The Fundamentals of Facial Recognition Technology

Alagappan Sellappan
Jul 9, 2020 · 9 min read

Facial Recognition Technology is a developing technology that shines a light on a new aspect of security and identity. How does it work and what are some of its practical application successes and failures in our modern-day society?

Picture by John Paul Van Wert from Ranks Studio through Wikimedia Commons — Delta Airlines’ new biometric scanning technology at Hartsfield-Jackson International Airport in Atlanta, Georgia, on Monday, November 19th, 2018.

What is Facial Recognition Technology?

How does Facial Recognition work?

Here is the process as to how this technology works:

(Sources: Electronic Privacy Information Center (EPIC) and Norton Security)

  1. A picture of one’s face is captured from a photo or video. It needs to be able to identify a human face and extract it from other people and the background (environment, buildings, cars, etc.).
  2. The system and its technology will then analyze and measure nodal points on the face, such as the distance between the eyes, distance from the forehead to the chin, the shape of the cheekbones, and many other key distinguishable features that separate you from other human faces. All of these examined facial features equate to a personal facial signature.
  3. Your facial signature is compared to a database of known faces. According to the Federal Bureau of Investigation’s (FBI) May 2018 report, the FBI has had access to 412 million facial images for searches.
  4. The system will then determine whether your face matches with a face in a database using nodal points/key facial features that distinguish you from the environment and other human beings.

What Are Some Real-Life Applications of Facial Recognition Technology?

Phone Manufacturers: Companies like Apple use facial recognition technology to unlock their phones. It started with the iPhone X/XS/XS Max/XR and it is now on higher generations including the iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max. Using this technology, it makes sure you’re the right person accessing the phone. According to Apple, the chance of unlocking your phone is about one in one million.

The United States Government (Department of Homeland Security/Transportation Security Administration): This technology can monitor people coming in and going out of airports. The Department of Homeland Security has used this technology to identify people who have overstayed their visas or under criminal investigation.

Retailers: Shops can now use surveillance cameras with this technology to scan the faces of every shopper. The primary goal is to fish out suspicious characters and potential shoplifters.

Businesses with Restricted Areas and Secured Entrances: Many companies have traded in security badges that granted them access into certain parts of the building for facial recognition systems. Instead of having to scan your card, you can walk up to the restricted area/secured entrance and it will open up after scanning your face and confirming it is an authorized person.

Marketers and Advertisers: Marketers use one’s gender, age, ethnicity, and many other traits when targeting groups for a product or an idea. With facial recognition, they will be able to figure out the pattern of audiences that attend conferences, concerts, campaign events, etc.

Successes of Facial Recognition Technology Usage

August 22rd, 2018: Three Days After Facial Recognition Technology System Installation atWashington Dulles International Airport in Northern Virginia.

(Directly from the United States Customs and Border Protection Website)

A 26-year-old man traveling from San Paulo, Brazil presented a French passport to the CBP officer conducting primary inspections. The officer utilized CBP’s new facial comparison biometric technology which confirmed the man was not a match to the passport he presented. The CBP officer referred the traveler to secondary inspection for a comprehensive examination. During this thorough check, CBP officers noted the traveler’s behavior changed and he became visibly nervous. A search revealed the man’s authentic Republic of Congo identification card concealed in his shoe.

September 8th, 2018: Second Imposter Within Three Weeks of Facial Recognition Technology System Installation at Washington Dulles International Airport in Northern Virginia.

(Directly from the United States Customs and Border Protection Website)

A 26-year-old woman, who arrived on a flight from Accra, Ghana, presented a United States Passport to a CBP officer for admission as a returning citizen. Utilizing the new facial comparison technology, the CBP officer established that the traveler was not a match to the passport and referred her for further examination. A secondary examination confirmed that the traveler was a Ghanaian citizen and an imposter to the United States passport.

October 2nd, 2018: Third Imposter Within Two Months of Facial Recognition Technology System Installation at Washington Dulles International Airport in Northern Virginia.

(Directly from the United States Customs and Border Protection Website)

A 26-year-old Cameroonian woman arrived on a flight from Accra, Ghana, which had originated from Johannesburg, South Africa. The women presented a United States Passport in the name of a 31-year-old United States citizen to the present CBP officer. The facial recognition technology used by the officer reported a mismatch to the photo in the passport. CBP officers confirmed her true identity during a secondary inspection and biometric examination. She was arrested for misuse of a passport (19 USC 1544).

Why Should One Be Concerned About Their Privacy In Regards To Facial Recognition?

Here are some examples of how your privacy could be violated:

(Source: Norton Security)

  • Security: One’s facial data can be collected and stored, often without your permission. There is a possibility that hackers could access and steal that data.
  • Prevalence: Facial recognition technology has started to become more widespread amongst the entirety of the United States and possibly the world. This means that your facial signature could end up in a lot of places without your knowledge. There is little to no chance that a person would know who has access to their faceprint.
  • Ownership: Without any doubt, a person owns their face which is located above their neck. However, digital images are different. A person could have given up their right to ownership when you signed up on a social media network. A third-party could even track down images of you online and sell that data.
  • Safety: Facial recognition could lead to online harassment and stalking. The way it could potentially work is when someone takes a picture of you without your knowledge and uses facial recognition software to find out exactly who you are.
  • Mistaken Identity: Facial recognition systems may not be fully accurate. Check out the challenges part of the article to learn more about a real-life example.
  • Basic Freedoms: Government agencies and other authorized groups have the ability to track you in regards to what you do and where you go.

Failures of Facial Recognition Technology Usage

Here is an example of a fault in facial recognition technology.

On a Thursday afternoon in January, Robert Williams was in his office when he got a call from the Detroit Police Department telling him to come to the station to be arrested. Thinking that it was a prank, he ignored the entire conversation. An hour later, he pulled into his driveway in Farmington Hills, Michigan when a cop car pulled up behind him. Two officers got out and handcuffed Williams on his front lawn in front of his wife and two daughters.

The police drove Mr. Williams to a detention center. He had his mugshot, fingerprints, and DNA taken. He was held overnight in jail. The next day, two detectives took him to an interrogation room. The interrogation happened in this format below.

Detective 1: When was the last time you went to a Shinola store?

  • Shinola is an upscale boutique that sells watches, bicycles, and leather goods in Detroit, Michigan.

Robert Williams: My wife and I checked it out when the store first opened in 2014.

  • One of the detectives then turned over the first piece of paper. It was a still image from a surveillance video that showed a heavily built man, dressed in black, and wearing a St. Louis Cardinals cap standing in front of a watch display. Five timepieces, in total worth $3,800.00, were shoplifted.

One of the Detectives: Is this you?

  • The second piece of paper that was shown was a close-up. The photo was blurry, but it was distinctive enough to tell that it wasn’t Robert Williams.

Robert Williams: No, this is not me. Do you think all black men look alike?

  • Robert Williams knew that he didn’t commit the crime. What he didn’t know was that his case is the first publically known account of an American being wrongfully accused and arrested based on a flawed match from a facial recognition algorithm.

The charges against Robert Williams were dropped soon after they discovered it was a mistake made by the facial recognition technology itself.

After this incident occurred, Amazon, Microsoft, and IBM announced that they would stop or pause their facial recognition offerings for law enforcement. The facial recognition technology used by police departments across the country is supplied by companies that aren’t known to many people. Companies include Cognitec, NEC, Vigilant Solutions, Rank One Computing, and Clearview AI.

Conclusion

Citations

“CBP at Washington Dulles International Airport Intercepted an Imposter Using New Cutting-Edge Facial Comparison Biometrics Technology.” CBP at Washington Dulles International Airport Intercepted an Imposter Using New Cutting-Edge Facial Comparison Biometrics Technology | U.S. Customs and Border Protection, www.cbp.gov/newsroom/local-media-release/cbp-washington-dulles-international-airport-intercepted-imposter-using.

Center, Electronic Privacy Information. “EPIC — Facial Recognition.” Electronic Privacy Information Center, epic.org/privacy/facerecognition/.

“Dulles CBP’s New Biometric Verification Technology Catches Third Impostor in 40 Days.” Dulles CBP’s New Biometric Verification Technology Catches Third Impostor in 40 Days | U.S. Customs and Border Protection, www.cbp.gov/newsroom/national-media-release/dulles-cbp-s-new-biometric-verification-technology-catches-third.

Garbage In. Garbage Out. Face Recognition on Flawed Data, www.flawedfacedata.com/.

Gervais, Joe. “How Does Facial Recognition Work?” Norton Security, us.norton.com/internetsecurity-iot-how-facial-recognition-software-works.html.

Hill, Kashmir. “Wrongfully Accused by an Algorithm.” The New York Times, The New York Times, 24 June 2020, www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html.

“History of Facial Recognition Technology.” Facial Recognition, www.doc.ic.ac.uk/~hh4017/History#:~:text=It%20started%20as%20a%20search,to%20detect%20faces%20within%20images.

Liao, Shannon. “New Facial Recognition System Catches First Imposter at US Airport.” The Verge, The Verge, 24 Aug. 2018, www.theverge.com/2018/8/24/17778736/facial-recognition-washington-airport-immigration-biometric-exit.

“The Perpetual Line-Up.” Perpetual Line Up, www.perpetuallineup.org/.

Raviv, Shaun. “The Secret History of Facial Recognition.” Wired, Conde Nast, www.wired.com/story/secret-history-facial-recognition/.

“Second Impostor in Three Weeks Caught by CBP Biometric Verification Technology at Washington Dulles Airport.” Second Impostor in Three Weeks Caught by CBP Biometric Verification Technology at Washington Dulles Airport | U.S. Customs and Border Protection, www.cbp.gov/newsroom/local-media-release/second-impostor-three-weeks-caught-cbp-biometric-verification.

Van Wert, John Paul. “Facial Recognition Technology at Gate (44275734970).Jpg.” Wikimedia Commons, 19 Nov. 2018, commons.wikimedia.org/wiki/File:Facial_recognition_technology_at_gate_(44275734970).jpg.

The SciTech Scoop

Complicated Science and Tech in Simple English.

Alagappan Sellappan

Written by

Certified COVID-19 Specialist | Rising Junior at an International Baccalaureate School |

The SciTech Scoop

The SciTech Scoop is a publication which takes the complex aspects of science and technology and turn it into understandable literature.

Alagappan Sellappan

Written by

Certified COVID-19 Specialist | Rising Junior at an International Baccalaureate School |

The SciTech Scoop

The SciTech Scoop is a publication which takes the complex aspects of science and technology and turn it into understandable literature.

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store