close

Search by product, support information & more


Most popular searches:
Read our Latest Blogs >

Click here for Technical Support >

See Which Events We're Attending

When dealing with facial age estimation technology, if you obscure the face, the technology will not determine the age accurately and ultimately default to denial. This technology relies on analysing facial features to estimate age. Therefore, the more of the face that is visible, the more accurate the result.

Age estimation & tricking the technology

It’s not unusual for both women and men to wear make-up on a night out that is so transformational that it is sometimes, at a glance, difficult to recognise them. People take pride in changing how they look to go to certain events or parties, in particular young people attempting to look older to gain entry to over 18 venues.. This often coincides with the need to buy alcohol to attend the party or buy cigarettes to accompany their night out.

If the technology, in part, works by measuring facial feature distances, could extensive eyeshadow, for example, cause issues that confuse the algorithms used to estimate age?

Lady wearing face mask in front of age estimation technology

The short answer here is NO. We have tested our facial age estimation technology extensively to be confident that inaccurate results due to makeup are very unlikely.  Even wearing a disposable face mask, our system can estimate the age of the person, something that we tested heavily during and after the COVID-19 pandemic. 

The Importance of Spoof Detection in Facial Recognition

We’re confident that our technology is not spoofable.

For those less familiar with the term, spoofing is a type of presentation attack that aims to manipulate or bypass biometric identification systems. As biometric technology becomes more prevalent, organisations face increasing threats from fraudsters employing methods like presenting photos, videos, or even replay attacks—looped videos designed to mimic real facial behaviours. Robust spoof detection is essential to maintain the integrity of such systems.  

There are two primary approaches to detecting spoof attempts: cooperative and passive liveness detection. Cooperative or intrusive, liveness detection requires active user participation. For instance, users may be prompted to follow instructions such as looking in specific directions or smiling. While effective, this method can impact user experience and transaction speed.  

ICU & MyCheckr, our intelligent age verification systems, integrate advanced AI algorithms to offer precise, non-intrusive passive spoof detection. Transforming a standard USB camera into a comprehensive security solution, they give the highest level of accuracy while monitoring for fraud throughout the process. It can identify and reject spoofs involving photos, videos, or mobile devices, ensuring a smooth and secure experience for genuine users.  

We have built, trained and tuned our own neural networks using an extensive data sample containing millions of images to create an in-house, bespoke Presentation Attack Detection (PAD) technique.

In addition, we use edge technology, meaning the algorithms run locally on specially designed hardware. The processing is done on-device and not on a cloud-based platform, allowing for faster and more efficient identification of malicious activity.

The use of AI-powered biometric technology has transformative potential but must be implemented responsibly. By addressing data protection concerns and enhancing system robustness, technology providers and governing bodies can foster trust and ensure fair usage of this powerful tool.`

Lady purchasing alcohol after being verified

Ultimately, the technology is great, better than humans, according to independent research. On top of ACCS certification, our expert team has built, trained and fine-tuned our neural networks using an extensive data sample containing millions of images. This has culminated in a bespoke, in-house Presentation Attack Detection (PAD) technique, which makes our products robust. To fortify the technology even further, we use Edge Technology, which means that algorithms that power our facial age estimation technology are completed on the device itself, with no internet access, and no distant cloud servers. This not only makes for a more secure product but also a faster, more efficient way of processing age estimation (and detecting malicious activities).

There will still be a need for human intervention and augmentation. We’re not in the business of removing people from their roles. We’re working to make some of the more testing parts of a person’s job easier and believe that facial age estimation tech is the future both in terms of ease and, ultimately, legality. 

To learn more about how your business can embrace age estimation technology, please get in touch.

  
ITL logo
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.