pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

University of Minnesota Report Highlights AI Advances in Facial Recognition

Big data is leading to massive changes in our daily lives. The University of Minnesota has published a study on the advances in facial recognition technology, which are being used in law enforcement and other fields.

Role of Big Data and AI in Facial Recognition Technology

Data analytics has played a fundamental role in scientific, technological and business development in recent years. It is commonly used in advanced security systems, computer assistants for decision making, event prediction, anomaly detection, among others. One of these applications is face identification or facial recognition. The term face identification is used to describe the process in which a computer application verifies the identity of a person. Nowadays it is common to find this utility not only in security systems, but also in social networks and even smartphones.


The human face is an invaluable source of information. By means of a detailed analysis it is possible to determine the identity, approximate age, sex, mood, health and even what a person really wants to express. It all comes down to finding similarities in expressions, classifying them and developing systems that identify a face in one of the classified groups.

The common scheme called “automatic learning” consists of “training” an agent (program) with some data structure, which detects similarities and differences and groups (classifies) the related elements. This agent will be the one who later identifies an element in one of the detected groups.

The agent we will deal with in this article, for the case of face recognition, is the heuristic known as affinity propagation. This is an iterative clustering method that has been successful in the treatment of complex images (see this comparison chart with other methods, this article where they show a similar example of face classification and this article where they use affinity propagation to read handwritten documents).

Implementing a Face Identification Program

Initially it requires an extensive database with images of faces, with which to train an agent that will learn to distinguish different faces and group similar faces. On the website of researcher Libor Spacek of the University of Essex we can find sample databases to follow the exercise. The affinity propagation method requires a metric or measure of similarity between each of the images. Such a measure must be invariant under different transformations of light, colors, gestures, etc. to achieve a classification that is robust to such changes. In the implementation example presented in this article, the spatial correlation metric is used, which is invariant to luminosity changes and translation movements.

To train the agent we will use the version of Affinity Propagation implemented in Python’s scikit library. For scientific computing projects (like the one discussed in this article), Python is one of the most widely used programming languages, due to the flexibility and robustness it provides in the rapid prototyping of exploratory and scientific applications.

The example illustrates a basic process of automatic identification of people, however, if you require personalized advice and need additional information on the execution of technology implementation projects and data analysis can contact directly with Math Decision.

The classification made by the algorithm is presented in a list where the entry i is the group to which the image i should belong according to the agent.

For this example the faces94.zip database contained in the Libor Spacek web described above was chosen. The result when applying the previous algorithm, was a classification of a total of 133 different faces recognized from the database. To test if the classification was correct, groups were taken as representative samples of the classification and these are the results:

The agent correctly classified in various groups the related faces (similar) even though their facial expression is different and is now able to distinguish the classified subjects.

This procedure can be carried out on a large scale. With a database containing images of the faces of a country’s population, an agent can be trained to identify the individuals in the population. Each group classified by this agent uniquely corresponds to a person who has an identification. This agent can then be used to identify people in the classification groups according to their faces.

Filed Under: Digital Imaging

Latest Articles

Installing a SCSI device – making the connections

Squeeze either side of the connector to connect the supplied SCSI cable to the SCSI host adapter card's external SCSI connector. Connect the other end to the scanner's 50-pin DB50 connector ... ... and plug in the power adapter power cord The proliferation of SCSI standard … [Read More...]

Cloud communications made easy with 5 simple questions

Cloud communications have been enjoying a huge boost in popularity in recent years. In a world of increasingly agile business models, traditional on-premise PBX systems simply won’t cut it anymore. Cloud communications, on the other hand, are flexible enough to offer, fast responsive change to meet … [Read More...]

How difficult is it to learn Node.js?

Node.js is considered to be a runtime environment executing JavaScript code outside the browser. In case you need to get acquainted with it a bit closer, we are here by your side to help and explain everything in detail. Some evident reasons to learn Node.js Below you can see the most … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How to Remove Unlimited Defender

Easiest Removal Option: Remote Repair: Paying an expert to remove this threat is always the easiest option. It's also the most expensive. … [Read More...]

Software Compatibility

In the early days of computing, many people wrote their own software, so the exact set of instructions a processor could … [Read More...]

Watch Out for Fake Windows Phone Apps

Like other popular smart phones, the Windows Phone has a store where you go to get apps for it. There have been reports of fake apps turning up on the … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors