face recognation


Published on

biometric system
logon using biometric on server

Published in: Technology, News & Politics
1 Comment
  • salam hamza! good work..i m doing the same as my thesis. i need some help and suggestions . kindly mail me at aroojnazir33@gmail.com..
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

face recognation

  1. 1. Libya Benghazi University of Garyounis Faculty of Information Technology  Department Network and computer communication<br />PowerPointTemplate<br />Graduation project Login Using biometric(server) <br />S_Name: Hamza Yusuf MohammedSt_No : 216 Supervised by: Mrs. Eman Al Sahle. <br />www.themegallery.com<br />Spring term: (2009 – 2010).<br />
  2. 2. ABSTRACT<br /> This project is able to recognize a person’s face by comparing facial structure to that of a known person , This is achieved by using forward facing photographs of individuals to render a two-dimensional representation of a human head , it can identify the person with a high rate of success , Then allow this person access to the server .<br />2<br />18<br />
  3. 3. 3<br />Plan of project<br />18<br />Stage 2<br />Stage 1<br />Review of<br />Block Diagram<br />biometric Systems<br />Implement<br />Authentications<br />Test<br />Languages<br />
  4. 4. Time table<br />4<br />18<br />complete<br /> non complete<br />
  5. 5. Overview<br />5<br />18<br />Goal of project<br />Introduction<br />Biometric Systems<br />Face Recognition<br />Authentications<br />Applications<br />Tools<br />
  6. 6. 6<br />Goal of Project<br />18<br /><ul><li>Using the technology of recognition biometric </li></ul> in order to access a server , The recognition is confirmed by the server.<br />
  7. 7. Introduction<br /><ul><li>The term biometrics is derived from the Greek words bio (life) and metric (to measure).
  8. 8. History </li></ul>In the fourteenth century in China.<br />In the 1890s, an anthropologist and police .<br />From 1960s to 2010 the biometric used and developer in Systems Security . <br />7<br />18<br />
  9. 9. Introduction.cont<br /><ul><li>Why Biometrics ?</li></ul>Because the protection systems of traditional parity emerged easy to penetrate, in many ways .<br /><ul><li>Traditional security :</li></ul>Keys and Locks<br />Username and Password<br />Electronic Card<br />8<br />18<br />
  10. 10. Biometric Systems<br />Physical biometrics:<br />Behavioral biometrics:<br />9<br />18<br />Voice recognition<br /> Signature/handwriting<br /> Keystroke/patterning<br />Facial recognition<br />Fingerprint<br /> Hand geometry<br /> Iris scan<br /> Retinal scan<br /> Vascular<br /> DNA<br />
  11. 11. Face Recognition<br /><ul><li>Facial-scan technology utilizes distinctive features of the human face in order to verify or identify individuals.
  12. 12. General Face Recognition Steps :</li></ul>Face Detection<br />Face Normalization<br />Face Identification<br />10<br />18<br />
  13. 13. Face Recognition<br /><ul><li>What Is Difficult About Face Recognition :</li></ul>Lighting variation<br />Orientation variation (face angle)<br />Large database<br />Processor intensive<br />Time requirements<br />11<br />18<br />
  14. 14. Face Recognition<br /><ul><li>PCA Algorithms :</li></ul>Principle Component Analysis(CA)<br />Look at the principal components of the distribution of faces.<br />12<br />18<br />
  15. 15. System requirements<br />- Sensors(Device)<br />-Algorithms<br />- System<br />13<br />18<br />
  16. 16. Block Diagram<br />14<br />18<br />Web Page login<br />Web Cam<br />Send Image<br />Application<br />Server<br />Face Recognition<br />Algorithm<br />Network<br />Internet<br />Web Page<br />In client<br />Receive Image<br />Database<br />
  17. 17. Authentication<br /><ul><li>Identification :</li></ul>Compare information for people with the database , Application of a face recognition algorithm (PCA).<br /><ul><li>Verification :</li></ul>ensure the safety inputs this information, and user credibility <br />15<br />18<br />
  18. 18. Current Biometric Applications<br /><ul><li>Workstation
  19. 19. Network and Domain access
  20. 20. Application logon
  21. 21. Remote access to resources
  22. 22. Web security
  23. 23. ATMs</li></ul>16<br />18<br />
  24. 24. Tools<br /><ul><li>program Language :</li></ul>Asp.NET<br />Ajax<br />C#<br /> JavaScript<br />SQL<br /><ul><li>program developer :
  25. 25. Visual studio 2010
  26. 26. SQL Server 2008 (Database)</li></ul>17<br />18<br />
  27. 27. Reference<br />18<br />18<br /><ul><li>[1] An Introduction to Biometric Recognition , by Anil K. Jain, Arun Ross and SalilPrabhakar. 1, January 2004.
  28. 28. [2] Biometrics ,Identity Verification in a Networked World . A Wiley Tech Brief by SamirNanavati , Michael Thieme and Raj Nanavati ,2002.
  29. 29. [3] Advances in Biometrics Sensors, Algorithms and Systems,byNalini K. Ratha and VenuGovindaraju.</li></li></ul><li>Thank You !<br />Any question?<br />