• Sabina Pokhrel

Facial Recognition - creepy or convenient?

Image of person unlocking phone using Apple iPhone
Image of person unlocking phone using Apple iPhone (Unsplash)

Apple’s Facial ID turned facial recognition into the hottest feature. Are you intrigued by how it works?

Let’s demystify the science behind it.

Facial Recognition systems have been used for biometric authentication, access control, class attendance, home security, content-based data retrieval, social media and many other applications.

The concept of facial recognition is not new, nor is its implementation. Using computers to recognize faces has been dated back to 1960s.

Check out my previous post on the Evolution of Facial Recognition.

Face recognition can be sub-categorized into Face Verification and Face Identification.

Face Verification
Image of Face Verification (Original Image from Unsplash)

Face Verification answers the question “is this person who he/she claims to be?”

For example, the biometric authentication on your smartphone is Face Verification. During registration, you can set up the authentication system to check against your face. Then, when you unlock your phone using your face, it compares this new facial feature with the one it took during the set up process. If it matches, it will unlock your phone. However, if your friend tries to use their face to unlock your phone, it will fail, because it does not match the saved facial features.

Face Identification answers the question “who is this person?”

An example of Face Identification is when used for class attendance. The system extracts the facial features of each student in the class and compares against facial features of all students saved in the database to find the best match.

A typical face recognition system consists of two modules:

  • a face detector module, to localize the face in the image or video,

  • a face recognition module.

Face Recognition pipeline
Face Recognition pipeline

Face recognition module further consists of feature extraction and face matching components.

Feature Extraction. A deep convolutional neural network (CNN) based feature embedding network is used to extract representational features of the face. The output of this module is a feature vector.

This feature extractor model can be either trained from scratch or transfer learning through fine-tuning pre-trained models such as AlexNet, VGG, Squeeznet and ResNet on a new dataset.

Face Matching. Features extracted from test facial images are compared with the ones that are already saved in the database during the face registration process.

For Face Verification, the extracted feature is compared with one saved facial feature.

For Face Identification, the extracted feature is compared with multiple facial features. A classification model is often used for face identification.

Additional Components. An additional component of face recognition includes anti-spoofing, to detect whether the face is live or spoofed. Anti-spoofing is used to avoid different types of attacks on the system and is used before passing through the feature extraction network.

In this post, we looked at different sub-categories of face recognition: face verification and face identification. We also explored basic components of a typical face recognition system which includes face detection, feature extraction and face matching.

So, what do you think? Is facial recognition creepy? Or is it convenient? Leave your thoughts as comments below.

Xailient is introducing the world’s fastest Face Recognition software. Don’t miss out the release. Join the waitlist now.


[1] Mei, Wang, and Weihong Deng. "Deep face recognition: A survey." arXiv preprint arXiv:1804.06655 1 (2018).

[2] Zulfiqar, Maheen, et al. "Deep Face Recognition for Biometric Authentication." 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). IEEE, 2019.

[3] Gao, Yong, et al. "Face recognition using most discriminative local and global features." 18th International Conference on Pattern Recognition (ICPR'06). Vol. 1. IEEE, 2006.

[4] https://www.historyofinformation.com/detail.php?id=2126

[5] https://mikedusenberry.com/on-eigenfaces

[6] https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition

[7] https://www.electronicid.eu/en/blog/post/face-recognition/en

[8] https://techcrunch.com/2014/03/18/faceook-deepface-facial-recognition/?guccounter=1

124 views0 comments