SlideShare una empresa de Scribd logo
1 de 27
Christina Carr, Becky Schaffran, & Tess Cimini

FACIAL RECOGNITION
Myheritage.com
Guess Who?
Guess Who?
Guess Who?
Guess Who?
What is it?

 Facial recognition systems are built on
  computer programs that analyze images of
  human faces for the purpose of identifying
  them.
How does it work?

 Measure specific facial characteristics to
  create unique file called “template”
 Using templates, compare image to another
  image
   Produces a score on similarity
   Video camera signals
   Pre-existing photos
     i.e. drivers license databases
2D Facial Recognition

 2D Recognition
   Maximum angle: 35 degrees
   Must be similar to program in database
   Sometimes ineffective due to lighting changes
    and other uncontrolled variables
3D Recognition

 3D Recognition
   Can create template from face at 90 degree angle
   More accurate
   Uses depth and an axis of measurement not
    affected by lighting
 Example: Identix® - FaceIt®
   Landmarks or nodal points
   And now: FaceIt®Argus, skin biometrics
eps of 3D Recognition
Uses

                 • Law Enforcement
   Security
                 • Casinos, Super Bowl, Olympics


                 • Border control
Transportation
                 • E-passports


                 • Facebook
Entertainment
                 • SceneTap
Security
 Closed-circuit television (CCTV)
   Surveillance technology crosschecked with mugshot
    databases
Security

 Casinos
 Super Bowl
   Tampa, Fl. (2001): 19 people identified
 London 2012 Olympics
 MORIS
Transportation
 Germany: Fully automated border controls
 Australia: SmartGate
   Compares the face of the individual with image in
    the e-passport microchip
Entertainment

  Facebook Tag
   Suggest
  SceneTap
    50 Chicago bars
  Apps in progress
    Apple
New Developments

 ATM’s
 Advertising & marketing

 “Adidas is working with Intel to install and test digital walls with
 facial recognition in a handful of stores either in the U.S. or Britain.
 If a woman in her 50s walks by and stops, 60% of the shoes
 displayed will be for females in her age bracket, while the other
 40% will be a random sprinkling of other goods.

 ‘If a retailer can offer the right products quickly, people are more
 likely to buy something,’ said Chris Aubrey, vice president of global
 retail marketing for Adidas.”
“Facial Recognition Technology
Challenges Privacy”
 http://abclocal.go.com/kgo/video?id=842585
  5&syndicate=syndicate&section
Limitations

 Not 100% accurate.
 Accuracy can fluctuate because of:
   picture quality
   Lighting
   camera positions
   facial expressions
   and more
Security Issues

 Mistaken identity cases
 Images cannot be used to convict suspects
 The CCTV cameras in London
   1 crime solved per 1000 cameras
CCTV Clip

 http://www.youtube.com/watch?v=fLEtzI1oe
 wI
MORIS

 Mobile Offender Recognition and
  Information System
 Illegal search without a warrant
 No information is stored
Facebook

 Has roughly 600 million users
   that means that Facebook has a database of 600
    million faces.
 Each time you “tag” a photo, Facebook learns
  more about your face.
Google

 Picasa uses the same tagging techniques
 People fear a face recognition update to the
  app Google Goggles.
   the app may even be able to identify peoples SSNs
    just from the photo.
Adam Harvey
•CV Dazzle
•Found
ways to
cheat face
recognition
WHAT DO YOU THINK?

Más contenido relacionado

Destacado

Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformPivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformEMC
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investingTravis Klein
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics EMC
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopijadsrdoc
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?Dr. Raju M. Mathew
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Mamta Binani
 
El cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilEl cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilmgonellgomez
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1pvsa_8990
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
 
Tues palace of versailles
Tues palace of versaillesTues palace of versailles
Tues palace of versaillesTravis Klein
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religionTravis Klein
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoEMC
 
Informe consulta devoluciones
Informe consulta devolucionesInforme consulta devoluciones
Informe consulta devolucionesNathalia Sanchez
 

Destacado (20)

Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformPivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investing
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopija
 
Day 11
Day 11Day 11
Day 11
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
การนำเสนอโดยการเขียน
การนำเสนอโดยการเขียนการนำเสนอโดยการเขียน
การนำเสนอโดยการเขียน
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013
 
El cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilEl cas del... oriol, oriol i nil
El cas del... oriol, oriol i nil
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Wed thurs reform
Wed thurs reformWed thurs reform
Wed thurs reform
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
Tues palace of versailles
Tues palace of versaillesTues palace of versailles
Tues palace of versailles
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religion
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Day 9
Day 9Day 9
Day 9
 
Informe consulta devoluciones
Informe consulta devolucionesInforme consulta devoluciones
Informe consulta devoluciones
 

Similar a Facial Recognition

Facial recognition
Facial recognitionFacial recognition
Facial recognitiontcimini
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignmentMagalyLippens
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
Combatting Bias in Machine Learning
Combatting Bias in Machine LearningCombatting Bias in Machine Learning
Combatting Bias in Machine LearningAyodele Odubela
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptxGAMINGRBF
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyFabrizio Gramuglio
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detectionStudentRocks
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpointdkeane01
 
Onboarding AI & Machine Learning
Onboarding AI & Machine LearningOnboarding AI & Machine Learning
Onboarding AI & Machine LearningBrian Pichman
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?DLabs
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVIKAS KULKARNI
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxMuhammedNihadP
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition TechnologyAvinash Singh
 

Similar a Facial Recognition (20)

Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Combatting Bias in Machine Learning
Combatting Bias in Machine LearningCombatting Bias in Machine Learning
Combatting Bias in Machine Learning
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpoint
 
Onboarding AI & Machine Learning
Onboarding AI & Machine LearningOnboarding AI & Machine Learning
Onboarding AI & Machine Learning
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technology
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Facial Recognition

  • 1. Christina Carr, Becky Schaffran, & Tess Cimini FACIAL RECOGNITION
  • 3.
  • 8. What is it?  Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them.
  • 9. How does it work?  Measure specific facial characteristics to create unique file called “template”  Using templates, compare image to another image  Produces a score on similarity  Video camera signals  Pre-existing photos  i.e. drivers license databases
  • 10. 2D Facial Recognition  2D Recognition  Maximum angle: 35 degrees  Must be similar to program in database  Sometimes ineffective due to lighting changes and other uncontrolled variables
  • 11. 3D Recognition  3D Recognition  Can create template from face at 90 degree angle  More accurate  Uses depth and an axis of measurement not affected by lighting  Example: Identix® - FaceIt®  Landmarks or nodal points  And now: FaceIt®Argus, skin biometrics
  • 12. eps of 3D Recognition
  • 13. Uses • Law Enforcement Security • Casinos, Super Bowl, Olympics • Border control Transportation • E-passports • Facebook Entertainment • SceneTap
  • 14. Security  Closed-circuit television (CCTV)  Surveillance technology crosschecked with mugshot databases
  • 15. Security  Casinos  Super Bowl  Tampa, Fl. (2001): 19 people identified  London 2012 Olympics  MORIS
  • 16. Transportation  Germany: Fully automated border controls  Australia: SmartGate  Compares the face of the individual with image in the e-passport microchip
  • 17. Entertainment  Facebook Tag Suggest  SceneTap  50 Chicago bars  Apps in progress  Apple
  • 18. New Developments  ATM’s  Advertising & marketing “Adidas is working with Intel to install and test digital walls with facial recognition in a handful of stores either in the U.S. or Britain. If a woman in her 50s walks by and stops, 60% of the shoes displayed will be for females in her age bracket, while the other 40% will be a random sprinkling of other goods. ‘If a retailer can offer the right products quickly, people are more likely to buy something,’ said Chris Aubrey, vice president of global retail marketing for Adidas.”
  • 19. “Facial Recognition Technology Challenges Privacy”  http://abclocal.go.com/kgo/video?id=842585 5&syndicate=syndicate&section
  • 20. Limitations  Not 100% accurate.  Accuracy can fluctuate because of:  picture quality  Lighting  camera positions  facial expressions  and more
  • 21. Security Issues  Mistaken identity cases  Images cannot be used to convict suspects  The CCTV cameras in London  1 crime solved per 1000 cameras
  • 23. MORIS  Mobile Offender Recognition and Information System  Illegal search without a warrant  No information is stored
  • 24. Facebook  Has roughly 600 million users  that means that Facebook has a database of 600 million faces.  Each time you “tag” a photo, Facebook learns more about your face.
  • 25. Google  Picasa uses the same tagging techniques  People fear a face recognition update to the app Google Goggles.  the app may even be able to identify peoples SSNs just from the photo.
  • 26. Adam Harvey •CV Dazzle •Found ways to cheat face recognition
  • 27. WHAT DO YOU THINK?

Notas del editor

  1. -Age is an issue: a study by government’s National Insitute of Standards and Technology found false negative rates for face-recognition verification of 43 percent using photos from only 18 months earlier
  2. Skin biometrics: surface texture analysis of texture of skin, uses algorithms to turn patch of skin into mathematical, measurable space Can define the differences between twins Many problems wouldn’t work if: significant glare on sunglasses, long hair in center of face, poor lighting, lack of resolution
  3. detection: scans already existing 2d photograph or a shot from a 3D video Alignment: up to 90 degrees turned hereMeasurement: measures curves of face on submillimeter scale and creates a templateRepresentation: translates into unique code to create template with set of numbers to represent a person’s faceMatching: new technology converts 3D image into 2D image using algorithm to compare to 2D image in database
  4. From :55 to 2:05ish