Feeds

Facebook trains self to recognize your face

Zuckerberg's internet knows what you look like

The Power of One Infographic

Facebook is adding face recognition, working to automatically provide tags for the photos you upload to Mark Zuckerberg's own private internet.

When you upload pics, Facebook's photo sharing service will seek to identify faces and suggest tags accordingly. It identifies faces using, yes, previously tagged photos.

According to Facebook, Facebookers add more than 100 million tags to photos each day, and with face recognition, the company hopes to make the process easier. "While tags are an essential tool for sharing important moments, many of you have said tagging photos can be a chore. (Like that time you had to tag your cousin and her fiancé over and over and over again in 64 different pictures of their engagement party, and then go back and tag the guests)," Facebook engineer Justin Mitchell said in a blog post.

"Now if you upload pictures from your cousin's wedding, we'll group together pictures of the bride and suggest her name. Instead of typing her name 64 times, all you'll need to do is click "Save" to tag all of your cousin's pictures at once. By making tagging easier than before, you're more likely to know right away when friends post photos."

The flip side is that it's kinda creepy when people start tagging you in their photos. Facebook offers a privacy setting that will prevent it from suggesting your name as a tag, but users will still be able to tag photos of you manually. You're always notified when you've been tagged, and you can remove tags whenever you like. You can only be tagged by your Facebook "friends."

The face recognition will be rolled out to US-based users over "the next few weeks." ®

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.