• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Subscribe
  • Advertise

Sensor Tips

Sensor Product News, Tips, and learning resources for the Design Engineering Professional.

  • Motion Sensing
  • Vision systems
    • Smart cameras
    • Vision software
    • Lighting
    • Optics
  • Pressure
  • Speed
  • Temperature
  • Suppliers
  • Video
    • EE Videos
    • Teardown Videos
  • EE Learning Center
    • Design Guides
    • Tech Toolboxes

How do sensors play into AI’s facial recognition capabilities? part 2

August 20, 2023 By Randy Frank

Beyond its ability to improve facial recognition for home security (discussed in Part 1), artificial intelligence (AI) is being applied in several other areas.

TSA
The Transportation Security Administration (TSA) uses two types of Credential Authentication Technology (CAT) to verify the identity of travelers. First-generation CAT units scan a traveler’s photo identification (ID) and confirm the traveler’s identity as well as their flight details. The newer, second-generation CAT units, or CAT-2, have the same capabilities but are also equipped with a camera to capture a real-time photo of the traveler.

The CAT-2 system compares the traveler’s photo on the ID credential against the in-person, real-time photo. With a confirmed CAT-2 match, the TSA officer will verify and allow the traveler to proceed to security screening without requiring a boarding pass. The use of AI-based cameras or the increasing use of AI-based cameras will expedite and improve this process.

For privacy reasons, photos captured by CAT units are never stored or used for any other purpose than immediate identity verification. Also, travelers who do not wish to participate in the facial matching process can opt-out in favor of an alternative identity verification process.

The CAT-2 units may have readers that allow travelers to use valid, state-issued digital driver licenses or digital identification cards for TSA identity verification purposes.

Law enforcement
Thanks to facial recognition in movies and on TV, law enforcement is probably the most well-known application of facial recognition technology. The increasing use of AI-equipped cameras and AI to scan databases will only improve response time during an ongoing event and the investigation phase.  Promoting a well-executed identification capability can also deter would-be thieves, robbers, terrorists, and other bad actors who now face a much greater chance of getting caught and facing the consequences of their actions.

Business usage of AI
Face attendance, recognizing repeat visitors, and identifying, and locating people in various business situations are increasingly important to AI-equipped cameras/networks.

Unlike the punch clock where someone else can punch you in one day and then you return the favor on another day, face recognition-based employee attendance systems are essentially fool-proof. With the Internet, the time and location are also verified removing any chances of time theft by employees. An additional benefit of quick AI-based analysis is verifying and possibly recording the presence of unauthorized personnel in the work area.

Similarly, many building owners are installing AI-equipped facial recognition cameras at entry and exit points to monitor for safety and security.  Designed to synchronize with existing technology, these and other facial detection cameras distributed throughout the building can provide a high success rate to building owners’ security plans.

In retail business situations, AI-equipped cameras can be used to ID the bad guys and also the good guys.  Identifying the bad guys is obviously important. The good guys are the targeted customers that could be return customers or deserve special attention. With face recognition cameras, quickly and easily identifying, searching, detecting, and locating VIP guests in various business environments can promptly address their needs and more.

School campuses

School building(s) and the entire school campus are areas that can benefit from accurately and quickly identifying intruders, especially armed intruders before any tragedy occurs. While a single, clear image of an unauthorized presence in the school area could be sufficient to warn school security and local police, multiple camera feeds from different areas on campus can allow these authorities to locate the suspect and trace their movements within seconds and respond accordingly. With the right cameras, AI can provide rapid response time to avoid or minimize problems.  Playgrounds have been a frequently used target of kidnappers, so they could also be a good place to install similar AI-equipped cameras.

References

TSA Expands the Use of New Facial Recognition Tech (innotechtoday.com)
TSA introduces state-of-the art identity verification technology at DEN security checkpoints | Transportation Security Administration
Feature image credit: Evolv Technology, AI at airports: how is artificial intelligence speeding up security? (airport-technology.com)
Upgrading Surveillance Tech to True Facial Recognition Cameras (surveillance-video.com)
Artificial Intelligence Face Recognition – GW Security (gwsecurityusa.com)

You may also like:


  • How do facial recognition biometrics work?

  • How will AI impact sensing?

  • How do sensors play into AI’s facial recognition capabilities? part…

  • How do sensors impact ATMs?

  • How can AI/ML improve sensor fusion performance?

Filed Under: Applications, Artificial intelligence (AI), Featured, Frequently Asked Question (FAQ), Image sensing, Smart cameras Tagged With: biometrics, evolv technology, FAQ

Primary Sidebar

Featured Contributions

Integrating MEMS technology into next-gen vehicle safety features

Fire prevention through the Internet

Beyond the drivetrain: sensor innovation in automotive

Sensors in American football can help the game

Select and integrate sensors into IoT devices

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE LEARNING CENTER

EE Learning Center
“sensor
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

RSS Current EDABoard.com discussions

  • Inconsistent Charge Termination Voltage with battery charger
  • Testing 5kW Grid Tied inverter over 200-253VAC
  • 21V keeps getting shorted to my UART line.
  • Problem with ENVLP ACPR calculations in Cadence Virtuoso (IC 6.1.7, Spectre, ADEXL environment)
  • Can anyone provide a guide or tutorial for Candece simulation?

RSS Current Electro-Tech-Online.com Discussions

  • using a RTC in SF basic
  • What is correct names for GOOD user friendly circuit drawing program?
  • Curved lines in PCB design
  • Is AI making embedded software developers more productive?
  • Why can't I breadboard this oscillator?

EE ENGINEERING TRAINING DAYS

engineering
“bills

RSS Featured White Papers

  • 4D Imaging Radar: Sensor Supremacy For Sustained L2+ Vehicle Enablement
  • Amphenol RF solutions enable the RF & video signal chains in industrial robots
  • Implementing Position Sensors for Hazardous Areas & Safety

DesignFast

Component Selection Made Simple.

Try it Today
design fast globle

Footer

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Test and Measurement Tips

SENSOR TIPS

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy