One of the functions of AI is what we call computer vision, where the system does not generate graphics, but rather learns to identify elements in the environment and act accordingly. This was first used to catalog photos of cats as an experiment, and no, I’m not kidding. However, today many use their own face to unlock the mobile or make a bank transfer. It’s easy and comfortable, so we’ll tell you how it works.
Face ID, how does it work?
What facial identification does is detect a series of facial elements that are unique to each person and will not be changed. To do this, it uses your PC’s webcam, although what is dangerous here is the fact that the system does not have the ability to differentiate a photo from the real person. However, some of these systems use very poor quality biometrics by taking the whole face and not just the key parts.
What if the facial features change for some reason? The person has lost weight, wears makeup, has grown a beard, changed the shape of his glasses, etc. All of these may seem trivial to you, but they are not, and a poor Face ID system can leave you without access to your data. So how can this work if we have continuous cosmetic and appearance changes in our lives?
Well, because computer vision can identify the basic elements of the face
It is therefore important that the web or mobile front camera, responsible for the capture has sufficient resolution in order to have a good enough sample to make the corresponding comparison. The process isn’t easy and wasn’t made possible on mobile until neural processors, which are still unheard of on many PCs, became popular.
And what about the use of voice?
The human voice is so much easier to build and imitate that it actually takes very little time with today’s systems to create an entirely new synthetic voice or even imitate another person’s voice. Which is dangerous since a person can pretend to be another and put them in a compromise or in a very uncomfortable situation.
However, the use of voice in combination with facial recognition can serve as confirmation and prevent someone from using a simple photo to access content that is private and not authorized by its owner. Either way, most of the built-in microphones in people’s laptops don’t have enough power to know how to tell the nuances of audio apart.