FaceVACS Engine

enables clients to develop new face recognition and facial image analysis applications

Cognitec's products incorporate state-of-the-art technologies relevant to working with facial images, in particular deep learning, computer vision, and pattern recognition technologies. Algorithmic optimization since 1995 has resulted in superior independence from facial variances such as pose, mimic, age variance, different hair styles, glasses or temporary lighting changes.

Customers can license Cognitec's core technology, the FaceVACS Engine, through customized software development kits.

Latest developments

Highly focused and innovative R&D initiatives have again raised accuracy levels of Cognitec’s main matching algorithm and its age estimation technology. In addition, the latest versions are showing remarkably robust test results for facial images with masks.

We have released both matching algorithms B14 and A19 in version 9.6 of the FaceVACS Engine, with advanced deep learning methods and a new face finder contributing to substantial performance upgrades, in particular for facial images with masks, non-frontal poses beyond 30 degrees, and extreme mouth expressions.

The A19 version, with a smaller memory footprint, serves Linux-on-Arm and Android platforms.

The new face finder technology contributes to a five times higher detection rate for faces largely covered by facial masks.

The algorithm team has also upgraded the age estimator and underage detectors (18 or 21) for improved accuracy, using a new neural network that works on these three tasks simultaneously.

Please schedule a meeting with your account manager to discuss the performance test results in more detail!

Apache Log4j 2 Vulnerability

On December 9, GitHub disclosed a vulnerability with the highest-severity rating for the Apache Log4j 2, versions 2.0 to 2.14.1. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services. A remote attacker could take control of the system.

Cognitec products do NOT use the log4j library, and are therefore not affected by this vulnerability.

Technology made in Germany
Version 9.6 highlights
  • incorporates matching algorithms B14 and A19
  • new age estimator and underage detector (18 and 21)
  • substantial performance boost for facial images with masks
  • enhanced face finder technology with five times higher detection rate
  • available for Windows, Linux, Linux-on-Arm, Android and macOS
How to purchase our technology

Contact the sales team or send an email with your contact details and application requirements.


  • powerful face localization and face tracking on images and video streams
  • industry-leading matching algorithms for enrollment, verification and identification
  • accurate portrait characteristics check for gender, age, pose deviation, exposure, glasses, eyes closed, uniform lighting detection, unnatural color, image and face geometry
  • performs ISO 19794-5 Full Frontal Format and ISO 39794-5 General Purpose Face Image compliance tests

Engine licensing

Cognitec’s FaceVACS Engine enables clients worldwide to develop new face recognition applications. It provides a clear and logical API for easy integration in other software programs.

Cognitec provides the FaceVACS Engine through customized software development kits, with a set of functions and modules specific to each use case and computing platform, and based on tailored software licensing agreements. Such specific use cases include: image quality check, verification for document issuance, and verification for access control.

Programming and development

  • advanced face recognition APIs: C++, Java, Microsoft .NET, BioAPI 2.0 Verification Engine (C API)
  • documented examples for main use cases and customized implementations
  • tools for biometric evaluations: e.g. generation of identification match lists, similarity matrix data

Android development

  • supports the development of portable face recognition applications
  • used in handheld devices to capture photos and compare them to image databases on the device or central systems
  • adds security to login and authentication procedures