Feeds

No hiding place - facial biometrics will ID you, RSN

Falling costs and error rates threaten to eliminate privacy

High performance access to file storage

Opinion One of the technologies that has been on a steadily accelerating price/performance curve is face recognition technology. A series of talks this year demonstrated just how quickly the software is improving.

Every year there’s an event in London called Biometrics. It’s a conference all about the state of biometric technology and is accompanied by an exhibition.

I’ve been going for a few years now, and I find it really interesting to walk the floor to see what is changing, to see which technologies are in and which are on their way out.

The state of the art can be illustrated by some of the examples given by the US National Institute for Standards and Technology (NIST) in their presentation on testing biometrics.

  • A “1 in 1.6m” (that is, looking for one photo in a database of 1.6m photos) search on a 16-core 192Gb blade (about £25,000 worth of machine) takes less than one second (and the speed of such a search continues to improve). So if you have a database of a million people, and you’re checking a picture against that database, you can do it in less than second.
  • The false non-match rate (in other words, what proportion of searches return the wrong picture) best performance is accelerating: in 2002 it was 20 per cent, by 2006 it was 3 per cent and by 2010 it had fallen to 0.3 per cent. This is an order of magnitude fall every four years and there’s no reason to suspect that it will not continue.
  • The results seem to degrade by the log of population size (so that a 10 times bigger database delivers only twice the miss rate). Rather fascinatingly, no one seems to know why, but I imagine it must be some inherent property of the algorithms used.

We're still some way from Hollywood-style biometrics where the FBI security camera can spot the assassin in the Superbowl crowd. The false non-match rate is still too high. In a database of a million people, if you are searching for me you will get back hundreds, if not thousands of false matches. But it is the trend line that is the important thing here, not the instantaneous performance, and the initial use case will be for searching much smaller databases anyway. Say I’m at a conference, for example, and I see someone I recognise but can’t remember their name: I point my iPhone camera at them (surreptitiously) and ask the LinkedIn app to search my network, or perhaps I ask the conference organiser to identify them. In either case, the system is searching a database of only a few hundred faces.

That trend line is unlikely to take us down to a yes/no: as The Economist recently noted, biometric systems do not provide binary for such answers. They are “probabilistic” and this makes them inherently fallible. The chance of producing an error can be made small but never eliminated. While confidence in the results has therefore to be tempered by a proper appreciation of the uncertainties in the system, nevertheless, in a couple of years time you’ll be able to search a database of a million pictures, looking for me, and get back a dozen hits: me and a few false matches that you’ll inspect. That’s good enough, I’d suggest, to radically transform the way we interact. You can see that we are heading into some new territory. Even entry-level consumer software such as Picasa or iPhoto has this stuff built in to it.

face_recognition_tech

iPhoto face recognition in action

It's not perfect, but it’s pretty good. And these kinds of “passive” biometrics are finding their way into all sorts of places. Microsoft’s new games platform creates a 3D model of a player. One of the team doing this points to a prosaic use case: “It knows when they are sneakily trying to log into their older brother's account and trying to cheat the system... You can’t do it. Your face is the ultimate detection for the device.”

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.