How well does facial recognition work for device security?

StillADotcommer

Some of the laptops around the office as well as some new Androids have facial recognition software that can be used in lieu of a pin or swipe pattern to unlock the device. I haven't taken the time to really test it out since neither my Android or laptops has the feature, and I've had enough other stuff to keep me busy lately. I've used alternatives to passwords/logins in the past with mixxed results. I have fingerprint recognition on my laptops and it works ok, but I have to try it more than once much of the time I use it to unlock them, which negates the whole reason to have it, i.e. ease and speed of accurate identification. As a result, I just use a password most of the time. Does the facial regonition method work pretty well or is it more of a gee-whiz type gimmick?

Topic: Security
Answer this Question

Answers

3 total
jimlynch
Vote Up (16)

I haven't used it, but here are two background articles that might give you some interesting perspective on facial recognition:

Facial recognition system
http://en.wikipedia.org/wiki/Facial_recognition_system

How Facial Recognition Systems Work
http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-re...

Vote Up (14)

I have been using facial recognition software for about 5 weeks with a lot of success.  I operate an IT consulting company had have used it many different places.  The problem I have ran into the most is differing light conditions.  But it seems to be working better the longer I use it.  I have mine set to require a 4 digit pin even after the facial recognition.  You can also put your password in if the camera doesn't recognize you and add those images to the database.  I just have a low end 2MP webcam and have had some trouble when it comes out of sleep mode.  Occasonally the camera will not work until I reboot my laptop.  But it seems to work very well overall.

 

Vote Up (13)

I have been using facial recognition software for about 5 weeks with a lot of success.  I operate an IT consulting company had have used it many different places.  The problem I have ran into the most is differing light conditions.  But it seems to be working better the longer I use it.  I have mine set to require a 4 digit pin even after the facial recognition.  You can also put your password in if the camera doesn't recognize you and add those images to the database.  I just have a low end 2MP webcam and have had some trouble when it comes out of sleep mode.  Occasonally the camera will not work until I reboot my laptop.

 

Ask a question

Join Now or Sign In to ask a question.
Information security isn't a luxury these days. It's a necessity.
Auth0, a provider of identity services that developers can build into their apps, scored a $2.4 million investment.
Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform.
After a one-week delay, Adobe Systems has released security updates for its Reader and Acrobat products to patch critical vulnerabilities that could lead to computers being compromised.
Yelp has agreed to pay US$450,000 to the U.S. Federal Trade Commission to settle charges that the company accepted registrations to its services from children under 13 through its apps.
Apple on Tuesday began offering an additional security protection for iCloud account users, a move the company made following the theft of nude photos from several celebrities' accounts last month.
Hackers purportedly representing Anonymous hit Boston Children's Hospital with phishing and DDoS attacks this spring. The hospital fought back with vigilance, internal transparency and some old-fashioned sneakernet. That – and a little bit of luck – kept patient data safe.
A Citadel variant has been used against several Middle Eastern petrochemical companies, marking the first time the financial malware has been found in targeted attacks against companies.
Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor.
The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+