Next: Surveillance Systems
Up: Introduction
Previous: Introduction
System security
The system security is of particular interest. The current approaches include user authentication through either unique physical or behavioral attributes (such as speech recognition, iris checking, thermal scanning and signature checking) or on keys, PINs or passwords. However they are all quite obtrusive.
But face recognition offers another approach - the least obtrusive of them. It's capable of validating the user without the participation of the user - therefore eliminating some form of privacy invasion. But that is not the only field in which face recognition can play an important role.
2002-05-26