Feeds

'100% accurate' face recognition algorithm announced

Glasgow trick-cyclists' amazing claim

Secure remote control for conventional and virtual desktops

Psychology researchers at Glasgow University say they have increased the accuracy of automated face recognition to 100 per cent. If the claims are true, this development will have far-reaching consequences for privacy and security in modern society.

Mike Burton, Professor of Psychology at Glasgow, and lecturer Rob Jenkins say they achieved their hugely-improved results by eliminating the variable effects of age, hairstyle, expression, lighting, different camera equipment etc. This was done by producing a composite "average face" for a person, synthesised from twenty different pictures across a range of ages, lighting and so on.

A face, averaged using the Glasgow process

An "average face" produced from a typical rogues' gallery.

According to the two researchers:

We modelled human familiarity by using image averaging to derive stable face representations from naturally varying photographs. This simple procedure increased the accuracy of an industry standard face-recognition algorithm from 54 per cent to 100 per cent, bringing the robust performance of a familiar human to an automated system.

The Glaswegian psychologists may be hot stuff at face recognition, but plainly aren't engineering types - an engineer who said he'd produced a system with 100 per cent reliability would be laughed out of the room. In this case the duo mean that their system got it right every time in their tests, not that they have actually increased its accuracy to 100 per cent.

However, if they have genuinely achieved something above - say - three or four nines, that could be very significant. The British security hierarchy has recently called for the nation's wide but unconnected CCTV coverage to be upgraded, expanded and - most significantly - centrally accessible. Combined with reliable automatic face recognition, such a system would allow the location and tracking of individuals en masse. Provided they weren't wearing their hoodies up, of course, as one might expect in many cases.

In the end, the claim of 100 per cent accuracy is obviously an exaggeration - and that tends to diminish the credibility of the research. Still, the averaging technique could well give automated face-spotting software a boost nonetheless. It may not be long before criminals get 20 snaps or more taken under different lighting conditions, rather than the standard mugshot.

Not that average-image CCTV scanner systems of the future would necessarily need such police files. Burton and Jenkins claim to have achieved good results using compilations of snaps culled randomly from the internet in many cases.

Yet another way in which Flickr/MySpace/Facebook account could drop you in it, then. ®

The essential guide to IT transformation

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
Told to cough up more details as antitrust probe goes deeper
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.