Is Facial Recognition on Your Smartphone a Good Choice?

Must Read

The Growth of OTT: Blip in the Radar Or a Real Threat to Traditional TV?

People are attached to their smartphones way more than they're to any other gadget. In fact, the average person...

Are You A Gaming Geek: ‘Five Commandments’ Before You Buy Video Games Online !

Does your day start with joysticks instead of coffee mugs? Or as a kid your best friends were the...

Top Softwares for Business in 2021 That Every Startup Entrepreneur Must Use

In the conditions of the global pandemic and economic crisis, small and medium-sized businesses face different problems and do...

The exploded adoption of smartphones has led to the unprecedented use of Facial recognition system. It adds another method of security for everyday devices. Using biometric analysis, the technology uses facial mapping to unlock the device, comparing it to known faces within the database (that you establish upon setup).

The facial recognition market is expected to exceed $8.5 billion by 2025 growing at a CAGR of 17.2% from 2020. The push is coming from the use of facial recognition systems in various personal and commercial applications. It’s North America that is driving the growth currently, but in the years to come APAC will emerge as the biggest contributor to the global facial recognition market.

While facial recognition can help confirm an individual’s identity, it does raise privacy concerns too.

Advertisements

How Facial Recognition Works

Although individual technologies will vary, the basic concepts are the same. Initially, a baseline image is taken of the user’s face. The software will identify the basic geometry of the face, including the distance between your eyes, spacing between forehead to chin, and any distinguishing facial landmarks. Your face is saved within the system as a mathematical formula. When you enable facial recognition, the phone analyzes your facial features against the formula on file. If it matches, the phone unlocks. Some devices will record anyone attempting to unlock the phone, storing it on the cloud (for Apple devices) or the system settings (Android).

Benefits of Facial Recognition

Arguably the most significant benefit of facial recognition is the ease of use. Users don’t have to remember passwords or pins; they simply have to scan their faces to access the device. For users who simply want a layer of protection on the device, facial recognition offers complex protection patterns against unauthorized access. Complex codes and passwords are difficult to remember, while weak passwords or codes can make hacking attempts easier for malicious use.

Security Issues with Facial Recognition Software

Unfortunately, with changes in technology comes vulnerabilities with software. Previous studies by the University of Toronto highlight significant shortcomings of facial recognition software. One example includes the inability to recognize faces with only slight modifications to pixels at the corner of the eye. It also found that 42 out of 110 devices were unlocked with only photographs of the device owner. Additional reports of opening while the owner was asleep have also been documented. These findings suggest phone security measures can be bypassed, even when the owner isn’t conscious or aware of the unlocking.

Issues of Intent with Unlocking

When it comes to phone usage, a level of intent needs to be assumed. For instance, users unlocking the phone with a password or pin are making deliberate intentions to open. That is, they want access to the device at that specific time. With facial recognition, the phone unlocks any time the user has the phone in front of them. It also suggests that phones can be unlocked forcefully, providing access by turning the device on the owner.

For example, if a controlling partner wants access to the cell phone, owners cannot prevent access when the partner shoves the phone in their face. It also suggests that unauthorized access could occur with photographs, videos, or while sleeping. Bypassing the software appears to work through phone display. For example, two phones facing each other can trigger the unlocking functionality; this includes photos posted on social media or videos taken on another device.

Advertisements

Issues with intent also extend into recognition capacity. Many users have experienced issues among siblings that closely resemble each other. Identical twins, for example, can unlock each other’s phones, accessing sensitive information effortlessly.

Issues with Compromised Accounts

Your cellphone holds sensitive, personal information. Consider everything you do from your phone; social media, emails, text messages, contacts, photos, videos, and financial accounts. With unauthorized access to your phone, the damage could be irreparable. Most financial accounts are attached to cellphones, giving thieves instant access to your credit and debit cards. Your email likely holds bill statements, contact information, addresses, and account numbers.

If your phone has been compromised, it’s essential to run a background check on yourself. Background checks offer a current assessment of your financial accounts, employment details, bills and utilities, and personal details. You’ll also want to contact your credit card companies, banking institutions, and any significant utilities to let them know of the compromise.

How to Verify Your Information

Identity theft occurs quickly, with many people acting on the opportunity. This can include opening new accounts in your name (and never intending to pay for them), draining financial accounts, establishing new utilities or cell phone accounts, or taking hold of your personal information for malicious use. Look for any new charges on file, especially if you haven’t opened anything recently. Contact your cell phone provider, too; they can lock the device remotely and block the cell phone from future use. Additionally, most providers will deactivate the SIM card attached to the phone.

Is Facial Recognition Worth Doing?

Users currently have five different options when it comes to cell phone security. Leaving the phone unlocked fails to protect the device from unauthorized access. It will provide easy access to the home screen but will not protect against theft. A pattern lock offers a simple pattern for unlocking, typically using nine or 12 buttons. The phone is locked unless the sequence is completed. This is one of the weaker options for cell phone protection but is more secure than the unlocked phone. A PIN lock option requires users to enter a four (or more) digit numerical code into the lock screen to unlock the device. Although a PIN does offer moderate protection against malice, it can be hacked.

More secure than the PIN function is facial recognition. With the unique biomarkers, the security of the device is higher than a traditional numerical PIN. Unfortunately, the previous vulnerabilities need to be assessed before use (unintentional unlocking, using photos or videos to open the home screen, and potential access while sleeping with some devices). The password functionality is the most secure locking function on the cellphone. It can contain alphanumeric codes with a minimum of four characters. Passwords may be challenging to remember, which may prove problematic for a device not regularly used.

It’s important to remember that two-step verification (using multiple password protections in sequence) on cellphones isn’t available. Users will have to establish the unlock method that works best for them.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News

Apple AirTag: An Effective Tool For Thieves To Steal Cars

Thieves have left no stone unturned to make the most of every new technology invented. No matter how hard...

In-Depth: Dprime

Will ‘TikTok By Microsoft’ Be A Winner?

For the last two years, TikTok has been in the public eye for all sorts of reasons. First, it was the exploded and unparalleled...

Facebook Subscription Model: Looking Beyond Ad Dollars?

Seldom do job listings create a stir this gripping. However, when the job listing in question is a stealth post from Twitter, with a...

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one of the...

More Articles Like This