콘텐츠로 건너뛰기
Home » Before facial recognition becomes a monster

Before facial recognition becomes a monster

A few years ago, a new game spread on Facebook. The rules of this play, called The 10-year Challenge, are simple. Put a picture of yourself 10 years ago and a picture of myself. That’s all. This play can boast that you are more cool, adult, or still youth. That’s why many people participate in this play.

Is it just play? It is said that it is not in Kate Onel’s column in the wire. Facebook is collecting photos to secure face recognition (facial recognition) data that changes over age. The truth is unknown, but one is certain. Facial recognition technology has already been widespread while we do not notice, and is more likely to be used in the future. Very convenient and dangerous.

Why does the camera look at my face?

Face recognition technology refers to the technology to grasp information from photographs, videos, and creatures. Compared to other identification methods, you do not have to contact the recognition device directly, so it is used a lot because of the lack of rejection of the user. It is mainly used to check the identity compared to the database, but it is also used to identify aging and illness recently. It is also developing technology that identifies animals as well as humans.

The study began in the 1960s, but in the 1990s, the commercialization was made in the 90’s, and the recent combination with artificial intelligence technology has increased the accuracy and is rapidly spreading. The company with the best technology was Google, Facebook, and Amazon, but recently, Chinese companies have used numerous demonstration tests to secure data and increase their technology.

All companies that created the top five algorithms in the Face Recognition Algorithm Test (FRVT), organized by the US National Standards Technology Research Institute (NIST) in 2018 were all Chinese companies.

Face recognition technology of security and surveillance

The outwardly visible use is divided into security and identification.

The most used field is also security/surveillance. It is used in some airports, casinos, and stadiums, and it is installed 카지노 at the entrance of the building to control the entry. It is also used in public safety sectors, such as finding and arresting a suspect.

In the early days of commercialization, there was a problem in the face of the face recognition, but according to the 2018 report by the leader of this field, the malfunction rate shows more than 99% of the perception. The recognition rate varies depending on. The actual recognition rate depends on how the operating person sets up.

The most common country is China, which does not consider “criminal human rights” much. In 2017, Shanghai, which built a facial recognition security system, arrested 567 criminals for three months, and 22 criminal suspects were caught at the Qingdao Beer Festival. In 2018, a singer’s concert was arrested using facial recognition technology to arrest eight criminals.

As shown in the video above, Senzen uses a surveillance camera installed in front of the traffic light to detect signal violators, and automatically sends the caught to a person who violates the text message. In the name of ‘Sheang’, it is also working on a project to install surveillance cameras with facial recognition in rural villages across China.

This is not the only way in China. China began to export the system to countries in South America.

Malaysian police introduced a body cam that can be recognized.

Since 2004, the US has been operating and operating a security system using fingerprints and facial authentication at airports and major ports.

More than 3 million surveillance cameras are already installed in the UK, and some of them use the Automatic Face Recognition System (AFS). Mobile surveillance cameras are also placed in concerts and stadiums where people gather.

IPhone, facial recognition technology spreads

The next most used field is identification. It is already used for this purpose in the Korean government building. After Apple presented the iPhone X and presented the authentication method through ‘Face ID’, it is used to the public because it is also used for unlocking smartphones.

It is especially used in the field of immigration, and the US Department of Homeland Security (DHS) is creating a service that confirms the identity of the traveler by only facial recognition. At Incheon Airport and Beijing New Airport, the company plans to introduce a system to finish the immigration screening with only facial recognition.

China’s HSBC Bank has released an app that can open an account with only facial recognition, and more than 50 banks, including China Agricultural Bank, are also introducing ATM devices that can be paid by facial recognition. In Jedi Bao, a Chinese loan company, identification is recognized as a face. Many universities, such as San Francisco University and Beijing Normal University in China, are using face recognition technology to control access.

When using simple payment services such as unmanned convenience stores and Alipay, there are already services in China. Even the robot dog Aibogo Facial recognition technology is used to find out the owner.

I live in a world full of facial recognition cameras

Even if it is not in the field of security and identification, face recognition is used for various purposes. You can distinguish between age, gender and emotional state, and the camera can track your face.

It is a well -known example that content producers are premiere and analyze the faces of visitors and review the expected reaction to the film.

The vending machine checked the customer’s face to recommend the goods, or the experiment was made to write a statistical report by checking the gender and age of the customer’s gender and age.

Even now, there are some places where large stores track customers and check their routes through face recognition.

In China, pigs and Ireland are also researching and managing cattle faces.

Hyundai Motor has introduced a system that recognizes the emotions of passengers at CES 2019.

Didn’t everyone write an app that matches the user’s face and finds a blind date or a celebrity that looks like a blind date?

It is also used to find a trafficking child or missing children.

Stanford University used facial recognition to develop an algorithm that determines individual sexual tendencies.

It is also developing a method of analyzing the face to determine the condition of health and disease.

We already live in a world full of facial recognition cameras. It is an app that is recognized as a face, taking a picture of a cute rabbit ear, and uploading a picture on SNS where the person’s name is tagged by the face recognition. I replace my laptop and smartphone password with my face, and send emoticons to my avatar with my face.

See the video uploaded by the virtual YouTuber, which has changed your appearance using your face recognition technology, and use a virtual makeup app to make makeup or change your hair. If you look at the smartphone camera and laugh, press the shutter.

Before facial recognition technology becomes a monster

As it is used a lot, it is often incomplete errors or abuse.

Recently, the facial recognition system ID.ME’s recognition, which is used to verify the US unemployment benefit application, has suspended unemployment benefits in 24 states. In the 2020 BLM demonstrations, the US police were suspected of using facial recognition technology, and IBM, Microsoft, and Amazon declared that they would not sell their face recognition technology to the police.

On the other hand, in China, it is required to scan a face mandatory when opening a mobile phone from December 2019. More than 400 million CCTVs are installed in China, more than half of the world’s CCTVs. In February 2019, a DB of a facial recognition monitoring company, which monitored 2.5 million people in the Uighur, China, China, was leaked. Big Brother already exists on Earth.

The data from the face is very comfortable and dangerous. Although it has changed due to Corona 19, the face cannot be easily changed, and it is a personal information that is openly exposed to the outside. If you want, anyone can easily collect, easily manipulate it, and track it easily.

There is a danger of becoming a surveillance society, but it is not a technology to stop. Face recognition technology is used for various purposes and will be used more. The more you show your facial expressions in virtual reality, or the robot recognizes humans or works remotely.

Maybe it is good. Privacy and surveillance are always both sides of the coin. Just dichotomy to accept or reject it does not help. Between convenience and oppression, you must set a clear guideline before the facial recognition technology becomes a monster. Technology is convenient, because it is too easy to exploit.

100 Books of Business, published for 20 years,

What if one book contains 100 books that have been published for 20 years?

In this work, Kim Min -ju (writer, translator), Koo Ja -ryong (writer, consultant), Han Geun -tae (writer, consultant), Ko Hyun -sook (writer, professor of business administration) , translator). A total of seven business coaches participated.

100 Business Books 100 Photo

AD, close ads


1. Beyond a good company, as a great company

2. Power of detail – minor

3. The law of broken glass window

4. Hidden champion

5. Dipperart

6. Lean startup

7. Are you a strategist

8. Zero Toy One

9. Can’t you earn money or good?

10. Intellectual capital theory

11. Productivity

12. The path of accumulation

13. Blue Ocean Shift

14. Destructive Innovation 4.0

15. Discourse

Marketing strategy

16. Psychology of sales

17. Stick Stick!

18. Trend Korea

19. All businesses are branding

20. Frame

21. Philip Kotler’s Market 4.0

22. Release the secret of brain and desire

23. Sincerity Marketing

Future strategy

24. Long Tail Economics

25. Technology to read trends

26. New Normal

27. Klaus Schwab’s 4th Industrial Revolution

28. The future of work

29. The era of geometry is coming

30. Everyone lies

31. Machine Platform Crowd

32. Trust movement

33. Pono Sapiens

34. A time without a job comes

35. Economics of subscription and likes

CEO and leadership

36. Living as a president

37. Steve Jobs

38. Lean in Lean in

39. Courage facing me

40. Lunch with Warren Buffett

41. Leave a person

42. Shu 온라인바카라 Dog

43. My great discovery strength revolution

44. Heat Refresh

45. Leadership of the decisive moment

46. ​​Super Gap

47. Multi -Flyer

Success and happiness

48. After WHO

49. Why do you work?

50. Discovery of creativity

51. degree of life

52. Search your inner side

53. Why do I do this?

54. Power of observation

55. Brief

56. Rediscovery of 10,000 hours

57. Originals

58. Deep Work

59. The power of the moment

60. End of average

61. Design the perspective

62. Grit

63. Outlier

Behavior and psychology

64. Immersion Flow

65. The birth of thought

66. Nuts

67. Positive Psychology

68. Insight, from ordinary to non -crime

69. Mind Set

70. Thought about thoughts


71. Bad Samaritans

72. The BOX The Box

73. Money War

74. The living ideas of dead economists

75. Victory in the city

76. Falltray

77. Antiprasia

78. House built by debt

79. 21st century capital

80. Economics of recession

81. Determined Future


82. The secret of 300 years of Gyeongju

83. 880,000 won generation

84. Cool altruist

85. The poor are more reasonable

86. Things that cannot be bought with money

87. Jewish story

88. Sapiens

89. This changes everything

90. Who is the future?

91. Climate Casino

92. Contraction society

93. Skin in the game

94. Fact Fullness

Political society

95. European Dream

96. Why does the state fail

97. Is the intensity of the United States over?

98. The power of Asia

99. Secret of hegemony

100. Scheduled War

<100 Responsibility for Reading in one book> Quotes in the book

“People are not the most important assets. Only the right person is the most important asset. People who are not suitable are the biggest debt. Characters are more important than school, technology, expertise, and work experience. ” (Beyond a good company, as a great company)

The most important question in Lean Startup was, “to find out what kind of acts creates value and what is a waste.” (Lean Startup)

Google’s new employees are trained to express their position. This is called ‘take a position’. Through this training, we practice to clarify our position at the meeting. This is a training to eliminate irresponsibility. (productivity)

Who is the main culprit of destruction? It is not technology, but because of customers. Is there a new technology developed by Airbnb, Amazon and Uber? The technology that has already been shown is combined with the needs that the customer wants to create new value. In this respect, Teishera’s claim is different from the “disruptive innovation” that Professor Christensen claims. (Discourse)

In short, it should be ‘simple, quirky, concrete, sincere, and emotional story.’ (stick)

In the past analog economy, the customer path was 4A, which passed from customers to purchase. Aware, attitude, act, and repeated behavior. However, in the digital economy, the customer path changed to 5A. Aware, appeal, question (ASK), action, and advocate. (Market 4.0)

Consumers now have a story of birth, they are good, but they prefer brands that are humble, warm, cool, passionate, sympathetic and communicating with social issues. (Santic marketing)

The author says that creating a service that provides continuous value to customers based on a specific customer -based need should be the goal of all businesses. In other words, it is argued that the subscription economy is a change of converting customers to subscribers to generate repetitive profits by providing services, not product sales. (Economics of subscription and likes)

If you talk about the owner’s spirit, he says, “How do you work like a master?” I do not agree. The definition of the spirit I think is the person who thinks about it as a master. When I think of what I have to do like a master, I am a servant of work when I think like a servant. (Why do you work?)

Recommended for these people.

1) Those who want to insight shortly because they don’t have time to read books

2) I read a book, but I can’t organize it in my head, so those who do not remain in memory

3) Those who want to get compressed insight from business experts

4) Those who want to get a guide for which book to read

5) Those who want to know how to read business administration well and how to apply it to my business

* Source: 100 Business Books of Businessmen <100 Business Responsibilities Reading in One Volume>