Research Diagram 1 - Face recognition security

( Author's work )



   Face recognition security strategy is the most common method that is being used by a lot of tech companies all over the world (eg. Apple, Samsung, Microsoft, etc.). In addition, sensitive security systems are using this strategy, for instance, house security services and military. Because this technology uses artificial intelligence and machine learning methodologies, so it is nearly impossible to bypass it. Moreover, no one can fake someone's face to bypass this security system, because it uses a 3D technology to scan and analyse.
The above diagram illustrates a simple example explanation to this strategy. For instance, a house door is secured by a face recognition system, so whenever any person tries to unlock it, it will not be unlocked because the face is not recognised in the database. After a recognised face appears in-front of the sensor, the door will be unlocked and security systems will be off for a temporary time. Same this strategy is used in many operating systems, such as iOS, Android, Windows, etc.


 

Comments

  1. Excellent use of flow chart symbols to depict the process of face recognition authentication. For your second diagram, you can attempt to use shapes, icons, symbols, colours, etc. this will enhance the presentation of the diagram.

    ReplyDelete
    Replies
    1. Thank you sir. Yes, I used more shapes and colours in the second diagram, you can check it out :)

      Delete

Post a Comment

Popular posts from this blog

Secondary research essay ( Introduction )

About my study

Software Functionalities