SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
“Face Recognition Technology”
PRESENTATION ON
1
1.Introduction
▶ The information age is quickly revolutionizing the way transactions are completed.
Everyday actions are increasingly being handled electronically, instead of with pencil and
paper or face to face. This growth in electronic transactions has resulted in a greater demand
for fast and accurate user identification and authentication.Access codes for buildings, banks
accounts and computer systems often use PIN's for identification and security clearences.
▶ Using the proper PIN gains access, but the user of the PIN is not verified. When credit and
ATM cards are lost or stolen, an unauthorized user can often come up with the correct
personal codes. Despite warning, many people continue to choose easily guessed PIN‟s and
passwords: birthdays, phone numbers and social security numbers. Recent cases of identity
theft have highten the need for methods to prove that someone is truly who he/she claims to
be.
▶ Face recognition technology may solve this problem since a face is undeniably connected to
its owner expect in the case of identical twins. Its nontransferable. The system can then
compare scans to records stored in a central or local database or even on a smart card.
2
1.1.What are biometrics ?
▶ Abiometric is a unique, measurable characteristic of a human being that can be used to
automatically recognize an individual or verify an individual‟s identity. Biometrics can measure
both physiological and behavioral characteristics. Physiological biometrics (based on measurements
and data derived from direct measurement of a part of the human body) include:
▶ a. Finger-scan
▶ b. Facial Recognition
▶ c. Iris-scan
▶ d. Retina-scan
▶ e. Hand-scan
3
1.2. Why we choose face recognition
over otherbiometric ?
▶ There are number reasons to choose face recognition. This includes the following :
▶ a. It requires no physical interaction on behalf of the user.
▶ b. It is accurate and allows for high enrolment and verification rates.
▶ c. It does not require an expert to interpret the comparison result.
▶ d. It can use your existing hardware infrastructure, existing camaras and image
capture Devices will work with no problems
▶ e. It is the only biometric that allow you to perform passive identification in a one to.
Many environments (e.g.: identifying a terrorist in a busyAirport terminal
4
2. FACE RECOGNITION
▶ The Face – unique part.
▶ For face recognition there are two types of comparisons
▶ 1. Verification.
This is where the system compares the given individual with who that individual says
they are and gives a yes or no decision.
▶ 2. Identification.
This is where the system compares the given individual to all the Other individuals in the
database and gives a ranked list of matches.
5
2.1 All identification or authentication technologies operate
using the following four stages:
▶ a. Capture: Aphysical or behavioural
sample is captured by the system during
Enrollment and also in identification or
verification process
▶ b. Extraction: Unique data is extracted
from the sample and a template is created.
▶ c. Comparison: The template is then
compared with a new sample.
▶ d. Match/non match: The system
decides if the features extracted from the
new Samples are a match or a non match
a b c d
6
2.2 COMPONENTS OF FACE RECOGNITION SYSTEMS
▶ a. Enrollment module :An automated
mechanism that scans and captures a
digital or an analog image of a living
personal characteristics
▶ b. Database :Another entity which
handles compression, processing, storage
and compression of the captured data with
stored data
▶ c. Identification module : The third
interfaces with the application system
7
3. IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
▶ The implementation of face recognition technology includes the following three
stages:
• Data acquisition
• Input processing
• Face image classification and decision making
8
▶ 3.1 Data acquisition
▶ The input can be recorded video of the speaker or a still image. A sample of 1 sec
duration consists of a 25 frame video sequence. More than one camera can be
used to produce a 3D representation of the face and to protect against the usage of
photographs to gain unauthorized access.
▶ 3.2 Input processing
▶ A pre-processing module locates the eye position and takes care of the
surrounding lighting condition and colour variance. First the presence of faces or
face in a scene must be detected. Once the face is detected, it must be localized.
▶ Some facial recognition approaches use the whole face while others concentrate
on facial components and/ or regions (such as lips, eyes etc). The appearance of
the face can change considerably during speech and due to facial expressions.
9
▶ 3.3 Face imageclassification and decision making
▶ Synergetic computer are used to classify optical and audio features, respectively.
A synergetic computer is a set of algorithm that simulate synergetic phenomena.
In training phase the BIOID creates a prototype called face print for each person.
A newly recorded pattern is pre-processed and compared with each face print
stored in the database.As comparisons are made, the system assigns a value to
the comparison using a scale of one to ten. If a score is above a predetermined
threshold, a match is declared.
10
4.HOW FACE RECOGNITION SYSTEMS WORK
▶ If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial
features. Software defines these landmarks as nodal points.
▶ There are about “80 nodal points” on a human face.
▶ Here are few nodal points that are measured by the software.
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
• chin
11
4.1 Face Bunch Graph
▶ AFace bunch graph is created from “70 nodal
points” to obtain a general representation of
face.
▶ Given an image the face is matched to the
Face bunch graph to find the same point.
▶ These nodal points are measured to create a
numerical code, a string of numbers that
represents a face in the database. This code is
called face print.
▶ Only 14 to 22 nodal points are needed for
faceit software to complete the recognition
process.
12
5. ADVANTAGES AND DISADVANTAGES
▶ 4.1Advantages:
a. There are many benefits to face recognition systems such as its convinence and
Social acceptability. all you need is your picture taken for it to work.
b. Face recognition is easy to use and in many cases it can be performed without a Person
even knowing.
c. Face recognition is also one of the most inexpensive biometric in the market and Its price
should continue to go down.
▶ 4.2 Disadvantages:
a. Face recognition systems can’t tell the difference between identical twins.
13
6. APPLICATIONS
▶ The natural use of face recognition technology is the replacement of PIN.
▶ 5.1 Government Use:
a. Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school
surveillance camera images to know child molesters.
b. Security/Counterterrorism:Access control, comparing surveillance images to Know terrorist.
c. Immigration: Rapid progression through Customs.
d. Voter verification: Where eligible politicians are required to verify their identity during a voting process
this is intended to stop “proxy‟ voting where the vote may not go as expected.
▶ 5.2 Commercial Use:
a. Residential Security: Alert homeowners of approaching personnel.
d. Banking usingATM: The software is able to quickly verify a customer’s face.
c. Physical access control of buildings areas, doors, cars or net access.
14
7. CONCLUSION
▶ Face recognition technologies have been associated generally with
very costly top secure applications. Today the core technologies
have evolved and the cost of equipments is going down dramatically
due to the intergration and the increasing processing power. Certain
applications of face recognition technology are now cost effective,
reliable and highly accurate.As a result there are no technological or
financial barriers for stepping from the pilot project to widespread
deployment.
?
15
8. REFERENCES
▶ 1. Electronics for You: -Part 1 April 2001
▶ 2. ElectronicsWorld: -December 2002
▶ 5. www.facereg.com
▶ 6. www.I
magestechnology.com
▶ 7. www.ieee.com
16

Más contenido relacionado

La actualidad más candente

Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
Biometric steganography
Biometric steganographyBiometric steganography
Biometric steganographyPiyush Mittal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness Francesco Forestieri
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition reporthetvi naik
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptxNishmithaHc
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face RecognitionIRJET Journal
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 

La actualidad más candente (20)

Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Biometric steganography
Biometric steganographyBiometric steganography
Biometric steganography
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Elgamal & schnorr digital signature scheme copy
Elgamal & schnorr digital signature scheme   copyElgamal & schnorr digital signature scheme   copy
Elgamal & schnorr digital signature scheme copy
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness Digital Image Forensics: camera fingerprint and its robustness
Digital Image Forensics: camera fingerprint and its robustness
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition report
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 

Similar a Face Recognition Tech Overview

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 

Similar a Face Recognition Tech Overview (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Face recognition
Face recognition Face recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 

Último

Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxBoston Institute of Analytics
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 

Último (20)

Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 

Face Recognition Tech Overview

  • 2. 1.Introduction ▶ The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication.Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearences. ▶ Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN‟s and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have highten the need for methods to prove that someone is truly who he/she claims to be. ▶ Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card. 2
  • 3. 1.1.What are biometrics ? ▶ Abiometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual‟s identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include: ▶ a. Finger-scan ▶ b. Facial Recognition ▶ c. Iris-scan ▶ d. Retina-scan ▶ e. Hand-scan 3
  • 4. 1.2. Why we choose face recognition over otherbiometric ? ▶ There are number reasons to choose face recognition. This includes the following : ▶ a. It requires no physical interaction on behalf of the user. ▶ b. It is accurate and allows for high enrolment and verification rates. ▶ c. It does not require an expert to interpret the comparison result. ▶ d. It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems ▶ e. It is the only biometric that allow you to perform passive identification in a one to. Many environments (e.g.: identifying a terrorist in a busyAirport terminal 4
  • 5. 2. FACE RECOGNITION ▶ The Face – unique part. ▶ For face recognition there are two types of comparisons ▶ 1. Verification. This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. ▶ 2. Identification. This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. 5
  • 6. 2.1 All identification or authentication technologies operate using the following four stages: ▶ a. Capture: Aphysical or behavioural sample is captured by the system during Enrollment and also in identification or verification process ▶ b. Extraction: Unique data is extracted from the sample and a template is created. ▶ c. Comparison: The template is then compared with a new sample. ▶ d. Match/non match: The system decides if the features extracted from the new Samples are a match or a non match a b c d 6
  • 7. 2.2 COMPONENTS OF FACE RECOGNITION SYSTEMS ▶ a. Enrollment module :An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics ▶ b. Database :Another entity which handles compression, processing, storage and compression of the captured data with stored data ▶ c. Identification module : The third interfaces with the application system 7
  • 8. 3. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY ▶ The implementation of face recognition technology includes the following three stages: • Data acquisition • Input processing • Face image classification and decision making 8
  • 9. ▶ 3.1 Data acquisition ▶ The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access. ▶ 3.2 Input processing ▶ A pre-processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized. ▶ Some facial recognition approaches use the whole face while others concentrate on facial components and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably during speech and due to facial expressions. 9
  • 10. ▶ 3.3 Face imageclassification and decision making ▶ Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype called face print for each person. A newly recorded pattern is pre-processed and compared with each face print stored in the database.As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared. 10
  • 11. 4.HOW FACE RECOGNITION SYSTEMS WORK ▶ If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Software defines these landmarks as nodal points. ▶ There are about “80 nodal points” on a human face. ▶ Here are few nodal points that are measured by the software. • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line • chin 11
  • 12. 4.1 Face Bunch Graph ▶ AFace bunch graph is created from “70 nodal points” to obtain a general representation of face. ▶ Given an image the face is matched to the Face bunch graph to find the same point. ▶ These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print. ▶ Only 14 to 22 nodal points are needed for faceit software to complete the recognition process. 12
  • 13. 5. ADVANTAGES AND DISADVANTAGES ▶ 4.1Advantages: a. There are many benefits to face recognition systems such as its convinence and Social acceptability. all you need is your picture taken for it to work. b. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. c. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. ▶ 4.2 Disadvantages: a. Face recognition systems can’t tell the difference between identical twins. 13
  • 14. 6. APPLICATIONS ▶ The natural use of face recognition technology is the replacement of PIN. ▶ 5.1 Government Use: a. Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school surveillance camera images to know child molesters. b. Security/Counterterrorism:Access control, comparing surveillance images to Know terrorist. c. Immigration: Rapid progression through Customs. d. Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop “proxy‟ voting where the vote may not go as expected. ▶ 5.2 Commercial Use: a. Residential Security: Alert homeowners of approaching personnel. d. Banking usingATM: The software is able to quickly verify a customer’s face. c. Physical access control of buildings areas, doors, cars or net access. 14
  • 15. 7. CONCLUSION ▶ Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the intergration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate.As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment. ? 15
  • 16. 8. REFERENCES ▶ 1. Electronics for You: -Part 1 April 2001 ▶ 2. ElectronicsWorld: -December 2002 ▶ 5. www.facereg.com ▶ 6. www.I magestechnology.com ▶ 7. www.ieee.com 16