Researchers Find Steps To Improve Facial Recognition Systems At Border Entry Points

Facial recognition systems perform some very challenging tasks such as checking an individual’s photo against a database of known or suspected criminals. The task can become nearly impossible when the systems acquire poor facial images -- a situation that occurs all too often in real-world environments.

Now, researchers at the National Institute of Standards and Technology (NIST) have found that several simple steps can significantly improve the quality of facial images that are acquired at border entry points such as airports and seaports.

Better yet, the NIST recommendations for improving facial images can be implemented relatively easily with existing facial recognition technology.

Travelers entering the United States have their pictures taken and their fingerprints collected digitally as part of the US-VISIT program implemented by the Department of Homeland Security. US-VISIT and NIST work together on an ongoing basis to improve processes and technology. A 2007 NIST study of facial images collected at border entry points, however, found that the captured facial images were not as clear and useful for automated recognition as they could be.

In usability and human factors research performed for US-VISIT as part of a large joint effort to improve facial recognition technology, NIST’s Mary Theofanos and her colleagues sought simple ways of obtaining better facial images in often hectic real-world conditions without having to deploy new technology. The NIST researchers first visited and observed a DHS border entry point at Dulles Airport in the Washington, D.C. area to see the facial-image capturing process.

As a result of these observations, the researchers identified and shared with US-VISIT a number of steps to take for acquiring better facial images. For example, the report recommends that operators should adjust camera settings to ensure the subject comes into sharp focus. The report also recommends using a traditional-looking camera in facial-recognition systems so that individuals could clearly recognize the camera and look into it.

Following the Dulles site visit, a study adopted these steps in taking facial images of 300 participants while mimicking the real-world conditions of a border entry point. In these tests, 100 percent of the images fully captured the participant's face; all of the participants faced the camera; and the researchers found additional improvements by using a graphical overlay to the camera display in order to better position the camera.

The researchers believe these steps will improve the performance of facial recognition systems in real-world settings using existing technology. A follow-up study is underway in which the researchers are incorporating the graphical overlay into the workflow of camera operators.

This work was sponsored by the Science and Technology Directorate at the Department of Homeland Security.

Featured

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities