Although there have been many advancements in security applications, one of the most intriguing developments in the security marketplace is facial recognition. Whether you’re trying to protect mass transportation, identify a known hot check writer at a bank, or requiring details on who may be entering a secured entrance, you’ll notice facial recognition technology’s importance in today’s society is definitely on the rise. Sales, licensing and integration of facial recognition hardware and software generated approximately $390 million in 2009. So we know there is certainly a market for this equipment. But while the technology gets closer and closer to popularization, we still have a way to go before we start seeing it implemented in regular daily usage.
There are specific algorithms that call for certain frontal activity, but unless an individual voluntarily self-identifies, the program is not likely to be able to do nothing more than to record the individuals image and do some good old-fashioned investigating. And since the quality of facial images is driven by the performance of the system, good lighting and subject orientation as well as motion, all play a part in the ability to obtain a good facial detection.
These types of systems are being installed mostly in civil identification projects, which do offer controlled environments. Applications include matching people to their supposed passport photos, or making sure a customer at the Department of Motor Vehicles hasn’t already applied for (and received) a driver’s license. Facial recognition is quickly gaining acceptance in virtually any situation where you can cut down on a person’s ability to create a fake identity.
Incorporating video analytics into your security systems opens up a host of features such as Face Detection in Object Index, which is used to detect human faces in the video and save them as thumbnail image index. It is suggested to be installed near the entrance and exits. Once there is an index with headshots of each individual, you can then use that information to either allow or deny access.
When implementing this type of software, it will certainly make security officers, guards or surveillance directors more efficient, however this technology is still years from becoming automated.