{"id":12545,"date":"2016-04-10T08:48:44","date_gmt":"2016-04-10T12:48:44","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=12545"},"modified":"2024-12-18T22:54:02","modified_gmt":"2024-12-19T03:54:02","slug":"evolution-of-facial-recognition-technology","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/","title":{"rendered":"Evolution of Facial Recognition Technology"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-12546 aligncenter\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/cctv-camera-modern-era-anti-terrorist-electronic-s-PV5E7BR-600x400.jpg\" alt=\"\" width=\"600\" height=\"400\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/cctv-camera-modern-era-anti-terrorist-electronic-s-PV5E7BR-600x400.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/cctv-camera-modern-era-anti-terrorist-electronic-s-PV5E7BR-1024x683.jpg 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/cctv-camera-modern-era-anti-terrorist-electronic-s-PV5E7BR-768x512.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/cctv-camera-modern-era-anti-terrorist-electronic-s-PV5E7BR.jpg 1223w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Previously, facial recognition technology was reserved for the movies and was a thing of fiction. However, much like other biometric solutions that have seen improvement and progress, facial recognition technology also steadily became a reality. Over the past decade, it has not only been developed and perfected; it is being deployed around the world as well. However, not as rapidly as other biometric technologies did \u2013 which include fingerprint, iris recognition, hand geometry, and DNA.<\/p>\n<p>Before we discuss the history and gradual evolution of facial recognition technology, there is a need to have an understanding of how this technology works and why there was a need for it in the first place?<\/p>\n<p>Workings of Facial Recognition Technology<\/p>\n<p>In simplest of words, the technology scans a person\u2019s face and then verifies it. In particular, it works in three basic steps that you will find in all facial recognition technologies.<\/p>\n<ul>\n<li><strong>Face Detection<\/strong>: This is the first step where the human face is located and detected in the form of images and videos.<\/li>\n<li><strong>Face Capture<\/strong>: Then, the process moves towards capturing facial features. Facial biometrics, which is a 2D or 3D sensors, capture the face, which transforms the facial information captured into digital information by the application of an algorithm.<\/li>\n<li><strong>Matching and Verification<\/strong>: Lastly, the facial information gathered is then matched with the information (other faces) present in the database to check if there is any match.<\/li>\n<\/ul>\n<p>This technology has been deployed around the globe, but for limited use. China is one of the countries that made headlines along with India of using facial recognition technology on a big-scale. Nonetheless, facial recognition biometric technology or Face ID will slowly take over as it has already over several smartphones, including iPhone X.\u00a0With this being said the future of mobile app development concerning features that include facial recognition is definitely on the path of improvement, innovation, and implementation.<\/p>\n<p>Why Facial Recognition?<\/p>\n<p>Simple, because it is the ultimate milestone in biometric technology that doesn\u2019t require any end-user interaction or a \u2018handler\u2019 to verify. The technology is independent of any human processing or monitoring. Moreover, it is also easy to deploy and maintain.<\/p>\n<p>Facial Technology of Today<\/p>\n<p>Facial Recognition coupled with AI (Artificial Intelligence) and Deep Learning has become the benchmark for the biometric identification process for many industries that include: airports, mobile manufacturing industries, home security, and appliance manufacturers, schools, and more.<\/p>\n<p>Evolution of Facial ID Biometric: A Walkthrough<\/p>\n<p>1960s<\/p>\n<p>Starting from the inventor himself, who is believed to be Woodrow Wilson Bledsoe, created the first facial ID system using a RAND tablet. The system he created would organize the photos of faces by hand. People made use of this technology and manually recorded the coordinate areas of the features like the hairline, mouth, nose, eyes, and the structure.<\/p>\n<p>Take note that at this time, there was no use of modern technology or any computers assisting Bledsoe in his quest to prove the facial recognition is a viable biometric solution \u2013 in 1960s.<\/p>\n<p>1970s<\/p>\n<p>Harmon, Goldstein, and Lesk worked on the manual facial recognition technology and converted it into automatic detection. How? They used 21 facial markers that included the thickness of the lip and the color of the hair, even \u2013 these markers were used to make detection of faces automatic and more accurate.<\/p>\n<p>1988<\/p>\n<p>Linear algebra was included to detect faces in 1988 by Sirovich and Kirby. This particular approach was named\u00a0<strong>Eigenface<\/strong>. The focus was to search for low-dimensional facial images representations. The team of two was able to prove how any face can be approximated through a combination of a few sets of Eigenfaces. Which is quite remarkable in itself?<\/p>\n<p>1991<\/p>\n<p>Pentland and Turk furthered the works of Eigenfaces and tried to find ways to detect faces within images. These two utilized technological and environmental factors into their approach and were the first to attempt facial recognition automation.<\/p>\n<p>1993-2000s<\/p>\n<p>DARPA and NIST launched the FERET program aimed to encourage commercial use of this technology. By 2002, the efforts paid off, and the law enforcement officials deployed facial recognition technology in critical tech testing.<\/p>\n<p>2010 \u2013 Present<\/p>\n<p>This is where facial recognition technology really started to take off. 2010 is the year when Facebook started using face ID. This helped the social media platform to identify people through their uploaded photos. Facebook is already embroiled in many controversies concerning users\u2019 security and data. This facial detection update didn\u2019t go unnoticed and definitely created a hype among the media industry.<\/p>\n<p>2011<\/p>\n<p>Panama government and US Secretary of Homeland Security, Janet Napolitano, went ahead and authorized a pilot program of the Facial Recognition platform \u2013 which was called FaceFirst. This was installed at Panama\u2019s Tocumen airport to detect any illegal or illicit activities. This installation then became the largest at the airport of Tocumen.<\/p>\n<p>In the same year of 2011, the US law enforcement and its military adopted the face ID technology that was used for the identification of dead bodies and that of Osama Bin Laden as well.<\/p>\n<p>2014<\/p>\n<p>Mobile face recognition was adopted by law enforcement agencies in 2014, and the retail industry became accustomed to the facial recognition technology in 2017.<\/p>\n<p>Facial Recognition Market<\/p>\n<p>According to\u00a0<a href=\"https:\/\/www.marketsandmarkets.com\/PressReleases\/facial-recognition.asp\">a study<\/a>, the global facial recognition market would generate $7B in revenue by the year 2024. And for the year 2019, the market was accounted for $3.2B already. For the most part, facial recognition is powering the surveillance and security ecosystem \u2013 while the two most dominant sectors making the most of this technology is the law enforcement and retail.<\/p>\n<p>Retail is by far the most unlikely industry that has made use of this technology for purposes other than surveillance, however not too far off. The retail industry is using facial recognition in its stores to analyze the behavior of the shoppers to improve their customer purchase process and experience.<\/p>\n<p>In addition to this, the selfie-payment system in the future as giants like Alibaba, KFC, and more are testing facial recognition payment solutions already. As much as the future of this technology looks promising, the applications have many questioning their privacy. Nonetheless, in terms of security and surveillance \u2013 facial recognition is the best technology to incorporate.<\/p>\n<p><strong>Author Bio:<\/strong><\/p>\n<p>Zubair is a digital enthusiast who loves to write on various trends, including Tech, Software Development, AI, and Personal Development. He is a passionate blogger and loves to read and write. He currently works at Koderlabs,\u00a0<a href=\"https:\/\/www.koderlabs.com\/\">custom software development company in Houston\u00a0<\/a>that offers top-notch software development services to clients across the globe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Previously, facial recognition technology was reserved for the movies and was a thing of fiction. However, much like other biometric<\/p>\n","protected":false},"author":398,"featured_media":16642,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[93],"class_list":["post-12545","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-facial-recognition"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evolution of Facial Recognition Technology - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolution of Facial Recognition Technology - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Previously, facial recognition technology was reserved for the movies and was a thing of fiction. However, much like other biometric\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-10T12:48:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T03:54:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/evolution-of-facial-recognition-technology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Evolution of Facial Recognition Technology\",\"datePublished\":\"2016-04-10T12:48:44+00:00\",\"dateModified\":\"2024-12-19T03:54:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\"},\"wordCount\":1076,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"facial recognition\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\",\"name\":\"Evolution of Facial Recognition Technology - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2016-04-10T12:48:44+00:00\",\"dateModified\":\"2024-12-19T03:54:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evolution of Facial Recognition Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evolution of Facial Recognition Technology - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/","og_locale":"en_US","og_type":"article","og_title":"Evolution of Facial Recognition Technology - Digital Transformation of Government Services","og_description":"Previously, facial recognition technology was reserved for the movies and was a thing of fiction. However, much like other biometric","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2016-04-10T12:48:44+00:00","article_modified_time":"2024-12-19T03:54:02+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/evolution-of-facial-recognition-technology.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Evolution of Facial Recognition Technology","datePublished":"2016-04-10T12:48:44+00:00","dateModified":"2024-12-19T03:54:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/"},"wordCount":1076,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["facial recognition"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/","name":"Evolution of Facial Recognition Technology - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2016-04-10T12:48:44+00:00","dateModified":"2024-12-19T03:54:02+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/evolution-of-facial-recognition-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evolution of Facial Recognition Technology"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12545"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=12545"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12545\/revisions"}],"predecessor-version":[{"id":17879,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12545\/revisions\/17879"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16642"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=12545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=12545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=12545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}