Skip to content

Install

IDLive Face SDK is distributed as a tar archive for Linux releases, and as a zip archive for Windows ones. You need to extract this archive, for example you can use these commands:

mkdir /opt/idliveface
tar xf facesdk/releases/1.29.0/facesdk-linux-v1.29.0-x64-gcc5.4-neh-openvino-eval.tar.gz \
    -C /opt/idliveface --strip-components=1
Expand-Archive facesdk-windows-v1.29.0-x64-msvc141-neh-openvino-eval.zip -DestinationPath .
Move-Item facesdk-windows-v1.29.0-x64-msvc141-neh-openvino-eval C:\idliveface

This documentation assumes you've installed the SDK to /opt/idliveface (or C:\idliveface on Windows), but you're free to select any other directory. Note that commands above remove an intermediary directory from the archive.

The directory with the SDK should look like this:

$ ls -F /opt/idliveface

3rdparty/  data/  docs/  examples/  include/  libs/  README.txt
PS C:\> Get-ChildItem C:\idliveface

    Directory: C:\idliveface

Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d----           4/11/2022  6:33 PM                3rdparty
d----           4/11/2022  6:33 PM                data
d----           4/11/2022  6:33 PM                docs
d----           4/11/2022  6:33 PM                examples
d----           4/11/2022  6:33 PM                include
d----           4/11/2022  6:33 PM                libs
-a---            4/2/2022 11:03 PM           3279 README.txt

It contains the following directories:

  • 3rdparty – Licenses for the third-party open source software that is used by the SDK.
  • data – Data files needed for IDLive Face.
  • docs – API documentation.
  • examples – Code examples and sample images that demonstrate how to use the SDK.
  • include – Headers for the IDLive Face C++ and C APIs.
  • libs – IDLive Face native libraries and language wrappers.

Verify archive

If you want to verify that the downloaded IDLive Face SDK archive is authentic and wasn't corrupted or tampered in any way, you can check its signature.

Follow these steps to verify the archive with the gpg utility:

  1. Download the ID R&D public key.

  2. Import the key:

    gpg --import idrnd.pub
    
  3. Trust the key. For this run the key editor:

    gpg --edit-key auto@idrnd.net
    

    At the gpg> prompt, type trust, then type 5 for ultimate trust, then y to confirm, and then quit.

  4. Verify the archive using the signature:

    gpg --verify facesdk-linux-v1.46.0-gcc7.5-eval.tar.gz.sig
    

If the archive is authentic, the gpg will report that the signature is Good:

gpg: assuming signed data in 'facesdk-linux-v1.46.0-gcc7.5-eval.tar.gz'
gpg: Signature made Mon Oct 10 10:59:51 2022 UTC
gpg:                using EDDSA key 449B7C4E7F9890922585AFFA0CE43577A976B0E6
gpg: checking the trustdb
gpg: marginals needed: 3  completes needed: 1  trust model: pgp
gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u
gpg: next trustdb check due at 2027-10-09
gpg: Good signature from "ID R&D Technical Account (Release Signing) <auto@idrnd.net>" [ultimate]