Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
Automated facial comparison in the RNI registration process.
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
General information
Theme
Begin date
Contact information
Responsible use
Goal and impact
The algorithm has been developed to compare the face of the person in front of the counter with the image in his identity document and to indicate with what certainty it can be stated that the person shown in the image of the scanned identity document is the same person (or not). This algorithm supports the RNI employee at the counter so that he can determine with some certainty whether the person at the counter is also the person whose identity document has been scanned.
Considerations
The deployment of this algorithm helps the RNI employee establish the identity of the citizen at the counter.
Human intervention
Ultimately, the RNI officer decides whether to use the face scan and what to do with the result of the face scan in the process.
Risk management
A risk is a probability of the occurrence of a negative consequence for the rights and freedoms of data subjects as a result of the processing of personal data. However, as no storage is required in the situation described (because facial image is only registered in the system during the process of identity determination and visible to the employees of the RNI counter), the risk of leakage or manipulation of the facial image is small.
Legal basis
Legal obligation to establish proper identity: BRP Act Art. 2.67 4th paragraph, BRP Decree Art.35 Admissibility of biometrics: UAVG Art. 29, in the present situation authentication is necessary
Operations
Data
Photo of the chip from the identity document shown and the photo taken by the face scanner.
Technical design
Deep learning. Advanced face recognition APIs: C++, Java, Microsoft .NET, BioAPI 2.0 Verification Engine (C API). Documented examples for key use cases and specific implementations. Tools for biometric evaluations, including generation of 'identification match' views and 'similarity matrix' data.
External provider
Cognitec and Thales
Similar algorithm descriptions
- Algorithm that can help registrants avoid "look-alike fraud". Sourced from the National Authority for Identity Data (RvIG)Last change on 16th of August 2024, at 9:46 (CET) | Publication Standard 1.0
- Publication category
- High-Risk AI-system
- Impact assessment
- Field not filled in.
- Status
- In use
- This algorithm supports RNI staff in preventing "look-alike fraud" by comparing the face of the person at the counter with the image in the scanned identity document.Last change on 1st of November 2024, at 16:51 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Automated facial comparison for first registration in the Basic Registry of Persons (BRP), resettlement applications and naturalisation applications for persons over 18 years old. This algorithm helps the registrant prevent "look-alike fraud". Sourced from the Rijksdienst voor Identiteitsgegevens (RvIG).Last change on 20th of August 2024, at 7:18 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm in the software recognises and anonymises personal data and other sensitive information in documents. Governments regularly publish information related to the drafting and implementation of their policies (e.g. based on the Woo). This tool is used to render sensitive data unrecognisable in the process.Last change on 9th of January 2025, at 9:23 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- The algorithm in the software recognises and anonymises personal data and other sensitive information in documents. Governments regularly publish information related to the drafting and implementation of their policies (e.g. based on the Woo). This tool is used to render sensitive data unrecognisable in the process.Last change on 20th of November 2024, at 14:27 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use