Face recognition is similar to fingerprint recognition and iris recognition. It is a biometric recognition technology based on human facial feature information. It uses a camera to collect images or video streams containing human faces, and automatically detects and tracks in the images. Face, and then perform a series of facial authentication on the detected face. At present, this technology has been widely used in smart door locks, mobile payments, mobile phone unlocking, etc., from companies, schools, communities to shopping malls, stations, airports, and face recognition technology. "Brushing face" has become a daily affair in people's lives.
"Face Recognition System" integrates various professional technologies such as artificial intelligence, machine recognition, machine learning, model theory, expert system, video image processing, etc. It also needs to combine the theory and implementation of intermediate value processing. It is the latest application of biometric recognition. The realization of its core technology shows the transformation from weak artificial intelligence to strong artificial intelligence. Relying on artificial intelligence technology, the face recognition system has become an intelligent mobile law enforcement platform with independent thinking and learning capabilities. For countries with large populations, its emergence plays a very important role for the police to fight criminals and protect public safety. In 2016, at the G20 Group Summit held in Hangzhou, the first smart police car was equipped with face recognition technology. It successfully completed the security tasks at the summit and provided representatives of the summit member states with intelligent security services that are in line with international standards, which was well received; 2018 , The police used face recognition technology to repeatedly arrest criminals at the concerts of Jacky Cheung and Jay Chou.
However, in 2017 CCTV 315 also questioned face recognition. In the test at the party, the technicians used the software to modify the face picture for face recognition, thereby bypassing the network real-name authentication system. Face recognition technology suddenly became the focus of heated discussion, and the public has doubts about the security of the platform using face recognition technology.
Subsequently, companies related to face recognition technology responded to social doubts. Alipay said: Only users who have successfully logged in with a password on the current mobile phone will open face recognition, and there will be no situation where they can successfully log in on a new mobile phone only through the facial information. Baidu’s technical staff said that the company’s face recognition system has excellent technology. Although it is still difficult to implement live face detection into applications, the recognition of prosthetic attacks is mature. In addition, Shangtang Technology, Megvii Technology, and Yuncong Technology also pointed out that the latest face anti-counterfeiting technology pays more attention to the media attributes of the forged content itself and the difference between the synthesized image and the natural image. It is not possible to simply simulate the face of the photo. Recognized by the scene. At the same time, these face recognition technology companies also remind users to pay more attention to Weibo and Moments, so as not to leave loopholes for people with bad intentions.
It is true that face recognition technology still has the risk of misjudgment and misappropriation, but the maintenance of public social security and the change of convenient and safe life by face recognition technology are worthy of recognition. At present, with the development of artificial intelligence technology and the application of face recognition technology becoming more and more mature, the technology to improve the accuracy and security of face recognition is becoming more and more mature, such as living body detection, multi-modal recognition technology, etc. Effectively improve the security of face recognition. In the future, it is believed that face recognition technology will have wider and wider applications.
we take great pride in our quality control procedures and our commitment to quality our CAT8 Shielded HD Component Rated Keystone Jack line is subject to EIA/TIA standards and FLUKE compliant. Our CAT8 Shielded HD Component Rated Jacks meet all requirements for ANSI/EIA/TIA 568 C.2-1 Compliance and are inspected and tested to comply with stringent industry transmissions and safety standards.
CAT8 Keystone jack, Shielded Keystone jack, RJ45 CAT8 modular jack
NINGBO UONICORE ELECTRONICS CO., LTD , https://www.uniconmelectronics.com