How does Apple Face ID handle facial beards, makeup, and wrinkles?

This article is produced by NetEase Smart Studio (public number smartman 163). Focus on AI and read the next big era!

[Netease smart news September 30 news] When my facial expressions change, Apple's Face ID can recognize me?

Apple has stated that Face ID, iPhone X’s face recognition system, may have problems when it comes to twins. They will have to use passwords to keep their data safe. Or buy an iPhone 8 with Touch ID because the fingerprints of the twins are not consistent.

As we all know, people want to keep other people away from their iPhones, but how does the face recognition system ensure that users will not be able to unlock their mobile phones because their wrinkles, makeup and hairstyle are different from a month ago?

Apple explained this issue in a new paper called Face ID Security and explained it on the new Face ID support page. As said before, one in a million people could unlock your iPhone X with Face ID, which is 20 times lower than Touch ID.

Apple said that for twins and children under the age of 13, this probability is not the same, because their facial features are not fully developed.

Face ID registration relies on the image of a person's face at a certain moment, just like Touch ID's fingerprint capture, stored as a mathematical representation in the device's secure area. However, Face ID also relies on a neural network that uses facial data from some attempted login to establish the user's facial expression. In addition to the data obtained during registration, this secure area also stores “mathematical images of facial expressions calculated during some unlocking attempts if the Face ID thinks they are useful for enhancing future matches”.

Face ID does capture real face images during each unlocking process, but after calculating its performance, they are discarded.

To cater to "dramatic" changes in the face, such as new facial hair or make-up, Face ID can use a temporary expression on your face if it matches enough to unlock the device.

This can be used for a limited number of unlocks. When the iPhone does not recognize the user, if the match level is still able to reach "a certain threshold" and the user can immediately enter the correct password, the Face ID will also capture the facial image at that time.

"In order to improve unlock performance and keep pace with the natural changes in facial expressions, Face ID will enhance its stored mathematical representation over time. After a successful unlock, Face ID may use the newly calculated mathematical expression, so in Before the data is discarded, there will be a limited number of extra unlocks," Apple explained in the paper.

"Instead, if the Face ID doesn't recognize you but the match is above a certain threshold, and you enter the password immediately, then the Face ID will acquire another capture value and use the newly calculated mathematical representation to enhance its registration. Face recognition data: "If no match later, this new face recognition data is discarded after a limited number of unlocks. These intensive processes allow facial recognition to keep up with great changes in facial hair or makeup while minimizing failed unlocking. "(From: ZDNet Compilation: NetEase Unofficial Smart Compile Platform Review: Li Qing)

Pay attention to NetEase smart public number (smartman163), get the latest report of artificial intelligence industry.

XPON 1GE ONU

The following analyzes the causes of ONU energy waste:
1. The interface is idle.
ONU generally includes multiple interfaces. Such as FE interface, GE interface, POTS interface, WIFI and IPlV interface, etc. In many cases, only part of the interface is used, and energy is consumed when the interface is idle.
2. Increased energy consumption caused by chip module design.
In the ONU design, the modules are usually divided by function and integrated on the same chip, controlled by an enable terminal. When power is supplied, the entire module needs to be powered, and the unnecessary functional blocks are also consuming energy.
3. Processing of OLT data.
Due to the broadcast transmission characteristics of the OLT, when the OLT sends broadcast information or sends information to a certain ONU, other ONUs that do not receive the information must also process it, resulting in a waste of resources.
4. Idle monitoring.
For TDM-PON, each ONU can only send upstream data in burst mode in a time slot authorized by the OLT, and the OLT forwards downstream data in the form of broadcast frames, which makes all ONUs always in operation. The ONU does not know when the user or the OLT will send data to itself. The receiving and sending modules always keep monitoring. When a certain ONU has no upstream or downstream data for a long time, the normal operating state will make it consume more energy.
5. Waiting time.
The structure of the PON system determines that the channel capacity should be shared between ONUs in the upstream direction. The PON system needs to adopt a certain arbitration mechanism to avoid conflicts. Each ONU is allocated a time slot, and frames received from users are buffered first. It can only be sent when it arrives.

Dual Mode Onu,Xpon Onu Router,Xpon Ont 1GE ONU,Dual Mode Xpon Onu

Shenzhen GL-COM Technology CO.,LTD. , https://www.szglcom.com

Posted on