Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
en:tc_technology [2022/09/26 14:21]
jwyu
en:tc_technology [2023/08/01 17:11] (current)
mwkim
Line 18: Line 18:
  
 \\ \\
-==== Guideline for Face Recognition ​ ====  +==== Guideline for Face Authentication ​ ====  
-​This article is intended to guide face recognition. Some advice for face recognition ​of users wearing masks also include. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Guideline_for_Face_Recognition|READ MORE]]</​button>​+​This article is intended to guide face authentication. Some advice for face authentication ​of users wearing masks also include. To enhance the user experience and achieve exceptional authentication accuracy, it is highly recommended to comply with the guidelines. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Guideline_for_Face_Recognition|READ MORE]]</​button>​
  
 \\ \\
Line 30: Line 30:
  
 \\ \\
-==== Security Threats to Face Recognition ​and FaceStation 2 Technology ==== +==== Security Threats to Face Authentication ​and FaceStation 2 Technology ==== 
-The authentication through face recognition ​is as prone to spoofing as fingerprint-based methods. Is its security also vulnerable to similar methods? ​ \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology_fs2_lfd_technology|READ MORE]]</​button>​+The authentication through face authentication ​is as prone to spoofing as fingerprint-based methods. Is its security also vulnerable to similar methods? ​ \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology_fs2_lfd_technology|READ MORE]]</​button>​
  
 \\ \\
Line 59: Line 59:
 <WRAP half column> <WRAP half column>
 ==== Multiple sub-IDs of FaceStation ====  ==== Multiple sub-IDs of FaceStation ==== 
-Face recognition ​is gaining much more attention relative to other biometric recognition technologies due to not only the simple convenience it provides but also its ability to avoid various privacy issues. As facial information is publically displayed, there is little concern for a user to show his face to the device. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Multiple sub-IDs of FaceStation|READ MORE]]</​button>​+Face authentication ​is gaining much more attention relative to other biometric recognition technologies due to not only the simple convenience it provides but also its ability to avoid various privacy issues. As facial information is publically displayed, there is little concern for a user to show his face to the device. \\ \\ <button type="​primary"​ size="​xs">​[[tc/​technology/​Multiple sub-IDs of FaceStation|READ MORE]]</​button>​
  
  
Line 68: Line 68:
  
 \\ \\
-==== Adaptive IR Illumination Technology for Face Recognition ​====  +==== Adaptive IR Illumination Technology for Face Authentication ​====  
-Variations in background illumination have always been one of the main challenges for a practical face recognition ​system. Active illumination based face recognition ​techniques are considered to be one of the most promising and practical methods used to solve illumination issues in indoor applications. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​apaptive_ir_illumination|READ MORE]]</​button>​+Variations in background illumination have always been one of the main challenges for a practical face authentication ​system. Active illumination based face authentication ​techniques are considered to be one of the most promising and practical methods used to solve illumination issues in indoor applications. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​apaptive_ir_illumination|READ MORE]]</​button>​
  
  
 \\ \\
-==== Smart Enrollment Technology for Face Recognition ​System ====  +==== Smart Enrollment Technology for Face Authentication ​System ====  
-Human face is one of the most common and non-intrusive biometrics used to identify individuals. It is much more universal, acceptable and easier to access than a fingerprint. Recently, the use of face recognition ​technology in cooperative biometric systems such as access control, time & attendance and PC security is increasing. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​suprema_smart_face_enroll|READ MORE]]</​button>​+Human face is one of the most common and non-intrusive biometrics used to identify individuals. It is much more universal, acceptable and easier to access than a fingerprint. Recently, the use of face authentication ​technology in cooperative biometric systems such as access control, time & attendance and PC security is increasing. \\ \\ <button type="​primary"​ size="​xs">​[[tc_technology/​suprema_smart_face_enroll|READ MORE]]</​button>​
  
 \\ \\