SlideShare una empresa de Scribd logo
1 de 13
FACE RECOGNITION
TECHNOLOGY
INTRODUCTION
Facial recognition (or face recognition) is a type of biometric software
application that can identify a specific individual in a digital image by analyzing and
comparing patterns.
Facial recognition systems are commonly used for security purposes but are
increasingly being used in a variety of other applications. For example, Facebook uses
facial recognition software to help automate user tagging in photographs.
1. What are biometrics?
Ans: A biometric is a unique, measurable characteristic of a human being that can be
used to automatically recognize an individual or verify an individual identity. Biometrics
can measure both physiological and behavioral characteristics.
Physiological biometrics (based on measurements and data derived from direct the
human body) include:
a. Finger-scan ,
b. Facial Recognition,
c. Iris-scan ,
d. Retina-scan and
e. Hand-scan.
Behavioral biometrics (based on measurements and data derived from an action)
include:
a. Voice-scan ,
b. Signature-scan and
c. Keystroke-scan .
FACE RECOGNITION
The face is an important part of who you are and how people identify you.
For face recognition there are two types of comparisons.
The first is verification and the second is identification.
verification is where the system compares the given individual with who that
individual says they are and gives a yes or no decision..
identification is where the system compares the given individual to all the
Other individuals in the database and gives a ranked list of matches.
All identification or authentication technologies operate using the following
four stages:
1. Capture: A physical sample is captured by the system during enrollment and
also in identification or Verification process.
2. Extraction: unique data is extracted from the sample and a template is
created.
3. Comparison: the template is then compared with a new sample.
4. Match/Non match: the system decides if the features extracted from the
new
CAPTURING OF IMAGE BY STANDARD
VIDEO CAMERAS
The image is optical in characteristics and may be thought of as a collection of a
large number of bright and dark areas representing the picture details.
In other words the picture information is a function of two variables:
Time and Space.
It would require infinite number of channels to transmit optical information
corresponding to picture elements simultaneously. There is practical difficulty in
transmitting all information simultaneously so we use a method called scanning.
COMPONENTS OF FACE RECOGNITION
SYSTEMS
The 3 main components of face recognition systems, they are as follows
 Enrollment module,
 Database and
 Identification module.
HOW FACE RECOGNITION SYSTEMS WORK
Facial recognition software is based on the ability to first recognize faces, which
is a technological feat in itself.
If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial features.
There are about 80 nodal points on a human face. Here are few nodal points that
are measured by the software.
• Distance between the eyes
• Width of the nose
• Depth of the eye socket
• Cheekbones
• Jaw line and
• Chin
These nodal points are measured to create a numerical code, a string of numbers
that represents a face in the database. This code is called face print.
Only 14 to 22 nodal points are needed for faceit software to complete the
recognition process
IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
The implementation of face recognition technology includes the following four
stages:
1. Data acquisition,
2. Input processing ,
3. Face image classification and
4. Decision making .
PERFORMANCE
1. False rejection rates (FRR) :
The probability that a system will fail to identify an enrollee. It is also called
type 1 error rate.
FRR= NFR/NEIA
Where
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification attempt
2. False acceptance rate (FAR) :
The probability that a system will incorrectly identify an individual or will fail
to reject an imposter. It is also called as type 2 error rate
FAR= NFA/NIIA
Where
FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter identification attempts
SOFTWARES
Facial recognition software falls into a larger group of technologies known as
biometrics. Facial recognition methods may vary, but they generally involve a series of
steps that serve to capture, analyze and compare your face to a database of stored images.
The basic process that is used by the Faceit system to capture and compare
images:
1. Detection,
2. Alignment,
3. Normalization,
4. Representation and
5. Matching.
Advantages :
1. There are many benefits to face recognition systems such as its convenience
and Social acceptability. All you need is your picture taken for it to work.
2. Face recognition is easy to use and in many cases it can be performed without
a Person even knowing.
3. Face recognition is also one of the most inexpensive biometric in the market
and Its price should continue to go down.
ADVANTAGES AND DISADVANTAGES
Disadvantage:
1. Face recognition systems cant tell the difference between identical twins.
There are numerous applications for face recognition technology:
Commercial Use:
a. Day Care: Verify identity of individuals picking up the children.
b. Residential Security: Alert homeowners of approaching personnel
c. Voter verification: Where eligible politicians are required to verify
their identity during a voting process.
d. Banking using ATM: The software is able to quickly verify a customer.
APPLICATIONS
Face recognition technologies have been associated generally with very costly
top secure applications. Today the core technologies have evolved and the cost of
equipment is going down dramatically due to the integration and the increasing
processing power. Certain applications of face recognition technology are now cost
effective, reliable and highly accurate.
CONCLUSION
THANK YOU
For any mistakes and suggestion’s feel free to text here
idamakanti.jaswanth@gmail.com

Más contenido relacionado

La actualidad más candente

Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face detection ppt
Face detection pptFace detection ppt
Face detection pptPooja R
 

La actualidad más candente (20)

Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 

Destacado

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognitionDhanush Kasargod
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 

Destacado (8)

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
gait analysis
gait analysisgait analysis
gait analysis
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Kb gait-recognition
Kb gait-recognitionKb gait-recognition
Kb gait-recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 

Similar a FACE RECOGNITION TECHNOLOGY

Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyJawhar Ali
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric systemdominichilton98
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdfgulfam ali
 

Similar a FACE RECOGNITION TECHNOLOGY (20)

Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 

Más de JASHU JASWANTH

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETEJASHU JASWANTH
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)JASHU JASWANTH
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESJASHU JASWANTH
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)JASHU JASWANTH
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaJASHU JASWANTH
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDJASHU JASWANTH
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.JASHU JASWANTH
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of WomenJASHU JASWANTH
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSJASHU JASWANTH
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...JASHU JASWANTH
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES JASHU JASWANTH
 

Más de JASHU JASWANTH (15)

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETE
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIES
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, China
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLAND
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of Women
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
UNITS & CONVERSIONS
UNITS & CONVERSIONSUNITS & CONVERSIONS
UNITS & CONVERSIONS
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES
 

Último

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Último (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

FACE RECOGNITION TECHNOLOGY

  • 2. INTRODUCTION Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other applications. For example, Facebook uses facial recognition software to help automate user tagging in photographs. 1. What are biometrics? Ans: A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct the human body) include: a. Finger-scan , b. Facial Recognition, c. Iris-scan , d. Retina-scan and e. Hand-scan. Behavioral biometrics (based on measurements and data derived from an action) include: a. Voice-scan , b. Signature-scan and c. Keystroke-scan .
  • 3. FACE RECOGNITION The face is an important part of who you are and how people identify you. For face recognition there are two types of comparisons. The first is verification and the second is identification. verification is where the system compares the given individual with who that individual says they are and gives a yes or no decision.. identification is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. All identification or authentication technologies operate using the following four stages: 1. Capture: A physical sample is captured by the system during enrollment and also in identification or Verification process. 2. Extraction: unique data is extracted from the sample and a template is created. 3. Comparison: the template is then compared with a new sample. 4. Match/Non match: the system decides if the features extracted from the new
  • 4. CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS The image is optical in characteristics and may be thought of as a collection of a large number of bright and dark areas representing the picture details. In other words the picture information is a function of two variables: Time and Space. It would require infinite number of channels to transmit optical information corresponding to picture elements simultaneously. There is practical difficulty in transmitting all information simultaneously so we use a method called scanning.
  • 5. COMPONENTS OF FACE RECOGNITION SYSTEMS The 3 main components of face recognition systems, they are as follows  Enrollment module,  Database and  Identification module.
  • 6. HOW FACE RECOGNITION SYSTEMS WORK Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. There are about 80 nodal points on a human face. Here are few nodal points that are measured by the software. • Distance between the eyes • Width of the nose • Depth of the eye socket • Cheekbones • Jaw line and • Chin These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print. Only 14 to 22 nodal points are needed for faceit software to complete the recognition process
  • 7. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY The implementation of face recognition technology includes the following four stages: 1. Data acquisition, 2. Input processing , 3. Face image classification and 4. Decision making .
  • 8. PERFORMANCE 1. False rejection rates (FRR) : The probability that a system will fail to identify an enrollee. It is also called type 1 error rate. FRR= NFR/NEIA Where FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt 2. False acceptance rate (FAR) : The probability that a system will incorrectly identify an individual or will fail to reject an imposter. It is also called as type 2 error rate FAR= NFA/NIIA Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 9. SOFTWARES Facial recognition software falls into a larger group of technologies known as biometrics. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. The basic process that is used by the Faceit system to capture and compare images: 1. Detection, 2. Alignment, 3. Normalization, 4. Representation and 5. Matching.
  • 10. Advantages : 1. There are many benefits to face recognition systems such as its convenience and Social acceptability. All you need is your picture taken for it to work. 2. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. 3. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. ADVANTAGES AND DISADVANTAGES Disadvantage: 1. Face recognition systems cant tell the difference between identical twins.
  • 11. There are numerous applications for face recognition technology: Commercial Use: a. Day Care: Verify identity of individuals picking up the children. b. Residential Security: Alert homeowners of approaching personnel c. Voter verification: Where eligible politicians are required to verify their identity during a voting process. d. Banking using ATM: The software is able to quickly verify a customer. APPLICATIONS
  • 12. Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. CONCLUSION
  • 13. THANK YOU For any mistakes and suggestion’s feel free to text here idamakanti.jaswanth@gmail.com