Bên cạnh Phân tích "Some people do not mind to spend their leisure time with their colleagues while some people prefer to keep their private life separate from their work life. Is it a great idea to spend leisure time with your colleagues?" IELTS WRITING (kèm bài viết thi thật HS đạt 6.0), IELTS TUTOR cũng cung cấp đề thi IELTS READING: How does facial recognition work? (thi ngày 21/12/2022)
I. Kiến thức liên quan
II. Đề thi IELTS READING: How does facial recognition work? (thi ngày 21/12/2022)
Facial recognition is a way of recognizing a human face through technology. A facial recognition system uses biometrics to map facial features from a photograph or video. It compares the information with a database of known faces to find a match. Facial recognition can help verify personal identity, but it also raises privacy issues.
The facial recognition market is expected to grow to $7.7 billion in 2022 from $4 billion in 2017. That's because facial recognition has all kinds of commercial applications. It can be used for everything from surveillance to marketing. But that's where it gets complicated. If privacy is important to you, you probably want some control over how your personal information - your data is used. And here's the thing: your "faceprint" is data.
How facial recognition works
You might be good at recognizing faces. You probably find it a cinch to identify the face of a family member, friend, or acquaintance. You're familiar with their facial features - their eyes, nose, mouth - and how they come together. That's how a facial recognition system works, but on a grand, algorithmic scale. Where you see a face, recognition technology sees data. That data can be stored and accessed. For instance, half of all American adults have their images stored in one or more facial-recognition databases that law enforcement agencies can search, according to a Georgetown University study.
So how does facial recognition work? Technologies vary, but here are the basic steps:
Step 1: A picture of your face is captured from a photo or video. Your face might appear alone or in a crowd. Your image may show you looking straight ahead or nearly in profile.
Step 2: Facial recognition software reads the geometry of your face. Key factors include the distance between your eyes and the distance from forehead to chin. The software identifies facial landmarks - one system identifies 68 of them — that are key to distinguishing your face. The result: your facial signature.
Step 3: Your facial signature — a mathematical formula - is compared to a database of known faces. And consider this: at least 117 million Americans have images of their faces in one or more police databases. According to a May 2018 report, the FBI has had access to 412 million facial images for searches.
Step 4: A determination is made. Your face print may match that of an image in a facial recognition system database.
How can you find more protection against facial recognition systems?
Will hackers really want to steal your face? If your facial data can be used to commit fraud or turn a profit, the answer is yes. Add that to the list of cyber safety risks. A holistic cyber safety package is worth considering helping protect your online privacy and security. For instance, Norton Security is designed to help protect your computer, laptop, and mobile devices against viruses, ransom ware, and cybercriminals.
Still, facial recognition represents a challenge to your privacy. After all, there are few rules governing its use. In the meantime, maybe those anti-facial-recognition glasses won't look so bad.
Do the following statements agree with the information given in the text?
In boxes 1-6 on your answer sheet, write:
TRUE if the statement agrees with the information.
FALSE if the statement contradicts the information.
NOT GIVEN if there is no information on this.
1. Using facial recognition can be a breach of personal identity.
2. The amount of business of facial recognition has risen in 2017.
3. The information of your personal profile is taken through the face scan in face recognition.
4. Federal Bureau of Investigation uses facial sketches instead of computerized facial recognition.
5. The process for recognition of face through a machine is almost similar to that of a human.
6. It is proposed that glasses would be an effective way of avoiding facial recognition.
Write NO MORE THAN THREE WORDS.
7. A person's image is extracted from a ....................
8. Software is brought in action which compares the resemblance factors and determines the .......... of facial features.
9. The facial signature is used for comparison with a pre built ................
III. Đáp án