IndexAuthentication ProcedureApplication AreasChallenges in FRTConclusionReferencesAccording to Lin (2000), facial recognition technology (FRT) is one of the few biometric systems that help identify an individual based on his or her biological characteristics. Researchers from diverse fields, including security, computer vision, image processing and psychology, have gained a deep interest in the technology, due to its high precision and low invasiveness. FRT works by identifying and verifying an individual's still image or video of a scene and confirming it with one stored in a database. This article aims to investigate the basic functioning of FRT, application areas and challenges in FRT. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Authentication Procedure Bobde and Deshmukh (2014) explain that the authentication procedure occurs in four phases: acquisition, extraction, comparison, and matching. During registration, identification or verification, the system captures a physical or behavioral sample. Next, there is the creation of a model from the data extracted from the sample. The unique data is then compared to this new model and finally the system decides whether there is a match or not. The algorithms for the framework are also composed of several modules; first, a face image detector identifies face positions from a complex background, then face recognition determines who the individual is. Both modules use the feature extractor that converts pixel representations into vector representations, which can derive useful information through pattern recognizers (Lin, 2000). The latter searches for the best match for the image entered into the database to help identify the individual in question. Application areas According to a study by Tsalakanidou (nd), the technology has found numerous applications in different fields. In civil and law enforcement applications, for example, it is used in surveillance of public places, forensic applications, border control, passports and national identity documents. Security applications for electronic transactions and access control also widely use this technology to protect their infrastructure and networks. Further areas include ambient intelligence for natural human-machine interaction and in the smart home, as well as wearable systems such as memory aids and context-aware systems. The possibilities are endless considering that entertainment such as interactive films and computer games currently apply to the FRT.Challenges in FRTTsalakanidou (nd) points out that class similarities and interpersonal variations tend to pose a challenge to the system. In the first case, twins, strangers or even relatives could look alike, while in the second the appearance of one's face could change due to factors such as lighting and variations in pose, facial expressions and the use of cosmetics. Others may even disguise themselves to avoid detection by the system. However, despite these drawbacks, researchers are continuously working to find better algorithms to help solve them. As a result, there are several face detection techniques such as knowledge-based, structural, appearance-based matching, pattern matching, and feature invariant. Please note: this is just an example. Get a custom paper from our expert writers now. Get a custom essayConclusionFRT is a biometric identification method that uses the.
tags