By Ross Bale

With emerging markets and global advancements, the facial recognition market has expanded exponentially and reached £6.5 million by the end of 2018.

With 2D, 3D, thermal, emotion, forensic and mobile facial recognition (similar to the technology deployed in the iPhone X), popularity has increased in the corporate world.

Prime systems adopting facial recognition include access control, surveillance and time and attendance systems, all of which have benefitted through increased hit rates and low false acceptance rates.

Let’s delve deeper to understand the technology, how it works and how to use it to best effect.

Facial recognition is a process whereby a CCTV camera and some server software are able to identify a person (whether static or moving) from a live image of the persons face. This is different to the type of 2D still facial image matching used at airports for Border Control. These systems use a static digital image captured from the chip embedded into the passport and match it against the person standing at the gate.

How it works 
Facial recognition systems start by looking for peoples faces when observing a moving scene or image.

Once the system finds an image, it will adjust the image by resizing or reorientation of the image to clearly view a face.

The system will then observe the physical layout of the face, such as the shape of the face, location of the eyes, nose and mouth.

It will use this layout information to build a template for that face, sometimes also referred to as a faceprint.

Once the template has been created, the system will then compare it to the templates that have been enrolled into the system to attempt to identify a person.

If the system identifies an enrolled person, it will positively identify them and pass this data to an operator terminal or screen.

It may also pass a unique identification number to another system, such as the access control system, instead of a card number.

If the system cannot identify the person against those enrolled in the database, it will log that it detected a person in the scene, but could not positively identify them.

Popular misconceptions
Unlike CCTV which records images whenever someone passes in the field of view of a camera, facial recognition requires a database of people enrolled before it can start recognising people.

People unregistered will appear as unknown, however data such as counting the total number of people, or the amount of time people takes to move from one point to another can be recorded anonymously.

Discreet– Facial recognition systems use cameras that are very similar to CCTV cameras, therefore people are less aware of their presence.

We are very used to seeing cameras in our daily lives and cannot easily tell what the camera is being used for.

Flexibility -It’s easier to move a camera, or alter the field of view of a camera and the area it is monitoring.

Most cameras use a single data cable for both power and data.

In comparison, moving an access control installation would require more extensive engineering work, such as moving controller equipment and recabling readers.

The organisation could also choose to deploy additional temporary cameras for a specific event, incident or investigation.

No physical credentials to issue -With most access control systems, you need to issue a physical credential such as a card.

The process of getting the card programmed, printed and issued is complex and involves a number of different steps and departments to get it into the hands of the authorised person.

In comparison, a simple process of capturing their facial data the first time they visit site is both faster and less costly to the organisation.

Human behaviour -For facial recognition systems to work, it needs to view a persons face.

If people do not look in the correct place, wear hats or sunglasses or obscure their faces, they will not be identified.

Anyone not willing to look at a camera or obscuring their face will need to be monitored and tracked by a member of the surveillance team.

In most corporate organisations, this a standard procedure.

Installation is more complex -Installation of cameras at the correct viewing angle to view someone’s face requires careful planning and is vital.

Lighting should be of a sufficient level to illuminate the scene, to allow the system to recognise a person’s face and then identify them.

Systems are still expensive -Facial recognition is gaining in popularity and the technology is getting better, however the costs are still, fairly high in comparison to video content analytics and CCTV.

Organisations may choose to retain card or biometric based access control in these areas rather than wide spread deployments of facial recognition.

Reliance on infrastructure- Facial recognition systems require constant access to a central database of enrolled persons to operate successfully.

This makes the design and availability of both the servers and network vital and requires complex and expensive IT investment to ensure that the database is always available.

In comparison, card based access control systems store the data in he controller at the edge, eliminating a single point of failure and reducing reliance on the server.

Beyond security

Facial recognition is being used for more than just security, it’s also used for hospitality.

Imagine a casino environment where high-rollers can be greeted by name by a member of the Casino’s VIP team to make them feel appreciated and welcomed.

Casino’s also have a duty of care to ensure that customers who have self-excluded themselves from gambling for their own safety are easily identified by casino staff, and can be intercepted and assisted by trained and experienced staff.

Public safety of football matches can be enhanced where behaviour of known hooligans can be monitored (are they sitting still or standing and moving around?) as a reactive and less confrontational measure compared to blocking entry at the turnstiles.

For more information on this piece, please contact our security team.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.


Ross Bale, Security, Uncategorized


, , , , , ,