Face Recognition Technology To Augment Security Measures At The Sporting Event Essay

Face Recognition Technology To Augment Security Measures At The Sporting Event Essay

Facial recognition technology refers to your computer driven application that automatically identifies an individual from his / her digital image by a a comparison of particular facial features within a facial database and in the live image (“Face Recognition, ” 2007). The technology creates a template of people’s facial designs, such as the measures of their a nous and the angles of their oral cavity. It thus functions just like the other biometric technologies (e. g. iris scanning) involving biological features for the purposes of recognition. In respect to Visionics, a manufacturer of confront recognition technology, this technology is capable of actually finding human encounters “anywhere in the field of view including any range, and it can consistently track them and plants them from the scene, matching the face against a watch list” (Kautzer). When iris checking and other types of biometric solutions are regarded as far more accurate than the encounter recognition technology, it is thought that the second option would be extensively accepted since it is least intrusive. The technology also would not require users to push, just click, or put in anything in to the system. Moreover, companies making use of the face recognition technology tend not to require getting anything apart from the new software application. The cams in place in addition to the pictures with their employees upon file are enough pertaining to companies apply the technology. Hence, face recognition technology is cheaper pertaining to organizations than the iris checking, for instance, which in turn requires browsing setups. In accordance to Frances Zelazney of Visionics, a different advantage of cosmetic recognition technology as compared to the other biometric technologies is the fact “[unlike] various other biometrics, facial recognition offers inherent human backup mainly because we naturally recognize one another… If the system goes down, someone may pull out an ID with a picture since backup, anything you can’t do with fingerprint gadgets (Rutherford, 2001). ” Not surprisingly, facial reputation technology is referred to as the quickest growing biometric technology in our day. Law enforcement officials agencies as well as the military have been completely using the technology successfully for several years without the general public being aware of that. In the year 1988, the Are usually County Sheriff’s Department (Lakewood Division) started using composite sketches of suspects, and also video photos, in order to conduct searches over a database of digital face shots. The department also has a photo databases of sex offenders, and plans to find suspects about this database. Then simply there is the Team Reporting Analysis Tracking program that can be researched with the use of photos of suspects in order for police to circumvent false recognition cards and information that has been presented simply by gang members (Jarvis). There are many United States embassies around the world which might be already using the face acknowledgement technology to keep criminals coming from entering the. The Israel-Palestine border control is in the same way equipped with the technology to lower crime through the border (Jarvis). IQ Biometrix, established in 2001, is a company providing aid to thousands of police agencies all over the world with the FACESTM, which is a groundbreaking software tool permitting the “creation and entertainment of immeasureable facial images, as well as their particular encoding, cataloging and transmitting. ” The technology incorporates a face composite tool that the FBI and the CIA also use. America Department of Defense, the U. S. Navy, and various regional as well as condition police agencies have in the same way opted for this groundbreaking approach to facial acknowledgement (IQ Biometrix, 2004). Offered the importance of putting a name to a deal with, whether it is to resolve crimes, safeguard the public, or to ensure protection in jails, face recognition technology is definitely proving itself to be of tremendous worth. Sheriff Everett Rice combined with the Pinellas Region Sheriff’s Office in Sarasota employs the Viisage encounter recognition technology to “positively identify and verify persons. ” Many of these individuals have just been recently busted, while others will be about to produced. The face reputation technology is likewise of use with individuals that visit the courthouse. So far, the application of the technology continues to be successful, and users of the technology believe it would possess a greater influence on crime control in the many years (“Facial Reputation, ” 2007). The United States Section of Protection, with its give attention to perfecting the facial skin recognition technology to spot crooks at the borders of the nation, had been funding scientists’ study on the technology for more than 10 years. Private firms were in the same way convinced the face identification technology may help dramatically in combating offense within the region of the United States. Because of the belief, the marketing of the technology became widespread during the mid-1990s (Rutherford). Then came 9/11 – the day that changed the safety concerns from the entire world when it concerns only a few hours. There was improved interest in confront recognition technology following the terrorist attacks on the American ground. Although the Americans had seen the face acknowledgement technology with skepticism prior to the attacks, they will became self-confident that wide-spread use of the brand new technology in security and also public basic safety would support protect them from similar problems in future. Indeed, the face acknowledgement technology can play a significant role in the prevention of tragedies. The same, law enforcement firms have discovered that in the areas covered by the brand new technology, no terrorist has ever been recognized. What is more, despite the redoubling of efforts to create dependable confront recognition systems after 9/11, the technology suffers from complications. The face recognition technology faces a difficulty, for example , inside the recognition from the effects of the aging process. Digitally compared photos of individuals that had been considered eighteen a few months apart created untrue vetoes by the software program at least forty 3 percent of the time. Furthermore, it is found the fact that technology much more successful the moment used by internet casinos to identify cheaters; in wellbeing offices; and by driver’s permit bureaus, given the uniformity of light and the use of the same cameras in these areas (Jarvis; O’Harrow, 2001). Simply because the face recognition technology is usually not trick proof, although useful – and secureness experts include confirmed this kind of – it is advisable to use it at the sporting celebration only to augment security procedures. The new technology can help people who are employed in the security sector at the wearing event to identify terrorists, for instance. However , confront recognition technology should not be regarded a replacement intended for traditional protection measures in any respect. What is more, this technology is simple to use, and security personnel will not have a hard time installing and functioning through the system. Hence, the utilization of face identification technology in the sporting celebration is definitely recommended as a increase to the traditional security steps. References Confront Recognition Program. (2007). Wikipedia. Retrieved twenty-five August 2007, from http://en. wikipedia. org/wiki/Facial_recognition_system. Facial Recognition in Action. (2007). Penton Multimedia. Retrieved 25 August 3 years ago, from http://govtsecurity. com/current/. Jarvis, A. Are Privacy Legal rights of Citizens Being Eroded Wholesale? Forensic Evidence. Recovered 25 August 2007, by http://forensic-evidence. com/site/ID/facialrecog. html. Kautzer, C. Encounter Recognition Technology. ZMAG. Recovered 25 Aug 2007, by http://www. zmag. org/ZMag/articles/march02kautzer. htm. O’Harrow, R. (2001, Aug 1). Coordinating Faces With Mug Photographs. Washington Content, p. A01. Rutherford, Emelie. (2001, July 17). Face Recognition Technical Has People Pegged. CNN. Retrieved twenty-five August 3 years ago, from http://www. cnn. com/2001/TECH/ptech/07/17/face. time. idg.

Related Essays