TSA introduced facial recognition technology into the screening process at select airports. The facial recognition technology represents a significant security enhancement and improves traveler convenience. A traveler may voluntarily agree to use their face to verify their identity during the screening process by presenting their physical identification or passport. The facial recognition technology TSA uses helps ensure the person standing at the checkpoint is the same person pictured on the identification document (ID) credential. Photos are not stored or saved after a positive ID match has been made, except in a limited testing environment for evaluation of the effectiveness of the technology.
TSA is currently updating CAT-2 screens with clear language that notifies travelers they may decline having their photo taken. TSA also has signage posted at the checkpoint indicating that the technology is optional and travelers may decline having their photo taken. Travelers under 18 are not photographed.
TSA is grounding its exploration of facial recognition solutions in rigorous scientific study and analysis to include alignment with National Institute of Standards and Technology (NIST) standards and applies stringent safeguards for traveler privacy and convenience:
Facial recognition uses face analyzer software that identifies or confirms a person's identity using their face. It works by identifying and measuring facial features in an image. Facial recognition can identify human faces in images or videos, determine if the face in two images belongs to the same person, or search for a face among a large collection of existing images. Biometric security systems use facial recognition to uniquely identify individuals during user onboarding or logins as well as strengthen user authentication activity. Mobile and personal devices also commonly use face analyzer technology for device security.
A face analyzer is software that identifies or confirms a person's identity using their face. It works by identifying and measuring facial features in an image. Facial recognition can identify human faces in images or videos, determine if the face in two images belongs to the same person, or search for a face among a large collection of existing images. Biometric security systems use facial recognition to uniquely identify individuals during user onboarding or logins as well as strengthen user authentication activity. Mobile and personal devices also commonly use face analyzer technology for device security.
Facial recognition is a quick and efficient verification system. It is faster and more convenient compared to other biometric technologies like fingerprints or retina scans. There are also fewer touchpoints in facial recognition compared to entering passwords or PINs. It supports multifactor authentication for additional security verification.
Facial recognition is a more accurate way to identify individuals than simply using a mobile number, email address, mailing address, or IP address. For example, most exchange services, from stocks to cryptos, now rely on facial recognition to protect customers and their assets.
Face recognition technology is compatible and integrates easily with most security software. For example, smartphones with front-facing cameras have built-in support for facial recognition algorithms or software code.
Companies use facial recognition to uniquely identify users creating a new account on an online platform. After this is done, facial recognition can be used to verify the identity of the actual person using the account in case of risky or suspicious account activity.
Companies use facial recognition technology instead of passwords to strengthen cybersecurity measures. It is challenging to gain unauthorized access into facial recognition systems, as nothing can be changed about your face. Face recognition software is also a convenient and highly accurate security tool for unlocking smartphones and other personal devices.
Many airports use biometric data as passports, allowing travellers to skip long lines and walk through an automated terminal to reach their gate faster. Face recognition technology in the form of e-Passports reduces wait times and improves security.
Individuals authenticate transactions by simply looking at their phone or computer instead of using one-time passwords or two-step verification. Facial recognition is safer as there are no passwords for hackers to compromise. Similarly, some ATM cash withdrawals and checkout registers can use facial recognition for approving payments.
Machines use computer vision to identify people, places, and things in images with accuracy at or above human levels and with much greater speed and efficiency. Using complex artificial intelligence (AI) technology, computer vision automates extraction, analysis, classification, and understanding of useful information from image data. The image data takes many forms, such as the following:
Human face recognition systems use unique mathematical patterns to store biometric data. Hence, they are among the safest and most effective identification methods in biometric technology. Facial data can be anonymized and kept private to reduce the risk of unauthorized access. Liveness detection technology distinguishes live users from their facial images. This prevents the system from being tricked by the photograph of a live user.
Confidence scores, also known as similarity scores, are crucial for face detection and comparison systems. They provide feedback about how similar two images are to each other. A higher confidence score indicates a higher likelihood that two images are of the same person. Thus, confidence scores use AI to predict whether a face exists in an image or matches a face in another image.
Every prediction that the facial recognition system makes using AI has a corresponding score threshold level that you can change. In a typical scenario, most automated matches are made on a very high percentage, for example, above a 99% confidence score. Matches with lower confidence scores may be used to see the next closest potential matches, which are then further evaluated by a human investigator.
Voice recognition systems extract the characteristics that distinguish an individual's speech from others. It creates a voiceprint that is similar to a fingerprint or faceprint and matches it to samples in a database.
You can use Amazon Rekognition to automate image and video analysis with machine learning. Amazon Rekognition offers pretrained and customizable computer vision capabilities to extract facial information and insights from your images and videos. You can use Amazon Rekognition to perform the following tasks:
c01484d022