Security's Changing Face

3-D face readers are more accurate and better suited for access control

Facial recognition technology has entered a new dimension. It has left the flat world of machine-readable 2-D photographs and entered the world of 3-D. Three-dimensional facial recognition can offer significant advantages over 2-D and is geared toward enterprise access control.

Face recognition has been gaining popularity as a biometric identity verification solution—with annual revenue expected to exceed $1 billion by 2012, according to the International Biometric Group.

Verification and Identification
While 2-D is being used by law enforcement for identification, it is not well suited for verification. Identification involves comparing an image against a database of images to identify a person. In verification solutions, a biometric identifier is compared either to another template called up through a PIN, a smart card or against a small database of other templates. However, because 2-D images are affected by lighting conditions and factors, such as shadows, they are not suitable for access control. In UK trials of biometric passports, only 69 percent of able-bodied volunteers and 48 percent of disabled participants were correctly authenticated. Some 3-D facial recognition systems, however, use their own near-infrared light source, which means they can make accurate matches, even in poor lighting conditions.

And 3-D facial recognition technology has other advantages. It is possible to collect more data points with 3-D—up to 40,000 with some tools—and the types of data points collected are more valuable. While a 2-D system might make a match using the distance between the eyes, 3-D uses the curvature of the forehead. The latter is more useful because it allows 3-D systems to make matches, even if a face changes as a result of a scar or facial swelling due to an accident or a change in weight.

There are two approaches to 3-D facial recognition—stereo and structured light. Stereo 3-D systems create 3-D images by synthesizing two or more 2-D photos. This compute-intensive approach adds an unnecessary layer of complexity to 3-D face matching and, like 2D, is hampered by poor lighting conditions. Structured-light, 3-D face readers, on the other hand, shine an invisible, near-infrared grid-shaped light on a user’s face while a camera takes a picture of the distortions in the grid caused by the face, collecting approximately 40,000 data points.

Access Control
3-D face recognition is designed to make accurate matches, even when the threshold for matches is set very high. This is the exact situation encountered in a deployment by the Regional Transportation District of Denver.

With 85 million passenger trips aboard its light rail, bus, call-n-ride and access-a-ride services each year, the RTD handles millions of dollars in transit fees annually. Like other financial organizations, the RTD treasury needed a top-of-the-line security solution that strictly controls access to its offices and safes. The RTD found what it was looking for in Bioscrypt’s VisionAccess 3-D face readers.

The treasury deployed face readers in conjunction with a Lenel card access system in an award-winning deployment. The treasury entrance also features a mantrap to ensure that only one person can enter at a time.

By adding 3-D face readers to its access control solution, RTD now employes strong authentication solutions. In use, treasury staff pause in front of the reader, where it makes a match with the template stored on their card in less than a second. The initial enrollment process is likewise quick and only takes 6 to 8 seconds.

“Security at the treasury has been increased significantly,” said Don Young, the RTD treasury’s manager. “Bioscrypt’s 3-D face readers are an elegant and simple solution that will present a significant challenge to anyone attempting to gain unauthorized access to the treasury.”

High Standards
Organizations have the ability to set different thresholds for security with any biometric implementation. At a high threshold that raises the number of data points that must match in order for someone to be granted entrance, there will be fewer false accepts—the authorization of unauthorized personnel—but an increase in false rejects—declining access to someone who is actually authorized. At lower thresholds, the number of false accepts increases, while the number of false rejects decreases.

The treasury needed to set its system at a high threshold.

"We have the treasury's security access thresholds set on high because treasury cannot tolerate any false accepts, yet we experience a 99 percent throughput rate. Bioscrypt’s readers are serving us with fast speeds and high accuracy," Young said.

Like other biometric solutions, face recognition uses who a person is, rather than what they know or what they have for identity verification, significantly increasing security without sacrificing convenience. Passwords and PINs—what a person knows—can be stolen, forgotten, lost or lent out. Smart cards, proximity cards and tokens—what a person has—can likewise be stolen, misplaced, forgotten, forged or borrowed. A person’s face or fingerprint—who a person is—however, is always with them and can’t be stolen or copied. Using face recognition alone or in conjunction with another authentication factor for dual- or multi-factor authentication, therefore, significantly increases security.

Featured

  • It's Show Time

    I am one of those people that likes to see things get bigger and better. As advertised, ISC West is going to be bigger (more exhibitors) and better (more attendees). It’s show time in Las Vegas. Read Now

    • Industry Events
    • ISC West
  • SIA Releases New Report on Operational Security Technology

    The Security Industry Association (SIA) has released an impactful new resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Read Now

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”