Home Page > News Center > News Лучшие способы биометрической идентификации человека

Лучшие способы биометрической идентификации человека

Release time:2020-01-30

Did you know that the most hygienic, from the point of view of safety for human health, and available in use biometric scanners are contactless scanners?

This is the advantage of contactless verification over fingerprint verification.

Disadvantages that arise when using fingerprint readers in the control system

access and time tracking:

- The fingerprint verification method is not hygienic, as the scanning platform

in contact with dozens and hundreds of fingers of different people

- It is necessary to periodically wipe the scanner with an alcohol cloth to remove greasy fingerprints,

which with large accumulation lead to an increase in the duration of user identification

- The verification process itself is not fast, the identification time is 1.5 - 2 seconds

Fingerprint verification is one of the oldest biometric technologies. But there are others

technologies are no less reliable and more convenient to use for the end user. To such

Technologies include checking the user on the venous network of the palm, on the geometry of the face.

Venous mesh of the palm

In 2016, ZKTeco first introduced non-contact palm vein recognition technology, which

became a breakthrough in the field of biometric identification.

The algorithm for checking the user on the venous network of the palm is as follows:

Step 1. Palm Recognition

When the palm approaches the camera, the palm recognition process starts first to

determine if it is a palm. If the approaching object is not a palm, it will stop

further recognition process.

If the object in front of the camera is a palm, the scanner will proceed to the next step.

Step 2. Recognition of the venous network of the palm

After confirming that the object in front of the sensor is a palm, an infrared camera is activated, which

it extracts the unique lines formed by the veins of the palms and compares them with the existing database.

The whole process takes less than 1 second. Recognition range 10 - 20 cm.

The advantage of this technology:

- Non-contact check

- High level of anti-spoofing

- Relatively inexpensive scanners

Terminals for access control and time tracking with verification of the venous network of the palm:

ZKTeco PA10

The terminal for the accounting of working hours and access control of personnel with hybrid biometrics

palm / fingerprint.

ZKTeco P160

P series - multibiometric terminals for accounting of working hours and access control, to which you can connect any electric lock, exit button, door open sensor, etc.

Face geometry

The most popular biometric technology for personal identification, to date,

is face geometry recognition technology.

Technology Advantages:

- Contactless verification

- High level of anti-spoofing

- High identification speed of less than 0.5 seconds

- Recognition range up to 3 meters

- Ability to register a person remotely using a mobile phone

Based on the above advantages, this technology is the most relevant. Analogs with

the same characteristics for speed and identification range, at the moment, do not exist.

The technology is used in various fields of human activity.

How is the process of identifying a person’s face?

Step 1. Discovery

The system will first determine if there is a face in the image or video. During discovery, a program with

high accuracy allows you to find faces regardless of their size and ambient light.

Step 2. Positioning

Algorithms for determining the position allow you to accurately determine the three-dimensional angles of inclination of the object. Accuracy is especially important for further 3D image restoration.

Step 3. Quality Analysis

After evaluating the posture, the brightness and clarity of the image will be analyzed to ensure that

quality falls into the acceptable range, and weed out images that are classified as

unrecognizable, to prevent loss of computing power

Step 4. Alignment

Alignment of the face is the positioning of the eyes, nose and mouth of a person in the specified framework. This process

uses 2D transforms including motion, scaling, and rotation. Aligned

Images are more effective for identification.

Step 5. Retrieve Features

Next, a special algorithm analyzes the image, examining neighboring pixels, forms curves,

finds edges, defines shapes. After that, we can get a set of specific signs,

specific to a given person and perform a comparison with existing templates.

Protecting against fake identifications with photos

Unlike a “living” human face, the face in the photo moves with the whole photo,

including background photos. Given this feature, the program first captures

video sequence and analyzes neighboring frames, selects facial contours and analyzes behavior

pixels on the border in time, which makes it possible to understand whether a real background or photograph is used.

Protect against fake identifications with video

Self-training helps to identify the differences between a living human face and video.

It analyzes the texture and resolution, surrounding objects, background image, etc., which allows

detect the frame of a smartphone or tablet and detect an attempt to fake identification.

Terminals for access control and time tracking for face geometry:

ZKTeco Horus

Wireless terminal for time tracking and access control with identification by face geometry.

ZKTeco SpeedFace-H5

Access control terminal with identification by face geometry for indoor use.