www.techdogs.com
Open in
urlscan Pro
54.196.26.247
Public Scan
Submitted URL: http://tracking.techdogs.biz/tracking/click?d=D6CamOR7TvrXTMWkYYTzN-1S6JATrr31I7JZjyJmtr6KnLAT2Ce8hsiEOxAAJHu9CXe_Ii0SSeNKA1G...
Effective URL: https://www.techdogs.com/page/resource-details/td-articles/curtain-raisers/all-you-need-to-know-about-facial-recognition-...
Submission: On March 28 via api from SE — Scanned from FR
Effective URL: https://www.techdogs.com/page/resource-details/td-articles/curtain-raisers/all-you-need-to-know-about-facial-recognition-...
Submission: On March 28 via api from SE — Scanned from FR
Form analysis
4 forms found in the DOM<form _ngcontent-jgv-c52="" novalidate="" class="ng-untouched ng-pristine ng-valid"><span _ngcontent-jgv-c52="" class="p-fluid"><p-autocomplete _ngcontent-jgv-c52="" formcontrolname="query" placeholder="Search.." appendto="body"
panelstyleclass="searchkeypanel" inputstyleclass="searchinput" styleclass="search-input-container" field="title" class="ng-tns-c45-10 ng-untouched ng-pristine ng-valid ng-star-inserted"><span
class="ng-tns-c45-10 search-input-container ui-autocomplete ui-widget"><input aria-autocomplete="list" role="searchbox" aria-haspopup="true"
class="ng-tns-c45-10 searchinput ui-inputtext ui-widget ui-state-default ui-corner-all ui-autocomplete-input ng-star-inserted" autocomplete="off" type="text" aria-controls="pr_id_1_list" aria-expanded="false"
aria-activedescendant="p-highlighted-option" placeholder="Search.."><!----><!----><!----><!----><!----></span></p-autocomplete><button _ngcontent-jgv-c52="" pbutton="" type="submit" icon="pi pi-search"
class="btn btn-search ui-button ui-widget ui-state-default ui-corner-all ui-button-icon-only"><span aria-hidden="true" class="ui-button-icon-left ui-clickable pi pi-search"></span><span aria-hidden="true"
class="ui-button-text ui-clickable">ui-btn</span></button></span></form>
<form _ngcontent-jgv-c51="" novalidate="" class="ng-untouched ng-pristine ng-invalid">
<div _ngcontent-jgv-c51="" class="row">
<div _ngcontent-jgv-c51="" class="col-lg-12 col-md-12 register-left">
<div _ngcontent-jgv-c51="" class="d-flex flex-wrap-mobile align-items-center">
<div _ngcontent-jgv-c51="" class="register-image"><img _ngcontent-jgv-c51="" src="/assets/images/td.png"></div>
<div _ngcontent-jgv-c51="" class="register-content">
<h4 _ngcontent-jgv-c51="">Hello Tech Reader!</h4>
<h5 _ngcontent-jgv-c51="">Thank you for visiting TechDogs!</h5>
<div _ngcontent-jgv-c51="" class="feature-techdogs">
<p _ngcontent-jgv-c51="">Say hello to a new-age social media platform to debate, discuss, and share "All Things Technology!"</p>
<p _ngcontent-jgv-c51="">Whether you're fully immersed in technology or simply want to network with like-minded enthusiasts, this is the place to be. Sign up now and join the TechDogs Tribe!</p>
</div>
</div>
</div>
</div>
<div _ngcontent-jgv-c51="" class="col-lg-12 col-md-12 register-right">
<div _ngcontent-jgv-c51="" class="row">
<div _ngcontent-jgv-c51="" class="col-md-4">
<div _ngcontent-jgv-c51="" class="form-group"><label _ngcontent-jgv-c51="">Email Address<sup _ngcontent-jgv-c51="">*</sup></label><input _ngcontent-jgv-c51="" pinputtext="" type="text" formcontrolname="PersonalEmail"
placeholder="Email Address" disabled="" class="ui-inputtext ui-corner-all ui-state-default ui-widget ng-untouched ng-pristine ui-state-filled"><!----></div>
</div>
<div _ngcontent-jgv-c51="" class="col-md-4">
<div _ngcontent-jgv-c51="" class="form-group"><label
_ngcontent-jgv-c51="">Password<sup _ngcontent-jgv-c51="">*</sup><i _ngcontent-jgv-c51="" ptooltip="Password should contain at-least 1 uppercase, 1 lowercase, 1 special character(#?!@$%^&*-), 1 number, minimum 7 characters and max 24 characters" tabindex="0" tooltipzindex="99999" style="outline: 0;"><span _ngcontent-jgv-c51="" class="pi pi-question-circle"></span></i></label><input
_ngcontent-jgv-c51="" pinputtext="" formcontrolname="Password" placeholder="Password" maxlength="24" type="password" class="ui-inputtext ui-corner-all ui-state-default ui-widget ng-untouched ng-pristine ng-invalid"><span
_ngcontent-jgv-c51="" class="pi password-toggle-icon pi-eye"></span><!----></div>
</div>
<div _ngcontent-jgv-c51="" class="col-md-4">
<div _ngcontent-jgv-c51="" class="form-group"><label _ngcontent-jgv-c51="">Confirm Password<sup _ngcontent-jgv-c51="">*</sup></label><input _ngcontent-jgv-c51="" pinputtext="" formcontrolname="confirm_password"
placeholder="Confirm Password" maxlength="24" type="password" class="ui-inputtext ui-corner-all ui-state-default ui-widget ng-untouched ng-pristine ng-invalid"><span _ngcontent-jgv-c51=""
class="pi password-toggle-icon pi-eye"></span><!----></div>
</div>
</div>
</div>
<div _ngcontent-jgv-c51="" class="col-lg-12 col-md-12">
<div _ngcontent-jgv-c51="" class="accept-policy-text">
<p _ngcontent-jgv-c51="">TechDogs cares about your experience as much as we care about technology. We would love to use cookies for analytics and providing you with a more in-depth personalized content experience.</p>
</div>
<div _ngcontent-jgv-c51="" class="signup-checkbox">
<div _ngcontent-jgv-c51="" class="p-field-checkbox d-flex"><p-checkbox _ngcontent-jgv-c51="" formcontrolname="IsSubscribedForNewsLetter" binary="true" inputid="newsletterCheckbox" class="ng-untouched ng-pristine ng-valid">
<div class="ui-chkbox ui-widget">
<div class="ui-helper-hidden-accessible"><input type="checkbox" value="undefined" id="newsletterCheckbox"></div>
<div role="checkbox" class="ui-chkbox-box ui-widget ui-corner-all ui-state-default ui-state-active" aria-checked="true"><span class="ui-chkbox-icon ui-clickable pi pi-check"></span></div>
</div><!---->
</p-checkbox><label _ngcontent-jgv-c51="" for="newsletterCheckbox" class="ui-chkbox-label">Signup for Newsletter</label></div>
<div _ngcontent-jgv-c51="" class="p-field-checkbox d-flex"><p-checkbox _ngcontent-jgv-c51="" binary="true" inputid="termsCheckbox" formcontrolname="IsTermsAndConditionChecked" class="ng-untouched ng-pristine ng-valid">
<div class="ui-chkbox ui-widget">
<div class="ui-helper-hidden-accessible"><input type="checkbox" value="undefined" disabled="" id="termsCheckbox"></div>
<div role="checkbox" class="ui-chkbox-box ui-widget ui-corner-all ui-state-default ui-state-active ui-state-disabled" aria-checked="true"><span class="ui-chkbox-icon ui-clickable pi pi-check"></span></div>
</div><!---->
</p-checkbox><label _ngcontent-jgv-c51="" for="termsCheckbox" class="ui-chkbox-label">By clicking Register or Proceed, you're accepting the <a _ngcontent-jgv-c51="" target="_blank" href="/page/terms-of-use">Terms of Use</a>,
<a _ngcontent-jgv-c51="" target="_blank" href="/page/privacy-policy">Privacy Policy</a> and <a _ngcontent-jgv-c51="" target="_blank" href="/page/cookie-policy">Cookie Policy</a> *.</label></div><!---->
</div>
</div>
</div>
<div _ngcontent-jgv-c51="" class="row">
<div _ngcontent-jgv-c51="" class="col-lg-6 col-md-12"><button _ngcontent-jgv-c51="" pbutton="" type="submit" label="Register Now" class="btn btn-block primary-button ui-button ui-widget ui-state-default ui-corner-all ui-button-text-only"><span
class="ui-button-text ui-clickable">Register Now</span></button></div>
<div _ngcontent-jgv-c51="" class="col-lg-6 col-md-12"><a _ngcontent-jgv-c51="" class="btn btn-block primary-button">Skip Registration & Proceed to TechDogs</a></div>
</div>
<div _ngcontent-jgv-c51="" class="dialog-footer text-center">
<p _ngcontent-jgv-c51="">Not mini.pasricha@ericsson.com? <a _ngcontent-jgv-c51="" href="/page/register">Sign Up Now</a></p>
</div>
</form>
<form _ngcontent-jgv-c139="" novalidate="" class="ng-untouched ng-pristine">
<div _ngcontent-jgv-c139="" class="form-group"><textarea _ngcontent-jgv-c139="" rows="3" pinputtextarea="" formcontrolname="comment" disabled=""
class="ui-inputtext ui-corner-all ui-state-default ui-widget ng-untouched ng-pristine ui-state-filled"></textarea></div>
<div _ngcontent-jgv-c139="" class="row align-items-center">
<div _ngcontent-jgv-c139="" class="col-lg-8 col-md-6 col-sm-7"><button _ngcontent-jgv-c139="" pbutton="" type="submit" label="Submit Comment" class="primary-button ui-button ui-widget ui-state-default ui-corner-all ui-button-text-only"
disabled=""><span class="ui-button-text ui-clickable">Submit Comment</span></button></div>
<div _ngcontent-jgv-c139="" class="col-lg-4 col-md-6 col-sm-5 text-sm-right"><p-dropdown _ngcontent-jgv-c139="" placeholder="Sort by" class="ng-tns-c65-6 ng-untouched ng-pristine ng-valid ng-star-inserted ui-inputwrapper-filled">
<div class="ng-tns-c65-6 ui-dropdown ui-widget ui-state-default ui-corner-all">
<div class="ui-helper-hidden-accessible ng-tns-c65-6"><input type="text" readonly="" aria-haspopup="listbox" role="listbox" class="ng-tns-c65-6" aria-label="Oldest on Top"></div>
<div class="ui-dropdown-label-container ng-tns-c65-6"><span class="ng-tns-c65-6 ui-dropdown-label ui-inputtext ui-corner-all ng-star-inserted">Oldest on Top<!----><!----><!----></span><!----><!----><!----><!----></div>
<div role="button" aria-haspopup="listbox" class="ui-dropdown-trigger ui-state-default ui-corner-right ng-tns-c65-6"><span class="ui-dropdown-trigger-icon ui-clickable ng-tns-c65-6 pi pi-chevron-down"></span></div><!---->
</div>
</p-dropdown></div>
</div>
</form>
<form _ngcontent-jgv-c53="" novalidate="" class="form-inline align-items-center justify-content-center ng-untouched ng-pristine ng-invalid">
<p _ngcontent-jgv-c53=""><span _ngcontent-jgv-c53="">Subscribe to our Newsletter</span><br _ngcontent-jgv-c53=""><small _ngcontent-jgv-c53="">By subscribing to our Newsletter, you agree to our
<a _ngcontent-jgv-c53="" class="primary-color" href="/page/privacy-policy">Privacy Policy</a>.</small></p>
<div _ngcontent-jgv-c53="" class="form-group"><input _ngcontent-jgv-c53="" pinputtext="" type="text" formcontrolname="email" placeholder="Enter your email address..."
class="form-control ui-inputtext ui-corner-all ui-state-default ui-widget ng-untouched ng-pristine ng-invalid"></div><button _ngcontent-jgv-c53="" pbutton="" type="submit" label="Subscribe"
class="btn primary-button ui-button ui-widget ui-state-default ui-corner-all ui-button-text-only" disabled=""><span class="ui-button-text ui-clickable">Subscribe</span></button>
</form>
Text Content
* ui-btn * Sign Up * Login ui-btn * TD Articles * Curtain Raisers * Techno Trends * Product Mine * Vault * White Papers * Case Studies * Reports * Videos * Tech News * About TD * About Us * New & Upcoming * Contact Us HELLO TECH READER! THANK YOU FOR VISITING TECHDOGS! Say hello to a new-age social media platform to debate, discuss, and share "All Things Technology!" Whether you're fully immersed in technology or simply want to network with like-minded enthusiasts, this is the place to be. Sign up now and join the TechDogs Tribe! Email Address* Password* Confirm Password* TechDogs cares about your experience as much as we care about technology. We would love to use cookies for analytics and providing you with a more in-depth personalized content experience. Signup for Newsletter By clicking Register or Proceed, you're accepting the Terms of Use, Privacy Policy and Cookie Policy *. Register Now Skip Registration & Proceed to TechDogs Not mini.pasricha@ericsson.com? Sign Up Now * Home * * TD Articles * * Curtain Raisers * * All You Need To Know About Facial Recognition Technology CURTAIN RAISERS Surveillance ALL YOU NEED TO KNOW ABOUT FACIAL RECOGNITION TECHNOLOGY Overall Rating By TechDogs Author - #TD530558 * Share with OVERVIEW From tagging suggestions while posting group photos on Facebook to using Apple’s Face ID to unlock your iPhone – Facial Recognition Technology has become more commonplace and popular than Starbucks! While most of us use this tech in some form or the other, not many would know much about its history, its use, or its potential. That’s okay – this is what we, TechDogs, are here for. Dive into our quick and simplified read on Facial Recognition Technology to not only understand it thoroughly but also flaunt your knowledge about it. We have covered everything from its inception to its applications and benefits in this article. Facial Recognition Technology – not hearing it for the first time, right? You’d probably have stumbled upon this term in a movie or in a book or some news. Ever wondered where it was first used? No? It was not at NASA but you’re close. Before making its way into the real world, Facial Recognition was used to enter the archives area in the 1966 Star Trek: The Original Series. (Yes, they thought of it before it was cool!) Fast-forward to today and Facial Recognition Technology has become a household name, even more than the super cute Baby Yoda! All said and done, while we’ve all had a brush with Facial Recognition Technology, do you really know what it is? Join us as we cut to the chase and tell you what the heck Facial Recognition Technology is all about. WHAT IS FACIAL RECOGNITION TECHNOLOGY? Facial Recognition Technology essentially matches a human face from a digital image or screengrab from a video against a database of faces by pinpointing facial features, measuring them and then comparing them. In simpler words, it takes the captured image and matches it with a pre-recorded image to confirm the identity of the individual. What started off as a rare technology is now a feature that can be found in almost every device you can imagine. Smartphones, security cameras, digital locks cameras and whatnot. However, this technology was not the same at the very beginning and has undergone several iterations of evolution and development. Here’s how it all began. HISTORY AND EVOLUTION OF FACIAL RECOGNITION TECHNOLOGY Let’s not be hasty and assume that Facial Recognition is here because of Star Trek. The truth is, that Star Trek only played on an idea that was already growing in the backyard of Woodrow Wilson "Woody" Bledsoe. Often known as the father of Facial Recognition, Woody developed a cool RAND tablet in 1964 wherein people could manually measure coordinates of faces (exactly how a tailor takes your measurements), record them in the tablet as a database, against which new images were matched–exactly how a garment-maker takes your measurements. Only in this case, the measurements were of your face and were taken using a photograph of yours. A little later, Goldstein, Harmon and Lesk joined the parade and further enhanced Woody’s process by identifying the exact 21 markers that were to be measured on the face. However, like the garment–maker, the technologist was still required to manually take the measurements. Source It was only in the 1990s that technology was developed to replace manual methods; thanks to Turk and Pentland. Popularly called the Eigenface approach, images were now analyzed and converted into a low-dimensional version with basic features, that was then used to match with new images. This led to the earliest instances of automatic Facial Recognition as we know it today. As good wine gets better with age, Facial Recognition Technology too improved with time. Let’s learn how well it works today. HOW DOES FACIAL RECOGNITION TECHNOLOGY WORK? New technology can be daunting, don’t worry, we believe we have done a pretty good job at explaining it. First things first, Facial Recognition Technology follows four standard steps to make a match between your latest picture and one from a database. First, a picture of your face is captured on camera, could be a CCTV (Closed-circuit Television) or the selfie camera of your mobile phone. More often than not, it is taken as a front or nearly front profile to ensure an accurate match. Secondly, Facial Recognition software reads your face and records certain predefined markers on it. By the way, the initial count of 21 markers has now gone up to 68. So, these 68 key features or points on your face are recorded and together they make your facial signature (it’s as unique as your fingerprint!). Now, if you’re thinking that your facial signature is an image, you’re mistaken. In fact, based on the 68 coordinates recorded on your face, the software develops a unique mathematical formula–that’s your facial signature. As the third step, this facial signature is compared with a database of known faces could be the National Criminal Database or even employee access database. At last, a determinate is made to an image that has the same signature or the closest signature to the one recorded. While these basic steps remain consistent, the techniques for Facial Recognition may vary. Let’s learn about them. VARIOUS TECHNIQUES EMPLOYED BY FACIAL RECOGNITION TECHNOLOGY So far, there are four common techniques: * Traditional: The process explained above is the traditional facial signature method. * Human Identification at a Distance (HID): Low-resolution images are first turned into high-resolution representations and then the facial signature is built on them. * 3-Dimensional Recognition: Facial signature is built by capturing 3D coordinates of the face. * Thermal Cameras: Uses special cameras that capture features sans all accessories (like glasses and makeup). Sounds like too much of a hassle, right? Why would any business or organization really invest in such a technology? BENEFITS OF FACIAL RECOGNITION TECHNOLOGY Some of you may be thinking, aren’t biometric systems enough to precisely identify an individual? Why do we need Facial Recognition Tech anyway? Well, here’s why - One of the significant advantages of Facial Recognition is that it offers an automatic and seamless verification experience. You don't need to swipe a card or place your thumb on a biometric pad. It is as simple as clicking a selfie. Another added benefit is that it integrates flawlessly with most devices as there's no specific hardware requirement- a webcam is all you need and there's hardly a smartphone or laptop out there without one. This also means Facial Recognition costs less than biometric set-ups. Furthermore, biometric security has limitations- if your finger is wet or you're wearing gloves, biometric technology will fail to identify you. An individual needs to physically connect with their devices to unlock them through fingerprint tech. Facial Recognition, on the other hand, has a reasonable detection rate even if the individual is standing at a distance. Hence, it finds diverse applications in recognizing individuals in a crowd. Well, let's see what these applications are. APPLICATIONS OF FACIAL RECOGNITION TECHNOLOGY Source So far we’ve talked about several common applications of Facial Recognition like the Apple FaceID and security software. However, here are few large-scale yet lesser-known applications of Facial Recognition. * Security and ID verification at organizations, national agencies and high-security events like the Commonwealth Games and Olympics. (yes, we all know this one!) * Immigration checkpoints at airports to identify known criminals and persons of interest who are trying to cross borders illegally. * Casinos regularly use it to identify cheaters and card-counters who are a cause for trouble. * Ride-sharing companies use it to ensure that the drivers are not sleepy and are in a condition to drive. * Facial Recognition has replaced peepholes at homes to only grant access to known people for better security. * Law-enforcement agencies to identify criminals using their records in the national database. (You’re more likely to capture footage from a street camera than get a criminal’s fingerprint, right?) * Diseases are diagnosed faster with Facial Recognition as the technology records detectable changes in appearances and maps them to their possible causes. Is that all? Not really. Taylor Swift once used this tech at her concert to identify known stalkers. We’re not kidding, this may soon become the norm. Take notes, celebs! For the rest, here’s what we can expect in the future. THE FUTURE OF FACIAL RECOGNITION We can expect Facial Recognition to expand into more markets and industries in the future. For example, schools and workplaces could use the technology to take automated attendance. Additionally, we’re seeing the development of emotion recognition features using Facial Recognition. In fact, Listerine has developed an app that tells blind people when someone around them is smiling using vibrations, helping them better understand their social surroundings. We can also expect more accurate recognition, even with a low resolution and non-frontal profile image, thanks to Artificial Intelligence and Deep Learning (these are fancy technologies that help automate processes and make intelligent tools). Needless to say, this tech is full of surprises and will largely influence the security landscape. Like what you read? Head to the TechDogs homepage to find the latest tech content infused with drama and entertainment. We've got Articles, White Papers, Case Studies, Reports, Videos and Events - the complete lot to help you Know Your World of Technology. Read It Here TAGS: Facial Recognition Technology Facial Recognition History And Evolution Of Facial Recognition Technology Benefits Of Facial Recognition Technology Facial Recognition Technology Definition Future Of Facial Recognition Technology Human Identification At A Distance (HID) JOIN THE DISCUSSION Submit Comment Oldest on Top RELATED CONTENT BY TECHDOGS FeaturedSoftware Applications A BEGINNER’S GUIDE TO SIMULATION SOFTWARE By TechDogs Author - #TD378395 FeaturedNetworking Solutions A BEGINNER'S GUIDE TO NETWORK SECURITY SOFTWARE By TechDogs Author - #TD524921 FeaturedManufacturing Technology EVERYTHING ABOUT DIGITAL TWIN TECHNOLOGY By TechDogs Author - #TD613336 FeaturedIT Security YOUR MARAUDER’S MAP TO DECIPHER THE WORLD OF ENDPOINT ENCRYPTION SOFTWARE By TechDogs Author - #TD329549 FeaturedBusiness Intelligence SALES INTELLIGENCE EXPLAINED By TechDogs Author - #TD329549 FeaturedSocial Media GROW YOUR BUSINESS WITH SOCIAL MEDIA ANALYTICS TOOLS By TechDogs Author - #TD680370 FeaturedManufacturing Technology DIGITAL FACTORY EXPLAINED By TechDogs Author - #TD613336 FeaturedFinancial Technology UNDERSTANDING FINANCIAL TECHNOLOGY By TechDogs Author - #TD329549 FeaturedIT Security UNFOLD THE TALE OF SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) SOFTWARE By TechDogs Author - #TD329549 FeaturedDigital Marketing EVERYTHING ABOUT LANDING PAGE SOFTWARE By TechDogs Author - #TD680370 FeaturedSoftware Applications A BEGINNER’S GUIDE TO SIMULATION SOFTWARE By TechDogs Author - #TD378395 FeaturedNetworking Solutions A BEGINNER'S GUIDE TO NETWORK SECURITY SOFTWARE By TechDogs Author - #TD524921 FeaturedManufacturing Technology EVERYTHING ABOUT DIGITAL TWIN TECHNOLOGY By TechDogs Author - #TD613336 FeaturedIT Security YOUR MARAUDER’S MAP TO DECIPHER THE WORLD OF ENDPOINT ENCRYPTION SOFTWARE By TechDogs Author - #TD329549 FeaturedBusiness Intelligence SALES INTELLIGENCE EXPLAINED By TechDogs Author - #TD329549 FeaturedSocial Media GROW YOUR BUSINESS WITH SOCIAL MEDIA ANALYTICS TOOLS By TechDogs Author - #TD680370 * * * * * TRENDING TD ARTICLES - CURTAIN RAISERS ALL YOU NEED TO KNOW ABOUT APPLICATION VIRTUALIZATION SOFTWARE By TechDogs Author - #TD613336 ALL ABOUT APPLICATION PERFORMANCE MANAGEMENT SOFTWARE By TechDogs Author - #TD592139 SALES INTELLIGENCE EXPLAINED By TechDogs Author - #TD329549 EVERYTHING ABOUT LANDING PAGE SOFTWARE By TechDogs Author - #TD680370 GROW YOUR BUSINESS WITH SOCIAL MEDIA ANALYTICS TOOLS By TechDogs Author - #TD680370 Subscribe to our Newsletter By subscribing to our Newsletter, you agree to our Privacy Policy. Subscribe * Terms of Use * Privacy Policy * Copyright Policy * Cookie Policy * Do Not Sell My Information Copyright © 2022 TechDogs. All rights reserved. * * * * * * * Dark * Light