Industry News

Face verification vs. face recognition: what's the difference?

Release Time: 2021-07-23

Scenario 1: Face Recognition. You are walking through the central square below your house, or you are now sitting in a seat at Sports Light. Facial recognition technology, combined with CCTV, is scanning the crowd and matching faces to a database of known or suspected crimes. You do not know if or when face recognition has been applied to you. You cannot opt out. Personal interest is not directly relevant in this context. You do not know how the image is used, shared or stored.



Scenario 2, Face Verification: You are sitting at home. It's time for the holiday and I'm about to make a visa application for the holiday. You open your laptop or pick up your phone and log into the government visa service. You use your device's camera to scan your driver's license or passport to prove your identity. Then you scan your face. Facial verification technology confirms that your actual face matches the face in your ID and that you are genuine and complete this application immediately.


There is also face detection, which is the process of identifying when a face appears in a video or image without identifying that person in any way.


Face recognition and face verification are often confused and can be used interchangeably to mean the same thing. The truth is, however, that the two technologies and the purposes for which they are used are quite different and need to be considered separately. Ethical issues regarding facial recognition for surveillance, and calls for clarity and limits on its use, are issues that require serious public discussion.You can't generalize. Face verification is not the same thing as you say it is


What is face detection?


Face detection is defined as A computer technique that can recognize the presence of a human face in a digital image. To work, face detection applications use machine learning and formulas called algorithms to detect faces in larger images. The larger images may contain pictures that are not facial information of a human face, such as a roadside landscape, a part of a building, or possibly other parts among our body (shoulders, arms, legs, etc.)


Face detection is somewhat more widespread, more applied and more widely accepted by the market than face recognition. Face detection simply means that the system is able to recognize the presence or absence of a human face in an image or video. Face detection has multiple applications, only one of which is face recognition. Face detection can also be used in autofocus cameras. It can be used to count the number of people entering a particular area. Marketing purposes can also be achieved. For example, an advertisement can be displayed the moment a face is recognized.


High cost performance of Face Recognition Temperature Measurement system


How face detection works


Although the process is somewhat complex, face detection algorithms usually start by searching for the human eye. The eyes form the so-called valley area and are one of the easiest features to detect. Once the eyes are detected, the algorithm tries to detect the facial region, including the eyebrows, mouth, nose, nostrils and iris. Once the algorithm surmises that it has detected the facial region, it can apply additional tests to verify that it has indeed detected the face.


What is face recognition


However, one of the most important applications of face detection is face recognition. Face recognition applications describes a biometric technique that goes far beyond recognizing when a face appears. The system is always confirming whose face it is and whether it can be matched.. The process works using a computer application that captures a digital image of an individual's face (sometimes from a video frame) and compares it to an image in a stored records database. While facial recognition is not 100% accurate, it can be very accurate in determining when a person's face matches someone in the database.


Facial recognition has many applications. Facial recognition has been used to unlock cell phones and specific applications. There is also a place for face recognition as a technology in the scope of biometric surveillance.. Often facial recognition is used in banks, retail stores, stadiums and other public places such as airports to reduce and prevent violent crime.


In short, while all facial recognition systems use facial detection, not all facial detection systems have a facial recognition component.


Facial Recognition, which acquires a user's facial image through a video capture device, uses a core algorithm to calculate and analyze the position, shape and angle of the face, and then compares it with the existing model in its own database to determine the user's true identity. The face recognition algorithm, after detecting the face and locating the key facial feature points, the main face areas can be cropped out and fed into the back-end recognition algorithm after pre-processing. The recognition algorithm has to complete the extraction of face features and compare them with the known faces in the inventory to complete the final classification.


微信图片_20210406143717.png


The principle of face recognition algorithm: the system inputs a face image or a series of face images containing an unidentified identity and a number of face images with known identities in the face database or corresponding codes, while its output is a series of similarity scores indicating the identity of the face to be recognized.


There are two main uses of face recognition technology in daily life, one is for face verification (also called face matching) to verify "are you a certain person" and the other is for face recognition to verify "who you are".


2. Difference between face recognition and face verification


Face verification can actually be called as one of the face recognition.


What face verification does is 1:1 matching, and its identity verification mode is essentially a computer's fast face matching between the current face and the portrait database, and the process of whether it matches or not, which can be simply understood as proving that you are you.  What we need to do is, in the first step we need to tell the facial recognition system who we are, and then we also need to stand in front of the machine and let the machine recognize and determine if we are the me that I said in my mouth


The most common application scenario of this mode is face unlocking, where the terminal device (such as cell phones) only needs to compare the user's pre-registered photo with the photo collected on the spot to determine whether it is the same person, so that identity verification can be completed. 1:1 as a static comparison, generally in the financial and information security fields are more often used. For example, in the highway and airport security check, the person subject to inspection holds ID card and other documents and passes through the inspection channel, while the appearance of the person subject to inspection and ID card information is recognized, this process is a typical 1:1 mode of face recognition.


What face recognition does is 1:N matching, that is, after the system collects a photo of "me", it finds the image that matches the current user's face data from the massive portrait database and matches it to find out "who I am". For example, suspect tracking, community access control, meeting sign-in, and customer identification in the new retail concept.


1:N face recognition mode has both dynamic comparison and non-matching features. Dynamic recognition is done by intercepting a frame in a video or image to live face data and further verifying and comparing based on the dynamically acquired face data; while non-cooperative refers to the process of recognition that exhibits non-compulsory and efficient characteristics, where the recognition object can complete the work of face recognition without going to a specific location.


148104709_209577677552626_389030694585776727_n.png


Why do we need face verification?


Simply put, your online security requires facial verification.


Traditionally, we verify our identity by walking into a bank or government office and handing our documents to someone, who then confirms that the document matches the actual face they saw in front of them. But how do we move that process to the Internet? If I'm sitting on my couch using a mobile device, how do I prove to you that I am who I say I am?


Your face is the most secure way to verify your identity online, and the only way that businesses and government services can be sure that you and only you have access to your data: Verifying your face online is the most secure way to verify your identity, but it is also the only way that businesses and government services can snsure You are the only one who has access to your data


Knowledge-based security (such as passwords) can be shared or stolen and can be difficult to remember when you need a myriad of security for different accounts.


Device-based security (such as a phone or token) must be carried with you and can be stolen or lost.


Other biometric identifiers, such as iris or fingerprints, are not included in a driver's license or passport (unlike a photo).


Only through face verification can you prove online that you are the true holder of an identification document.


Online crime is on the rise, both in terms of the number of attacks and the sophistication of the tactics used by international criminal groups. We all need a way to protect ourselves from identity and financial theft.


Examples of where online face verification is beneficial.


In many cases, we as individuals need to confirm to businesses, banks and government services that we exist and that the entity claiming the identity is the rightful owner of that identity. Here are a few examples of how online face verification makes the process easier, faster and more secure.


Digital onboarding.


Banking: opening a bank account


Other financial services: applying for a credit card or insurance policy


Government services: applying for a visa, driver's license or passport


Healthcare: requesting access to your health records


Education: Apply for college or take an exam


Work Permits: Apply to become an Uber driver


Social Networking: Set up an account


Face Authentication.


Banking: add new payees or transfer large amounts of money


Other financial services: file an insurance claim


Government services: check visa status, update IDs


Healthcare: making appointments


Education: taking exams


Work permits: confirming I'm doing the job


Social networking: commenting or other activities


Face verification provides us with security, safety, simplicity and privacy in the digital world. It is completely different from face recognition and the two should be treated differently.

 

Tag: Face verification, face recognition

Brief Introduction: Founded in 2013, ShenZhen Jieyi Technology Co., Ltd. mainly focuses on Face Recognition Entrance Access software and hardware for years. We are a leading solution provider and manufacturer which integrates R&D, production and sales, we independently make the closed-loop of "AI algorithm + embedded software + hardware manufacturing", and provide high-performance products to the famous domestic and overseas Brands with OEM/ODM service.

Share

Time attendance and AI face recognition, Touch Screen Access Control Terminal, AI infrared temperature measurement terminal leader.

Contact US