12.01.2013 Views

Biometrics - Buro Jansen & Janssen

Biometrics - Buro Jansen & Janssen

Biometrics - Buro Jansen & Janssen

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

passport photos for future use. In this manner these surveillance cameras could monitor,<br />

recognise and follow ʹpotential terroristsʹ and other individuals.<br />

3.8 History of Facial Recognition System<br />

The first computer to recognise human faces was developed during 1964 and 1965. The<br />

pioneers of this automated facial recognition system were Woofy Bledsoe, Helen Chan Wolf<br />

and Charles Bisson. An intelligence agency funded this work, but did not allow much<br />

publicity.<br />

The technology works as follows; a large database of images and a photograph, the<br />

problem was to select from the database a small set of records such that one of the image<br />

records matched the photograph. The difficulty with this system was the recognition<br />

problem, because of the “great variability in head rotation and tilt, lighting intensity, angle,<br />

facial expression and aging etcetera. Some other attempts at facial recognition by machine<br />

have allowed for little or no variability in these quantities. Yet the method of correlation [or<br />

pattern matching] of unprocessed optical data, which is often used by some researchers, is<br />

certain to fail in cases where the variability is great. In particular, the correlation is very low<br />

between two pictures of the same person with two different head rotations” [Wikipedia,<br />

May 2007].<br />

3.9 Efficacy and Reliability<br />

Facial recognition is not the most reliable and efficient technique among the different<br />

biometric technologies. Its advantage is that is does not require any aid from the user. If a<br />

system is designed properly it could detect the presence of criminals among crowds. Other<br />

biometric techniques such as fingerprints, iris scans and speech recognition cannot perform<br />

this form of mass scanning. However it is not considered as a very reliable technique and<br />

questions have been raised about the effectiveness of facial recognition software in cases of<br />

railway and airport security.<br />

3.10 Secure Access Road B.V.<br />

Company<br />

Secure Access Road BV [SAR BV] was founded in 2001 and has an office nearby Rotterdam,<br />

in Puttershoek. SAR BV has implemented various biometric bases access systems in several<br />

companies in different branches of industry.<br />

SAR BV is the provider of biometric based access systems. In combination with biometric<br />

technologies they develop several applications which allow the customer to see time and<br />

attendance, customer loyalty and electronic payment. The main links between these<br />

applications are stored on a smart card.<br />

SAR BV has several partners such as Alcazar Pleasure Village and B+P Computersystems.<br />

In 2000 these two parties aimed to develop a biometric access control system for the<br />

catering industry in order to keep out troublemakers.<br />

25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!