Rumored Facebook purchase of Face.com spotlights facial recognition technology
- 30 May, 2012 00:52
Whether or not Facebook acquires facial recognition services provider Face.com, as rumors say it will, the persistence of the speculation calls attention to the expanding use of the technology in social applications.
Face.com's first app, Photo Finder, allowed Facebook users to search for photos of themselves that others had uploaded. Photo Tagger, which suggests names for people pictured, launched in November 2009. Just over a year later, Facebook licensed Face.com's technology to begin suggesting friends for users to tag.
If Facebook acquires Face.com, it could be motivated by a desire to own, rather than license Face.com's technology or to "acqui-hire" the app maker's team, industry watchers said. Either way, a purchase would seem to point to increased interest in facial recognition.
The technology is now in a "sweet spot," benefitting from better computer visualization algorithms and expanding numbers of people sharing photographs, according to Brian Blau, an analyst at Gartner.
"That has to do with the capabilities of the devices and the critical mass of people putting their faces online," Blau said.
The so-called "computer vision" technology that empowers computers to recognize faces has only recently gotten good enough that consumer-facing companies like Facebook, Apple and Google can support it, according to Apu Kapadia, a computer scientist at the University of Indiana, whose research includes digital privacy issues.
Google's Picasa began offering facial recognition in 2008, and Google+ also offers the feature. Apple's 2009 version of iPhoto first supported the technology.
Mainstream adoption also means that the technology will improve ever more rapidly.
"The model gets better and better, usually, as you feed more data into it," Kapadia said.
Users upload 300 million photos to Facebook, the company claimed in its pre-IPO paperwork.
Facebook users can choose not to have their name used as a suggested tag. But they can't turn off the facial recognition technology.
Privacy advocates fear that the social network's immense collection of photographs identifying many of its 900 billion users will leave users exposed to unwanted identification by law enforcement groups, identity thieves or even stalkers. Many of these concerns were laid out in comments to the U.S. Federal Trade Commission when the body hosted a workshop on facial recognition last December.
As tagging photos becomes easier and more common, the most immediate effect is a cultural shift in what is private and what isn't. Kapadia said things we may be willing to share in small groups are now often shared with large groups via social networks. And the anonymity individuals once expected in crowds has been eroded.
"The way things are headed, it's going to be easier for people to tag you in photos, so you're going to be less and less anonymous in some ways when you're walking down the street or going to a party," Kapadia said.
Cameron Scott covers search, web services and privacy for The IDG News Service. Follow Cameron on Twitter at CScott_IDG.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Securing the Road to Virtualization and Beyond
Traditional security controls for enterprise don’t necessarily translate into the new world of virtualisation and cloud environments. When mapping out a secure virtualisation roadmap, click to find out about pave a more secure, risk free path.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.