{"title":"Securing a restricted site - biometric authentication at entry point","authors":"E. Kukula, S. Elliott","doi":"10.1109/CCST.2003.1297599","DOIUrl":null,"url":null,"abstract":"We evaluated the performance of a commercially available facial recognition algorithm for the verification of an individual's identity (1:1) across three illumination levels. Existing facial recognition technology from still or video sources is becoming a practical tool for law enforcement, security, and counter-terrorist applications despite the limitations of current technology. At this time, facial recognition holds promise and has been implemented in limited applications, but has not been exhaustively researched in adverse conditions, which has initiated continuing research aimed at improving algorithms to compare images or representations of images to recognize a suspect [Paul, R. (2002)]. This evaluation examines the influence of variances in illumination levels on the performance of a facial recognition algorithm, specifically with respect to factors of age, gender, ethnicity, facial characteristics, and facial obstructions.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297599","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
We evaluated the performance of a commercially available facial recognition algorithm for the verification of an individual's identity (1:1) across three illumination levels. Existing facial recognition technology from still or video sources is becoming a practical tool for law enforcement, security, and counter-terrorist applications despite the limitations of current technology. At this time, facial recognition holds promise and has been implemented in limited applications, but has not been exhaustively researched in adverse conditions, which has initiated continuing research aimed at improving algorithms to compare images or representations of images to recognize a suspect [Paul, R. (2002)]. This evaluation examines the influence of variances in illumination levels on the performance of a facial recognition algorithm, specifically with respect to factors of age, gender, ethnicity, facial characteristics, and facial obstructions.