Escolar Documentos
Profissional Documentos
Cultura Documentos
FACE
RECOGNITION
1
PROPRIETARY RIGHTS
This document contains information of a proprietary nature to Morpho and is submitted in confidence for a specific purpose. The recipient assumes
custody and control and agrees that this document will not be copied or reproduced in whole or in part, nor its contents revealed in any manner or
to any person except to meet the purpose for which it was delivered.
2
TABLE OF CONTENTS
INTRODUCTION....................................................................................... 4
I. FACE RECOGNITION............................................................................. 5
1. DETECTION.................................................................................................................... 5
2. IMAGE ENHANCEMENT................................................................................................. 5
3. FEATURE EXTRACTION.................................................................................................. 5
4. COMPARISON................................................................................................................. 6
5. DECISION....................................................................................................................... 7
II. PERFORMANCE................................................................................... 8
1. CHALLENGES................................................................................................................ 8
2. CAPTURE EXPERTISE.................................................................................................... 8
3. MATCHING PERFORMANCE.......................................................................................... 9
4. FUTURE........................................................................................................................ 11
CONCLUSION......................................................................................... 18
3
INTRODUCTION
From the very advent of photography, both government
agencies and private organizations have kept
collections of portraits and ID photos have gradually
made their way onto all personal identification
documents, from the most official passports to informal
membership cards issued by sports clubs.
4
I. FACE RECOGNITION
Recognizing faces is the most natural thing to do for This stage is performed with a classifier that indicates
the human brain. After a few days, even newborns whether an image of fixed size represents a face.
can recognize their mothers face. Besides, capturing
portraits digitally is easy: contactless, with no need for The classifier learns from a database of faces and non
specific equipment now that cameras are everywhere, faces.
in the streets, in computers, even integrated in the
smartphone in your pocket.
2. IMAGE ENHANCEMENT
But when it comes to identifying someone from his or
Once the faces have been found and adjusted to the
her face, it is not because it is natural that it is simple.
same scale and position, they need to be enhanced.
The face is a three dimensional ever changing object
This involves minimizing the effects of compression,
always in motion. For an efficient identification system,
correcting inconsistent lighting or detecting and
face recognition technology starts well before image
excluding unusable zones (masked by clothes for
comparison.
example). Morpho developed a 3D morpheable model
to generate frontal images, correcting the orientation
of the face and the effects of expressions. While
1. DETECTION many enhancements can be made automatically, the
The first step is to detect the face in the images assistance of an operator may prove very useful when
collected from the source. It can be easy in static working on difficult images.
images such as identity documents with standardized
pose, lighting and plain background. It can be a huge
challenge in video streams with multiple persons in
movement and a busy background. The goal is then to
detect faces successfully, which means maintaining a
low rate of false face detection.
5
3. FEATURE EXTRACTION
The image is processed to extract information and
convert it into a digital description for computer-based
comparison. Every face has numerous, distinguishable
traits, such as the distance between the eyes, the width
of the nose or the shape of the cheekbones. Face
recognition algorithms rely on those feature points but
also on mathematical information not identifiable by the
human eye.
4. COMPARISON
Once you have extracted the face features, you
can compare them to the ones in the database or
a watchlist and identify whether the person you are
looking for is already in it or at least get a list of potential
candidates that looked like him/her.
6
5. DECISION
In an identity management scenario, the goal is
prevent identity fraud by checking the uniqueness of
applicants biometric data. Based on huge biometric
databases, comparisons will be much easier by using
reliable thresholds that do not require adjustment as the
database grows. In case of automatic hit, an operator
can verify to confirm the result and proceed with the
investigation on the fraud attempt.
To assess the success of this step, measured in terms of accuracy, we look at:
n FALSE ACCEPTANCE: You get a match but the images are not from the same person.
n FALSE REJECTION: You do not get a match while the person is in the database.
The effect of false acceptance and false rejection depends on how a system is used. This can be:
n NEGATIVE: You want to stop a person if there is a match (criminal watch list).
n POSITIVE: You want to allow a person if there is a match (frequent traveler program).
In negative use cases, a false rejection means the system failed to detect a person of interest, failing in its
mission. False acceptance means that you mark an authorized user as a suspect, causing discomfort and
distress. It also wastes money by triggering an alarm for no reason.
In positive use cases, a false acceptance means someone unknown has been granted access. False rejection
will lead to discomfort for the user, and costly manual processing. You will have to establish the persons identity
manually.
False rejection in a frequent traveler program will cause irritation. In a criminal watch list, it could help a criminal
leave the country.
Accuracy impacts the complete system, beyond the biometric technology. Whatever the use case, if the system
is not performant enough, people will eventually lose their trust in it.
7
II. PERFORMANCE
In order to provide trustworthy and accurate results, face recognition cannot be performed without some precautions.
1. CHALLENGES
Indeed, a face image can be altered in many ways and affected by many parameters.
8
Use of the 3D modeling tool to rebuild a frontal picture
3. MATCHING PERFORMANCE
Biometric matching is all about accuracy and speed. Luckily, a customer can rely on independent benchmarks such
as the ones executed by the National Institute of Standards and Technology (NIST) which test the accuracy of different
vendors.
9
The NIST evaluation recognizes the significant systems. Our technology demonstrates stable scoring
improvement of face recognition technology over the that allows users to set reliable thresholds that do not
past years. As one of the only vendors, Morpho was require adjustment as the database grows. Extracted
able to demonstrate a miss rate lower than 10% at rank from NIST FRVT report, the following figure shows that
one on a 1.4 million record mugshot dataset. Morpho (letter D) stabilizes FAR to limit the impact of
the database size, while most competitors (such as J)
Morpho technology is also shown to have an increasing exhibit a linear dependence of FAR with population size.
accuracy advantage as the database grows, illustrated
by the limited loss in accuracy while the False Threshold relates also directly with operator workload.
Acceptance Rate (FAR) gets lower. Indeed, when In face identification systems, a human reviewer is
database grows, the probability to find look-alike people usually employed to review the candidates returned
increases as well, corresponding to an increase of the from the search. In law enforcement scenarios, the
FAR. FRVT demonstrates that with a ten-fold population reviewer inspects the candidates either from a list with
size increase (from 160 000 to 1.6 million), the miss a defined length (up to a fixed rank, e.g. 50) or only
rate increases by small factors, Morpho achieving the the ones above the threshold. NIST assesses that with
smallest one (1.1). Morpho technology, using a threshold can reduce the
workload by 60% for only a 5% increase in miss rate. In
Another important aspect is the threshold stability. The this aspect, Morphos algorithm exhibits the best trade-
threshold is the value of the similarity score between off between accuracy and human workload.
two portraits, above which they will be considered as
coming from the same person. This value is usually set While all other providers algorithms exhibit a quasi
with the objective of obtaining a predictable FAR. The linear dependence of search duration on the enrolled
threshold often needs to be adjusted as the size of the population size, Morpho appears as a noticeable
database increases, which is not possible in real life exception. With Morphos algorithm, the search duration
Threshold stability Accuracy (FAR, FRR) with different database sizes for Morpho (algorithm D31C) and
competitor J
10
increases modestly: a 10 fold increase in database size 4. FUTURE
gives only a 25% increase in search duration, and thus
in computational power. Such behavior makes a key During the last decade, face recognition research
difference on large scale systems. methodology has matured, sizable training databases
have been collected, and the feedback from practical
Ranking of performance across algorithms must be deployments has been incorporated, which has led to a
weighed by application-specific requirements. In dramatic jump in accuracy.
regards of real-world scenarios, Morpho delivers top
performance, enlarging the gap with other competitors. The last NIST benchmarks conclusions are clear: face
recognition technology is mature enough for operational
use in identification systems with frontal images in a
ACCURACY AND SPEED controlled environment.
NIST evaluations provide participants with the Efforts do not stop here. Research is moving forward on
opportunity to compete under the same conditions on accurately processing more difficult images and video
accuracy, but system efficiency must be kept in mind. sequences, with lower resolution and a less controlled
Biometric systems are always the result of a trade- environment. Some of the challenges include external
off between accuracy, speed and cost, both for the factors (such as lighting) or subject cooperation (for
hardware platform and human resources involved. instance facial expression or occlusions).
Morpho provides algorithms with operating points Addressing those challenges will lead to an increased
(in terms of accuracy and speed) adapted to real-life performance and an extended range of applications for
implementations. Morpho is also committed to making face recognition.
all technical improvements available to customers by
integrating the latest algorithms in its products very
quickly.
11
III. USE CASES
Face recognition is used for both authentication INVESTIGATION
(checking a persons identity) and identification (finding
a person among a group of known people). Because Face recognition is well known to be used for
face images can be collected either overtly or covertly, investigation purposes. It allows linking a crime to a
and since people are increasingly willing to give their suspect or different crimes together. Another use case
portrait than before, this technology offers a wide range is to help investigators to make a witness identify a
of applications. suspect, using face recognition software to speed up
the creation of efficient mugbooks and to organize
lineups.
1. PUBLIC SECURITY
As an example, Morpho offers its customers the
Like fingerprints or DNA, faces are now leaving capacity to process face matching thanks to its
marks that can be used for investigation. Indeed, a dedicated software: Morpho Face Expert. Its high level
witness can take a picture with his smartphone, video of accuracy and the numerous tools it offers make it
surveillance cameras are able to record suspects, one of the best solutions available on the market. The
images and videos can be fetched from media related Morpho Face Detective software allow police agencies
to an investigation. In any case, those marks can be to build line ups easily and thus identifying suspects in a
used to identify a person already known and recorded more efficient way.
in police portrait gallery.
Police mugshots databases are populated with images IDENTITY CHECKS IN THE FIELD
taken at the police station during custody. After Mobile devices can now be equipped with very good
police officers make an arrest, they usually collect the cameras and high performance data transmission
fingerprints, palmprints and mugshots of all suspects, capability allowing identity checks on the field. Police
offering the opportunity to build a database of good officers can directly submit search requests to local or
quality to which latent faces can be submitted. remote face databases and quickly determine whether
Once the database is created, face recognition can be an individual is already known to the police forces.
useful to various purposes:
12
IN JAILS 2. CIVIL IDENTITY
Face recognition can help control visitors, and verify Face recognition is particularly well suited to check the
that no prisoner escapes at the end of the visit (e.g. uniqueness of applications for identity papers: ID cards,
switching with a visitor). It can also be used within the passports, driving licenses. All of these documents
jail, for instance to make sure prisoners going out to display a photo of the holder used to recognize him.
work areas or to court are the same people who are With the development of automatic face recognition
coming back. systems, pictures can be used not only to personalize
an identity document but also to fight against multiple
INTELLIGENCE application fraud. Hence, biometric identification
has been implemented to secure identity document
Pictures and video streams can reveal a lot of issuance.
information to investigators: not only suspects identities
but also other hints such as accomplices or at least As an example, driver licenses include a photograph,
links between individuals. but rarely include any other biometric data. Face
recognition applications can be used to guarantee
that a single motorist cannot possess several driving
PREVENTION licenses.
Identifying dangerous people is key to prevent incidents Since 2008, Morpho is deploying a full identity
in public places. By setting up surveillance cameras at management system in Albania with mass enrolment of
the stadium entrance equipped with face recognition 3.2 million citizens within five months and the building
software, blacklisted individuals can be identified on of a complete infrastructure for biometric ID cards and
the spot. In the same way, unlawful demonstrations passports production. Face recognition is used for
recorded by CCTV cameras can be submitted to a face deduplication purpose and it is a frank success.
recognition system.
13
3. BORDER CONTROL through the border control gates. Biometric systems
can simulatenously verify that the passenger does not
SECURITY belong to a list of people who cannot leave or enter the
country.
Airports are often targeted by terrorists and face
recognition can help a lot in improving their security. A Following the success met in Australia, Morpho has
global surveillance system integrating face recognition deployed in 2009 automatic border control gates
technology and connected to several cameras is able to with biometric capacities in New Zealand. The
detect wanted people registered in black lists. governements goals were to protect the community
from risks related to international trade and travel
and to facilitating the legitimate movement of people
IDENTITY CHECK
and goods across the borders. All eligible e-Passport
The International Civil Aviation Organization (ICAO) holders travelers cross the border faster and simpler.
has been promoting for years Machine Readable The number of passengers can increase within the
Travel Documents to facilitate and secure border existing facilitation standards and without major
crossing. The specifications (ICAO document 9303) infrastructure changes to airports or increase in staff
require the passports chip to store a picture of the numbers. It allows maintaining or improving the integrity
holder. The chip can be used to automatically check of passenger clearance process.
the passports authenticity while the traveller is going
14
FAST BOARDING 4. AND MANY MORE
To ensure fluidity in the transit of airport users, tracking Face recognition is becoming increasingly common. It
passengers through the terminal can be facilitated by is used in day-to-day life by everybody, sometimes in
face recognition. By measuring the duration of each unnoticeable ways. For example, it is used to:
step from check-in to boarding, the airport authorities n index media archives,
can fine tune staffing and line opening at each stage. n recognize VIP customers,
Furthermore this kind of checking can be used to
n restrain access to casinos,
ensure that people getting onto the planes have been
through check-in. Face recognition can therefore speed n offer personalized pictures to leisure park visitors,
up identity controls and decrease the passengers n help security guards limit the access to a shop or
waiting time. bank agency to safe visitors,
n display the most attractive advertisement depending
on age and gender,
n secure access to electronic devices.
15
IV. IMPLEMENTATION GUIDELINES
Face recognition is a very challenging technology. As assessed by the NIST: improvement of image quality
Images vary a lot depending on scale and resolution, is the largest contributing factor to recognition accuracy.
in sharpness and in lighting, notwithstanding artifacts When possible, the system shall conform to the ISO/
like compression, interlacing or overlay for identity IEC 19794-5 standard, with two complementary
documents, red eyes when a flash light is used... approaches: by design using proper devices and
Another element to take into account is the constant illumination, and by detection of non conformant images
variations of the human face: it is a very mobile and at the collection stage.
deformable 3D object, which can change in seconds,
and varies over time with age and physical condition. It
even varies in color So intrinsically, face images are 2. CAMERA SET UP
extremely variable.
The results of identification in video streams depend
This is the reason why the deployment of a face a lot on the setting up of cameras in the environment.
recognition system must take both technical and The stakeholders should define in advance how to
human factors into consideration to be used in the most implement the cameras. They must be set up at choke
efficient way. The environment must be controlled and points, where people move at a controlled pace, flow
its quality checked to get the best results. and direction. Cameras should also fit the following
requirements:
n Control lighting,
1. QUALITY CHECK n Be placed at a suitable height to correctly acquire the
Having a good quality database is one of the keys to faces of people of different sizes,
get the best results. When the portrait acquisition is n Capture peoples attention to make them look at the
done in a controlled environment, the enrolment should camera (mirror, advertisement, weather forecast,
follow best practices: news etc.).
- Frontal pose
- Neutral expression
- Clear face to limit occlusion (glasses, headwear, etc)
16
3. EXPERTISE IN CHECKING SEARCHES
In investigation use cases, visually recognizing people
can require some training. A number of methods have
been developed to improve the visual recognition
of persons. As an example, the Federal Bureau of
Investigation (FBI) has proposed a facial comparison
and identification training program to provide students
with awareness and understanding of the facial
comparison discipline. This training aims at facilitating
the expanded use of face technologies, interpretation
of the output of face recognition systems, and better
integration of face biometrics into law enforcement and
intelligence work.
17
CONCLUSION
Morpho has demonstrated the high accuracy of its n s ocial media with more and more pictures
algorithms in all NIST evaluations, however the most n trained examiners
valuable demonstration of Morpho performance is n improvement in CCTV and consumers cameras
provided by its experience in implementing real life
n capture standardization allowing an easy use of
biometric solutions all around the world.
pictures
Empowered by successful deployments, face
recognition still has considerable headroom for But in any case, the performances of face recognition
improvement. For instance, these systems could add will definitely depend on the way the system is used
3D sensors, recognition of moving faces, processing of and how it has been implemented. Relying on a partner,
images captured from above or the side, development such as Morpho, with extensive experience in biometric
of models to integrate ageing, and much more. In a system deployment is one of the key factors for the
near future, we expect to see a strong development success of your system.
of the use of such a technology since solutions will be
more adapted, efficient and performant:
18
KEY MISSIONS, KEY TECHNOLOGIES, KEY TALENTS
SAFRAN MORPHO