First of all, any organization that wants to install a face recognition system must conform to the principles of legality, justice and necessity, and cannot install it at will. In addition, we must ensure the security of other people's information and must not disclose, sell or illegally provide other people's information. If the information of others is leaked, the infringer must bear the corresponding responsibility.
Secondly, face recognition involves a lot of information, such as the payment of face brushing in mobile banking, so the technical accuracy of face recognition system is particularly high, and the discrimination rate of face recognition can be as high as 99.99%. Therefore, in general, it is difficult for a face recognition system to achieve the situation of being stolen.
With the existing technology, can the face recognition system still identify whether to have a facelift?
Experts say,? At present, face recognition technology has reached the standard of industrialization and large-scale application. Simple plastic surgery, makeup and other common recognition problems have long been overcome, and the recognition ability of machine systems has surpassed human beings. Therefore, whether the recognition after plastic surgery can be achieved depends on the degree of change of the five senses after plastic surgery. If you only do cosmetic surgery, such as rhinoplasty, chin retraction or double eyelid cutting, the current technology can completely identify it accurately; But if the accident leads to a large area of disfigurement, face recognition will be powerless. ?
Of course, everyone in face recognition is particularly worried about the problem of information being leaked. Experts say that face recognition technology itself is neutral and innocent, so it is best to use it regularly and regularly when using technology applications. Personal data such as personal face and fingerprints must be protected.
Any organization must also protect other people's information, strengthen the awareness of personal information security and privacy protection, and must not provide personal information to others at will. If personal information is found to be maliciously used or leaked, it is best to take legal weapons to protect rights according to law.