Authentication technologies based on facial recognition have been a consolidated reality for several decades now. We no longer have to carry pocket cards, store it on the phone, or use mnemonics to remember a different one each time, if we are so considerate to change it often. What we need to do is authenticate that which we already had it with us. To do this, we just look at our webcam. An identification system based on facial recognition tries to identify a person by comparing the image of the face that was just acquired with those present in a database to find a possible correspondence. This leads to either allowing or prohibiting access.
User authentication by face recognition
Getting ready
In this recipe, we will see...