Browse Definitions:

facial recognition

Facial recognition is a category of biometric software that maps an individual's facial features mathematically and stores the data as a faceprint. The software uses deep learning algorithms to compare a live capture or digital image to the stored faceprint in order to verify an individual's identity.

High-quality cameras in mobile devices have made facial recognition a viable option for authentication as well as identification. Apple’s iPhone X, for example, includes Face ID technology that lets users unlock their phones with a faceprint mapped by the phone's camera. The phone's software, which is designed with 3-D modeling to resist being spoofed by photos or masks, captures and compares over 30,000 variables. As of this writing, Face ID can be used to authenticate purchases with Apple Pay and in the iTunes Store, App Store and iBooks Store. Apple encrypts and stores faceprint data in the cloud, but authentication takes place directly on the device.

Developers can use Amazon Rekognition, an image analysis service that's part of the Amazon AI suite, to add facial recognition and analysis features to an application. Google provides a similar capability with its Google Cloud Vision API. The technology, which uses machine learning to detect, match and identify faces, is being used in a wide variety of ways, including entertainment and marketing. The Kinect motion gaming system, for example, uses facial recognition to differentiate among players. Smart advertisements in airports are now able to identify the gender, ethnicity and approximate age of a passersby and target the advertisement to the person's demographic.

Facebook uses facial recognition software to tag individuals in photographs. Each time an individual is tagged in a photograph, the software stores mapping information about that person’s facial characteristics. Once enough data has been collected, the software can use that information to identify a specific individual's face when it appears in a new photograph. To protect people's privacy, a feature called Photo Review notifies the Facebook member who has been identified.

Currently, there are no laws in the United States that specifically protect an individual's biometric data. Facial recognition systems are currently being studied or deployed for airport security and it's estimated that more than half the United States population has already had their faceprint captured. According the Department of Homeland Security, the only way to avoid having biometric information collected when traveling internationally is to refrain from traveling. The General Data Protection Regulation (GDPR) for European Member States does address biometric data.

How a simple facial recognition application works

The software identifies 80 nodal points on a human face. In this context, nodal points are endpoints used to measure variables of a person’s face, such as the length or width of the nose, the depth of the eye sockets and the shape of the cheekbones. The system works by capturing data for nodal points on a digital image of an individual’s face and storing the resulting data as a faceprint. The faceprint is then used as a basis for comparison with data captured from faces in an image or video.

Even though the facial recognition system only uses 80 nodal points, it can quickly and accurately identify target individuals when the conditions are favorable. However, if the subject’s face is partially obscured or in profile rather than facing forward, or if the light is insufficient, this type of software is less reliable. According to the National Institute of Standards and Technology (NIST), the incidence of false positives in facial recognition systems has been halved every two years since 1993.

Uses of facial recognition technology

  •  A research team at Carnegie Mellon has developed a proof-of-concept iPhone app that can take a picture of an individual and -- within seconds -- return the individual's name, date of birth and social security number.
  • The Google Arts & Culture app uses facial recognition to identify museum doppelgangers by matching a real person's faceprint with portrait's faceprint.
  • Professor Shen Hao of the Communications University of China uses facial recognition technology to track students’ attendance.
  • Amazon, MasterCard and Alibaba have rolled out facial recognition payment methods  commonly referred to as selfie pay.

See also: machine vision, gesture recognition, IP surveillance, intelligent video

Kim Komando explains facial recognition technology:

This was last updated in January 2018

Continue Reading About facial recognition

Join the conversation


Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

i had to find some of this stuff out for a school project, it helped me out alot, :) thanks
great site, thanks alot, helped me out
do they sue facial recognition on public sites like facebook and twitter??
What concerns do you have about privacy as the use of facial recognition and other biometric technologies increase?


File Extensions and File Formats

Powered by:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.