There are different methods used for matching facial biometrics. The simplest method measures various features of a person’s face, such as the distance between the eyes, or the position of the mouth to the nose. These geometric measurements or vectors are then coded and stored in a database for later comparison. This type of system is usually used in biometric door access control readers.
Facial recognition systems are now available as part of video recording software systems.
The Technology for Facial Recognition
There are two primary methods for capturing and matching facial information.
The first measures various features of a person’s face, such as the distance between the eyes, or the position of the mouth to the nose. These geometric measurements or vectors are then stored in a database for later comparison.
The second method is far more complex. It captures the full facial image and uses as much information as it can. It then uses various computer algorithms, including machine learning, to build a set of definition data. This statistical database increases the reliability, as well as the cost of the system.
There was a break-in at your warehouse, but, you were prepared. Last month you installed a complete IP camera system. Now you have evidence you can share with the police.
Uh oh! You can’t identify their faces. There are two people in the warehouse, but you can’t tell who they are. Ugh! What did you do wrong? You have just discovered that having a surveillance camera, is not enough. You have to have the right resolution camera and the right lens.
This article reviews what you need to assure you meet your security objective.
Biometrics is a much safer way to control door access than carrying a card or remembering a pin number. It’s more secure because you are identifying a person rather than something the person is carrying. The door credential can be stolen, but your face can’t.
What can biometric readers do? How do you select the right fingerprint reader, facial recognition system, or multimodal biometric system? By the way, the latest Biometric IP reader-controllers combine a number of physiological characteristics and are more flexible and reliable than the older units. There are a lot of different choices, but what is best, what provides the best reliability and repeatability? This article examines the technology and provides guidelines for selecting the right biometric system.
Once residing only in the realm of science fiction, biometric authentication has moved into our everyday worlds. And if it’s not part of yours, hold on, it soon will be.
Once upon a time a driver’s license or photo ID was all it took to gain access to a secure building. Life was simpler then. But then, terrorism reared its loathsome head and made it apparent that these simple tokens of identification are woefully inadequate. Today’s security climate demands that secure access control be based on identity authentication. It is not enough that a person may already have security clearance.
Biometric authentication has stepped up to fill that need since the cardinal rule of authentication is that proof of identity be based on a trait or characteristic that is unique to the person, not just a piece of plastic or badge that has the potential of being misappropriated.