Professional Documents
Culture Documents
Artificial Intelligence Facial Detection - Edited
Artificial Intelligence Facial Detection - Edited
Question: If the UAE Integrates a Broader Scope of Artificial Intelligence Facial Detection, Then
Name:
Course:
Institution Affiliation:
Professor:
Date of submission:
2
Introduction
science whose concern is creating intelligent machines with the capacity of performing
comprehensive discipline, but growth in machine and deep learning has fetched it into nearly
every facet of the computer industry. Residents of the United Arab Emirates can now receive
remote access to various government services using facial Recognition. To that aim, the UAE
has launched a registration system that allows people to link their faces to their digital ID, the
UAE Pass.
To apply AI in facial Recognition, one is supposed to set off a categorized feature first. In
other words, you're launching with pictures that already possess hand-matched matchings to the
people in them. A physical connection between a person's face and the entirety of their
individuality is compulsory at first. After that, it grows increasingly easier to recognize faces in
photographs of individuals "in the wild" — in other words, less-clear pictures are compared to
Face Recognition; This step's main task is to collect the faces of those willing to appear
in front of the cameras. Patches containing each face in the source images are the outputs of this
stage. To create an ideal and preferred facial recognition system. To justify the sizes and
direction of these patches, face matching is conducted. Additional human face patches are pulled
out next following the facial recognition process. Face recognition is a technology for confirming
or identifying an individual's identification through their face. Following the portrayal of faces,
the next step is to recognize them. In this contrast, the identified face image is compared to the
images in our database based on face compression algorithms. Employing biometrics, a face
3
recognition system analyzes facial emotions from a video or image. It examines the information
Facial Recognition is a biometric technique that detects and saves a person's facial
characteristics as a facial print. To authenticate one's identified face, the software analyzes a
real image to a saved face print utilizing deep learning methods. machine learning and image
processing are the underpinnings of this technology (Angadi & Hatture, 2019). Facial
recognition has piqued researchers' attention due to the people's behaviors observed in a variety
of security purposes, such as checkpoints, crime surveillance, face monitoring, analytics, and
among others. Face biometrics are less invasive than fingerprint, palm print, iris, and among
other biometric features.
Facial detection can be collected without the user's awareness and utilized for security
purposes such as face monitoring, criminal detection, forensic surveillance systems, and airport
security. Face recognition entails gathering photos of people's faces from video or surveillance
cameras. They are compared to the database that has been saved. Face recognition involves
training available images, classifying them into known categories, and storing them in a
database. When the system receives a test image, it is categorized and matched to the database.
Security
solutions like facial Recognition to protect different sectors in the world. Lately, many reports
indicate the rise in biometric frauds, and the UAE is no exception here. The digital revolution in
4
the region has opened gates for domestic growth, but the rate of criminal activities is expected to
increase (Karunarathne et al., 2019). Although the rate of biometric fraud was comparatively
lower in UAE last year, predictions for 2021 are not very satisfying. New scams are expected to
emerge, and dodging facial Recognition is the unknown motive for cybercriminals. Continuous
developments in the world of technology have led to many innovative solutions like facial
Lately, many reports indicate the rise in biometric frauds, and the UAE is no exception
here. The digital revolution in the region has opened gates for domestic growth, but the rate of
criminal activities is expected to increase. Although the rate of biometric fraud was
comparatively lower in UAE last year, predictions for 2021 are not very satisfying. New scams
are expected to emerge, and dodging facial Recognition is the unknown motive for
cybercriminals. The use of AI-driven facial recognition in various sectors increases the private
and government division (Hsieh & Lai, 2015). Not all, but many areas in UAE will soon be
transportation, traffic, and several tourist locations, and Dubai Police have technologically
monitored criminals in the metropolis by submitting their arrest records to a database. Other
emirates have also adopted the technology, and the incidence of vulnerability has decreased
faster.
surveillance material or other media. Face recognition software could also be employed to
Once registered, citizens can use their faces to verify their identities in online
interactions. They will no longer need to make a trip to a physical service center to take
advantage of select government programs. In that regard, more than 130 government
organizations and private entities already offer support for the UAE Pass IDs. The UAE Pass
national digital ID program operates under the UAE's Federal Authority for Identity and
Citizenship direction. It runs in collaboration with several different technology and service
stakeholders (Hsieh & Lai, 2015). Facial Recognition will make it easy for the UAE
departments' customer delight facilities: A face recognition system will be used by station staff.
The technology will compare your face picture to your Emirates ID. Once you've been matched,
one will be given a One Time Password (OTP) that will be needed to give to the employees.
After that, they will input the OTP (Karunarathne et al., 2019). After entering the OTP, the
electronic verification service will provide the residency data and the relatives and dependency
tree, which will show relatives under the financial backing and other identification and
citizenship-related details.
The same face recognition system will be used on self-service devices and smart
application using face detection. It will simplify government operations, even more, permitting
candidates to apply for various services without having to appear at the customer satisfaction
center. The 'ICA UAE' mobile application, for instance, is accessible for both Android and Apple
devices and allows candidates to apply for residence, citizenship services, and Emirates ID.
6
Criminal identification
technology. A security specialist feeds in a picture of the individual in question into the scheme,
then preprocessed to eradicate undesired features like pollution. Subsequently, the algorithm will
categorize the image as per the indicators such as the gap size from one eye to the other, the
width of the cheekbones, and so on. Next, the program will conduct a computer search to
identify the suitable compare and offer the outcomes. This project aims at imposing the criminal
identification system active. The application of hidden thumbprints, which are often impossible
to get from the crime scene, can present a problem to the existing process of thumbprint
recognition, which is straightforward and easy to perform (Karunarathne et al., 2019). Criminals
have gotten perceptive, and they are now more watchful about leaving a fingerprint on the act.
This system comprised of an image database and an image analysis algorithm for
corresponding the face input with the catalogue's images. The identification and tracking
mechanisms are critical to the system's success. Facial Recognition is one of the most critical
processes in face detection technology, and there are four kinds of strategies: feature consistent,
required for identification: the process efficiency and the evaluation procedure (Udgaonkar,
2021). During the training process, the algorithm is given instances of the images to be learned.
A unique model for each image is created, whereas, during the assessment process, the structure
of a recently acquired test image is checked through all current models in the database. Then, a
near similar model is obtained to see if the identification is activated. In this phase, a quantitative
process is known as Principal Component Analysis (PCA) is practical to a set of face photos to
7
generate a set of elementary features known as eigenfaces. Any human face can be thought of as
Eigenface is undoubtedly one of the oldest and most approved algorithms proposed. It
employs an information theory method to find the best complementing or potential facial
information contained in a series of faces to best distinguish them (Udgaonkar, 2021). It works
by gathering multiple photos from the repository and representing them as vectors. The
algorithm then finds the mean face vector or average and subtracts the average face from each
test face. It is important for identifying identifiable characteristics in each image, as well as
determining the covariance matrix and choosing the best matching photos. It converts the face
photos into a collection of basic faces, basically the face's main component. The primary
components indicate which directions are more appropriate for representing data and will aid in
The authorities may breathe a sigh of relief with the facial recognition system. Its
database, which contains all available data about the criminals, makes it easier to apprehend
them (Lynch, 2020). It's a win if the scanner recognizes the face using the algorithms and
Biometric technologies for facial detection at the border are an important application
area. Anybody who has the experience of traveling by plane knows that airport security and
border crossings are among the most problematic areas to pass through. Thankfully, Artificial
Intelligence is assisting in process automation. Passenger screening programs that are trusted,
computerized kiosks, and eGates, are working to ensure international travel smoother for
8
passengers while increasing government agency efficiency and making borders more secure than
A fresh face and iris-recognition-based quick passport screening system have been
inaugurated at Dubai airports. The General Directorate of Residency and Foreigners Affairs in
Dubai (GDRFA-Dubai) has introduced a service that employs artificial intelligence (AI)
innovation to speed up immigration procedures (Lynch, 2020). To date, the latest biometric
technology has been installed at 122 intelligent gates in Dubai airports' departure and
arrival terminals, allowing travelers to finish passport control strategies. To use the service, you
must first pre-register. After receiving their boarding card and confirming pre-registration,
departing travelers can use the enhanced quick service at the exit terminal's intelligent doors
GDRFA-efforts Dubai's to develop novel digital solutions follow the administration's directions
to incorporate sophisticated technology into all federal programs to improve people's standard of
living.
Current law enforcement relies heavily on face detection databases. Police agencies
regularly collect arrest records from persons convicted and match them to municipal, federal, and
state facial recognition databases. Law enforcement authorities can use these mugshot archives
to identify individuals in images taken from a wide range of sources, including closed-circuit
television and traffic cameras, social platforms, and pictures taken by police personnel
themselves.
Police officers can use their tablets, cellphones, or other mobile gadgets to take images of
pedestrians or drivers and match them to faces in facial recognition repositories. Law
9
enforcement has also utilized face recognition during huge events like the Olympics, concerts,
and sporting events to identify people who may be suspected of being involved with offenses.
Numerous face detection systems are available to the federal authorities (Udgaonkar, 2021).
HOWEVER, the FBI's Next Generation Identification system is the database it uses the most.
officers by enhancing them to quickly recognize people in the ground from a respectable
distance. It can aid by providing context data about who they could be working with and whether
they should continue cautiously (Hsieh & Lai, 2015). For instance, if a police officer knocks over
a suspected killer during a regular traffic stop, the officer will proximately distinguish that the
Suppose a person is reported missing, whether a kid or an adult, it can take a long time
for them to be found. The government must begin the investigation process, which might take a
long time before the suspect is discovered, and it could be ineffective. Essential obstacles
jeopardize the UAE government's efforts to provide these services. Face recognition can track
abducted kids and human trafficking victims (Gent, 2018). As long as missing people are entered
into a system, law enforcement can be notified if they are identified by facial Recognition in a
Conclusion
10
The government always aims to offer affordable services such as finding missing persons,
protecting law enforcement, border control, security, among others, to their people. UAE is not
an exception since the citizens expect the best from their government. Artificial Intelligence has
come to improve these services. If the government can invest more in this sector to overcome a
few challenges facing artificial intelligence, such as its inaccuracy in differentiating the gender,
accuracy especially when one is masked among others, then the services would be more efficient
and accurate.
11
References
Angadi, S., & Hatture, S. (2019). Face Recognition Through Symbolic Modeling of Face
Intelligence, 33(12), 1956008. https://doi.org/10.1142/s0218001419560081
Gent, E. (2018). Face recognition spots missing Indian children. New Scientist,
238(3176), 8. https://doi.org/10.1016/s0262-4079(18)30773-5
Hsieh, C., & Lai, J. (2015). Face Mole Detection, Classification, and
https://doi.org/10.17706/jcp.10.1.12-23
Karunarathne, B., Wickramaarachchi, W., & De Silva, K. (2019). Face Detection and
Recognition for Security System using Local Binary Patterns (LBP). Journal Of
https://doi.org/10.33150/jitdets-3.1.4
Journal. https://doi.org/10.2139/ssrn.3901729
12