How reliable is VeriFace facial recognition software?

aiden

I use VeriFace to log onto my Lenovo laptop by default. It is quick and logs me in easily, but I have to wonder how secure it really is. Would some other brown haired, blue-eyed guy in his 30s fool the software on my laptop, for example? I'm a big fan of making things easier for myself, but I do need a modicum of security too.

Topic: Security
Answer this Question

Answers

2 total
blackdog
Vote Up (20)

So-So. I've used VeriFace before, which I think may only be on Lenovo machines, and it logged me on quickly and easily. It's good enough for casual security, if that term has any meaning. It would probably be sufficient to deny access to the guy in your office who likes to play tricks on you. I haven't check this myself, but I have seen tests of some facial recognition software that is easily fooled by a photograph. Considering the ubiquitous presence of mobile devices with good cameras, it wouldn't be all that difficult for someone to take a snapshot of you and potentially defeat the software. Perhaps the software has improved since those tests, but I'm not sure. 

jimlynch
Vote Up (11)

Here's an interesting background article on this.

Facial recognition system
http://en.wikipedia.org/wiki/Facial_recognition_system

"A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.
It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.[1]"

Ask a question

Join Now or Sign In to ask a question.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe when you travel.
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.
Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+