Chapter 6. Face Biometric Technologies

 <  Day Day Up  >  

Face biometrics are used by everyone every day. The face is the first defining characteristic that we use to identify someone. It is the face that is recalled when trying to remember what someone looks like. We use it, and eventually come to depend on it, for recognition. We carry photo IDs that we show as proofs of identity. On the cards are pictures of our face.

Our trust in our ability to judge if we know someone by his/her face can also fool us as well. We have all at one time or another thought we recognized someone's face, only to have it not be the person we thought. For many people, including parents, twins present a unique problem. Some twins can be so similar that even the parents may need to identify them by some other means. The human brain is complex and, some would argue, the most powerful computer in the world. It has specialized functions for senses, but even it can be fooled. Not surprisingly, the use of face biometrics for identification is often questioned. Can it deliver the same level of accuracy as other biometrics, and can it be deployed for use in a network security environment?

In our investigation of face biometrics, we will try to answer these questions and provide a suitable background so that you can make the final decision.

To learn the most about face biometrics, the discussion will be broken into the following areas:

  • General description of face biometrics

  • How is the face imaged ?

  • What types of algorithms are used for facial interpretation?

  • How can this biometric be spoofed?

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net