{"id":57860,"date":"2017-05-03T00:00:00","date_gmt":"2017-05-02T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/"},"modified":"2021-03-29T14:16:19","modified_gmt":"2021-03-29T12:16:19","slug":"extreme-facial-recognition-technology-the-end-of-hide-and-seek","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/","title":{"rendered":"Extreme facial recognition technology: the end of hide-and-seek"},"content":{"rendered":"<ul class=\"bold-list\">\n<li>Digital Democracy makes you \u2018a fly on the wall\u2019 at the state house<\/li>\n<li>Facial recognition body cameras turn police officers into mobile surveillance systems<\/li>\n<li>With facial recognition software, diagnosing genetic disease is as quick as taking a photo<\/li>\n<li>Fighting thieves with new-age mug shots<\/li>\n<li>No more hide-and-seek<\/li>\n<\/ul>\n<p>Remember that moment when you saw someone on the street and were sure you\u2019d seen their face before? You searched your memory and then suddenly you got it \u2014 you remembered her from your trip to the grocery store the previous week. The biological process of <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/blog\/soon-facial-recognition-tech-will-have-permeated-all-areas-of-our-lives\/\">facial recognition<\/a> led you to this conclusion. Each person has distinctive facial features: their eye shape, or maybe a big forehead or a pointy nose, and we use these features to differentiate between people at a glance.<\/p>\n<p><iframe title=\"Extreme facial recognition technology: the end of hide-and-seek\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/gvBqjSHQbv0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>Nodal points &#8211; those features we don\u2019t immediately recognise<\/h2>\n<p>However, there are some delicate characteristics that we\u2019re not able to recognise immediately, things like the distance between a person\u2019s eyes, the depth of their eye sockets, or the length of their jaw. These are known as nodal points, and researchers suggest that each face has approximately eighty of them. We\u2019re not able to process those features because we look at the face as a whole, but they\u2019re a distinctive marker of identity. &#8221;Facial recognition software is already quite accurate in measuring unchanging and unique ratios between facial features that identify you as you,\u201d Jan Chipchase, a facial recognition researcher insists. \u201cIt&#8217;s like a fingerprint.&#8221;<\/p>\n<p>In the last few years, in part due to the explosion of <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/blog\/potential-artificial-intelligence-impressive-horrifying\/\">AI<\/a>, facial recognition systems have developed rapidly. You&#8217;ve probably seen at least one episode of CSI, where investigators are able to catch a criminal and solve a crime based on high-tech facial recognition tech. In reality, it&#8217;s much more difficult than that, and though facial recognition technology has progressed, it&#8217;s still far from what we see on TV shows like CSI.<\/p>\n<figure id=\"attachment_32773\" aria-describedby=\"caption-attachment-32773\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-32773 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/facial-recognition-data-points.jpg\" alt=\"A 3D human face with a mapped front and side profile \" width=\"800\" height=\"428\"><figcaption id=\"caption-attachment-32773\" class=\"wp-caption-text\">In the last few years, in part due to the explosion of AI, facial recognition systems have developed rapidly.<\/figcaption><\/figure>\n<h2>Teaching a computer how to differentiate between mugshots<\/h2>\n<p>Facial recognition has been an ongoing project for decades. The pioneers in automated facial recognition were members of a team led by the American computer scientist and one of the founders of AI, Woodrow Wilson Bledsoe. Bledsoe, along with his colleagues Helen Chan Wolf and Charles Bisson, worked on using computers to recognise facial features. Throughout 1964 and 1965, they used a database consisting of mugshots to teach a computer to differentiate between faces. This process wasn&#8217;t completely computer-based since humans determined the coordinates on each face from the photograph, and then put those coordinates into the computer to process them. But by doing so, they established the nodal points in the computer\u2019s memory, allowing it to establish and remember such things as the width of the mouth and eyes and distance from pupil to pupil. Using this method of facial recognition, the computer could process about forty photos an hour. This experiment was largely secret, and in the following years, similar tests were conducted using the Bledsoe process. Some of these demonstrated fascinating results; computers, for instance, were able to surpass humans when given facial recognition tasks because of their ability to see the small differences we lose in the big picture. This early work led to refinements in the process, and now, facial recognition uses two main, and various other approaches.<\/p>\n<p><iframe title=\"The Most Advanced and Powerful Face Recognition System\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/0OvvA-jvmWw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>Geometrical, pictorial, 3D and thermal imaging recognition<\/h2>\n<p>In the first approach, computers can use geometrical recognition to differentiate faces from one another. This technique uses distances between facial features like the eyes, nose, and mouth to \u2018map\u2019 a face. The second is pictorial recognition in which the patterns of facial features across the entire face are recognised in relation to one another. Using one or both in combination, modern facial recognition is sensitive to even the smallest details that make each person\u2019s face unique. This can allow a computer to recognise a face even when its expressions change.<\/p>\n<p>A milestone in facial recognition technology was the introduction of three-dimensional facial recognition. A problem plaguing facial recognition is its inability to function in less than ideal circumstances like poor lighting or partially revealing angles. As Ralph Gross, a researcher from the Carnegie Mellon Robotics Institute, explains, &#8221;Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as you go towards profile, there&#8217;ve been problems.&#8221; But by using 3D sensors, computer systems can better determine facial shape and then identify different features, rotating the image, for example, or recognising a face in profile by extrapolating features from the ones it can see. Adopting this 3D approach, developers are working on further refinements to facial recognition. By using three cameras pointed at different angles toward a subject&#8217;s face, precise facial detection and recognition is possible, helping to mitigate the weaknesses of facial recognition technology.<\/p>\n<p>Another new approach to improving facial recognition involves thermal imaging. In situations where a subject&#8217;s head is covered with a hat or his eyes are covered with glasses, thermal cameras come in handy. This type of facial recognition system detects only the heat given off by the head, ignoring accessories that fool the eye. Nevertheless, as in all facial recognition systems, the tech is only as good as the database, and thermal images for facial recognition are in short supply. Another promising innovation is skin texture analysis. This technique detects specific spots and lines on the face, converting them into a mathematical map. Think of this as a variation on the facial geometry approach that uses a different set of features.<\/p>\n<h2>Facial recognition tech in action<\/h2>\n<p>Facial recognition is still in its technological infancy, but in a relation to other biometric techniques of identification, it\u2019s the only one that does not need subject&#8217;s cooperation. As a result, it\u2019s a useful tool for securing public places have facial recognition systems installed without people being aware of them at all. From its beginnings in the 1960s until now, facial recognition technology has come a long way. And governments, police departments, and security agencies are not the only ones who incorporated this technology into their work\u2014soon, your face might replace your pin at the ATM! And though the ubiquity of facial recognition technology raises privacy concerns that should be taken seriously, there are already numerous examples of this tech in action.<\/p>\n<h3>1. Digital Democracy makes you \u2018a fly on the wall\u2019 at the state house<\/h3>\n<p>Sam Blakeslee, the founding director of the Institute for Advanced Technology &amp; Public Policy at California Polytech, recognised the importance of government transparency, and importance of unveiling the ways the elected officials operate. To achieve greater government accountability, teamed with students, he began working on the Digital Democracy platform, funded by the Laura and John Arnold Foundation and the Rita Allen Foundation.<\/p>\n<p>The Digital Democracy platform relies on bots that record a lawmaker\u2019s every word, and use sophisticated facial-recognition software so we know who\u2019s talking. To avoid the platform being deemed a \u2018data dump,\u2019 the transcripts will be sorted by an AI tool called ClaimBuster that automatically identifies \u2018assertions of fact,\u2019 and transfers the claims to PolitiFact, America&#8217;s Pulitzer Prize-winning fact-checking website.<\/p>\n<h3>2. Real-time facial recognition body cameras turn police officers into mobile<br \/>\nsurveillance systems<\/h3>\n<p>Citizen security has always been a priority, and with the latest face-recognition technology, it will be possible to advance the existing surveillance system. Namely, facial recognition startup NtechLab, founded in 2015 by Artem Kuharenko, managed to create algorithms &#8216;as intelligent as humans and as efficient as machines.&#8217; NTechLab\u2019s FindFace, once integrated with police body cameras, will enable faster identification of a person, and can help the police determine someone\u2019s whereabouts or identify suspects.<\/p>\n<p>However, not everybody welcomes the new facial recognition technology. For instance, Jake Laperruque, a fellow at the Constitution Project, expressed his concern regarding invasion of privacy. \u201cThese cameras are small, hard to notice, and all over the place. That\u2019s a pretty lethal combination for privacy unless we have reasonable rules on how they can be used together.\u201d Nevertheless, law enforcement is embracing this tech. According to a study of face recognition technology published by Alvaro Bedoya, executive director of the Centre on Privacy and Technology at Georgetown Law, at least five U.S. police departments have either already got the new real-time face recognition tech, or considering the option of implementing it.<\/p>\n<h3>3. With facial-recognition software, diagnosing genetic disease will be as quick<br \/>\nas taking a photo<\/h3>\n<p>The Boston-based startup, FDNA, has developed a program Face2Gene that helps physicians discover genetic syndromes that leave tell-tale signs on patients\u2019 faces. Researchers insist that the software that scans a patient\u2019s face is not a diagnostic tool, and should instead be used as a \u2018browser for genetic diseases,\u2019 serving as a search and reference informational tool. What\u2019s so great about the program is that photographs of the patients worldwide can be uploaded on Face2Face, expanding the database.<\/p>\n<p>Researchers with the National Human Genome Research Institute (NHGRI), part of the National Institutes of Health (NIH), have successfully used facial recognition software to diagnose a rare, genetic disease known as DiGeorge syndrome and velocardiofacial syndrome. Maximilian Muenke, M.D., atlas co-creator and chief of NHGRI&#8217;s Medical Genetics Branch, emphasised the importance of the facial recognition software for early diagnosis. \u201cEarly diagnoses mean early treatment along with the potential for reducing pain and suffering experienced by these children and their families.&#8221;<\/p>\n<h3>4. Facial-recognition tech fights thieves: new-age mug shot<\/h3>\n<p>Facial-recognition technology has proved efficient in taking on thieves, and Beijing might be a perfect example how state-of-the-art technology is used to tackle one of the city\u2019s biggest issues \u2013 toilet paper thievery. The capital city\u2019s Temple of Heaven Park introduced facial recognition technology, and the process is rather simple. A machine first scans a visitor\u2019s face via a built-in camera, and when it confirms that you\u2019re not the same person who requested toilet paper a couple of minutes earlier, it will provide you a strip of paper. If a person wants more paper, she must wait for nine minutes!<\/p>\n<h2>Face recognition tech: no more hide-and-seek<\/h2>\n<p>It took decades for facial recognition technology to be useful. Though the first experiments were promising, paving a path for future research, it took decades of hard work to deliver face recognition systems that are useful for security. But today, high-tech gadgets that rely on this technology have become widely used in numerous sectors, and they enable us to more easily catch thieves, secure airports, or provide patients with quick and easy diagnoses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Democracy makes you \u2018a fly on the wall\u2019 at the state house Facial recognition body cameras turn police officers into mobile surveillance systems With facial recognition software, diagnosing genetic disease is as quick as taking a photo Fighting thieves with new-age mug shots No more hide-and-seek Remember that moment when you saw someone on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":45217,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2870],"tags":[4337,4338],"article-type":[],"trends":[],"class_list":["post-57860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-face-recognition","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Extreme facial recognition technology: the end of hide-and-seek - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"Facial Recognition Tech Is Booming! From Detecting Thieves To Diagnosing Genetic Disease. Is This The End Of Privacy? &amp;#x2705 Check Out The Latest Trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extreme facial recognition technology: the end of hide-and-seek - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"Facial Recognition Tech Is Booming! From Detecting Thieves To Diagnosing Genetic Disease. Is This The End Of Privacy? &amp;#x2705 Check Out The Latest Trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-02T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-29T12:16:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-517737856.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/5d794b3c1ecc136ca5fce669e48d72fa\"},\"headline\":\"Extreme facial recognition technology: the end of hide-and-seek\",\"datePublished\":\"2017-05-02T22:00:00+00:00\",\"dateModified\":\"2021-03-29T12:16:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/\"},\"wordCount\":1812,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-517737856.jpg\",\"keywords\":[\"face recognition\",\"security\"],\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/\",\"name\":\"Extreme facial recognition technology: the end of hide-and-seek - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-517737856.jpg\",\"datePublished\":\"2017-05-02T22:00:00+00:00\",\"dateModified\":\"2021-03-29T12:16:19+00:00\",\"description\":\"Facial Recognition Tech Is Booming! From Detecting Thieves To Diagnosing Genetic Disease. Is This The End Of Privacy? &#x2705 Check Out The Latest Trends.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-517737856.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-517737856.jpg\",\"width\":800,\"height\":526,\"caption\":\"A man\u2019s face mapped with white lines and dots\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extreme facial recognition technology: the end of hide-and-seek\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/5d794b3c1ecc136ca5fce669e48d72fa\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extreme facial recognition technology: the end of hide-and-seek - Richard van Hooijdonk Blog","description":"Facial Recognition Tech Is Booming! From Detecting Thieves To Diagnosing Genetic Disease. Is This The End Of Privacy? &#x2705 Check Out The Latest Trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/","og_locale":"en_US","og_type":"article","og_title":"Extreme facial recognition technology: the end of hide-and-seek - Richard van Hooijdonk Blog","og_description":"Facial Recognition Tech Is Booming! From Detecting Thieves To Diagnosing Genetic Disease. Is This The End Of Privacy? &#x2705 Check Out The Latest Trends.","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2017-05-02T22:00:00+00:00","article_modified_time":"2021-03-29T12:16:19+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-517737856.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/5d794b3c1ecc136ca5fce669e48d72fa"},"headline":"Extreme facial recognition technology: the end of hide-and-seek","datePublished":"2017-05-02T22:00:00+00:00","dateModified":"2021-03-29T12:16:19+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/"},"wordCount":1812,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-517737856.jpg","keywords":["face recognition","security"],"articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/","name":"Extreme facial recognition technology: the end of hide-and-seek - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-517737856.jpg","datePublished":"2017-05-02T22:00:00+00:00","dateModified":"2021-03-29T12:16:19+00:00","description":"Facial Recognition Tech Is Booming! From Detecting Thieves To Diagnosing Genetic Disease. Is This The End Of Privacy? &#x2705 Check Out The Latest Trends.","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-517737856.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-517737856.jpg","width":800,"height":526,"caption":"A man\u2019s face mapped with white lines and dots"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/extreme-facial-recognition-technology-the-end-of-hide-and-seek\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"Extreme facial recognition technology: the end of hide-and-seek"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/5d794b3c1ecc136ca5fce669e48d72fa","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=57860"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57860\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/45217"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=57860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=57860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=57860"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=57860"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=57860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}