next up previous
Next: Surveillance Systems Up: Introduction Previous: Introduction


System security

The system security is of particular interest. The current approaches include user authentication through either unique physical or behavioral attributes (such as speech recognition, iris checking, thermal scanning and signature checking) or on keys, PINs or passwords. However they are all quite obtrusive.

But face recognition offers another approach - the least obtrusive of them. It's capable of validating the user without the participation of the user - therefore eliminating some form of privacy invasion. But that is not the only field in which face recognition can play an important role.



2002-05-26