption? • Facial recognition will benefit different users differently. Governments around the world have begun experimenting with it’s in law enforcement, military, and intelligence operations. Additionally, it has the potential to benefit governments in other functions, such as the provision of humanitarian services. Corporations will realize benefits from facial recognition in innumerable ways over time, but some immediate examples exist in security, marketing, banking, retail, and health care (lawfareblog.com) . • Companies are beginning to employ facial recognition software for commercial or convenience purposes. Some retailers have begun to use it to identify their customers’ preferences based on what items they pick up and what path they take in the store (lawfareblog.com) . • Conclusion: Facial recognition isn’t disruptive. It encourages technology use, and it helps to improve certain work-environments and jobs.
  • 6. Examples  Owners of the iPhone X have already been introduced to facial recognition technology. However, Apple's Face ID biometric solution was heavily criticized in China in late 2017 because of its inability to differentiate between individual Chinese faces (thalesgroup.com).  Facebook has always given you control over whether we us face recognition technology to recognize you in photos. This setting was previously called tag suggestions because Facebook only used face recognition technology to automatically suggest tags of your friends in photos (fb.com). Marketing used: There is a system designed by Facebook where sales staff are provided with customer information taken from their social media profiles to produce expertly customized responses (thalesgroup.com).
  • 7. Other known examples Identify and track criminals • Face recognition CCTV can be used to enable police to track and identify past criminals. Police can also take preventive actions. By using an image of a known criminal from a video or an external picture (or a database), operators can use to detect matches in live video and react before it’s too late (thalesgroup.com). Find missing children and disoriented adults • Isolating the appearances of specific individuals in a video sequence is critical. It can accelerate investigators’ jobs in child exploitation cases as well (thalesgroup.com). > Video analytics can help build chronologies, track activity on a map, reveal details, and discover non-obvious connections among the players in a case (thalesgroup.com).
  • 8. Gartner Deployment risk high: • Many jurisdictions have put this technology “on hold,” as it raises complex ethical dilemmas (gartner.com) . • There is a strong negative sentiment against the use of face recognition technology. It is seen as an invasion of privacy and a step towards mass surveillance (gartner.com) . • Currently, there are no widely used or accepted regulations governing facial recognition, which means data and analytics leaders need to turn to digital ethics to use facial recognition technology responsibly (gartner.com).
  • 9. Gartner Enterprise value low: • To deliver successful facial recognition products, technology and service providers must get ahead of the market disruptions and buyer paralysis driven by technology and regulatory changes in a volatile threat environment (gartner.com) . • One commonly raised concern is that Facial recognition is not 100 percent accurate. Using a particular image to search through a facial database is sure to produce false positives (gartner.com) . Example: it could mean that the company mis-identifies a job applicant as having a criminal record and denies him the job. Also: • Government abuse • Criminal abuse • Hacking,…
  • 10. Resources • Poll: Are You Creeped Out By Facial Recognition? | Threatpost • Facial recognition in 2020 (7 trends to watch) (thalesgroup.com) • Market Trends: Facial Recognition for Enhanced Physical Security — Differentiating the Good, the Bad and the Ugly (gartner.com) • Use Facial Recognition Technology Responsibly and Ethically (gartner.com) • The security and privacy risks of face recognition authentication – TechTalks (bdtechtalks.com) • Finally, progress on regulating facial recognition - Microsoft On the Issues • The Face in Facebook Now Has New Meaning | Movie TV Tech Geeks News • An Update About Face Recognition on Facebook - About Facebook (fb.com) • 2020-2022 Emerging Technology Roadmap for Large Enterprises (gartner.com) • China's facial recognition cameras pick man out of crowd of 60,000 (smh.com.au) • Facial Recognition Software: Costs and Benefits - Lawfare (lawfareblog.com) • File:Google, Apple, Facebook, Amazon and Microsoft.png - Wikimedia Commons