Face Recognition Technology
Upcoming SlideShare
Loading in...5
×
 

Face Recognition Technology

on

  • 3,639 views

 

Statistics

Views

Total Views
3,639
Views on SlideShare
3,639
Embed Views
0

Actions

Likes
12
Downloads
432
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Face Recognition Technology Face Recognition Technology Presentation Transcript

  • FACE RECOGNITION TECHNOLOGY BY I.JASWANTH REDDY
  • INTRODUCTION Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other applications. For example, Facebook uses facial recognition software to help automate user tagging in photographs. 1. What are biometrics? Ans: A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct the human body) include: a. Finger-scan , b. Facial Recognition, c. Iris-scan , d. Retina-scan and e. Hand-scan. Behavioral biometrics (based on measurements and data derived from an action) include: a. Voice-scan , b. Signature-scan and c. Keystroke-scan .
  • FACE RECOGNITION The face is an important part of who you are and how people identify you. For face recognition there are two types of comparisons. The first is verification and the second is identification. verification is where the system compares the given individual with who that individual says they are and gives a yes or no decision.. identification is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. All identification or authentication technologies operate using the following four stages: 1. Capture: A physical sample is captured by the system during enrollment and also in identification or Verification process. 2. Extraction: unique data is extracted from the sample and a template is created. 3. Comparison: the template is then compared with a new sample. 4. Match/Non match: the system decides if the features extracted from the new
  • CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS The image is optical in characteristics and may be thought of as a collection of a large number of bright and dark areas representing the picture details. In other words the picture information is a function of two variables: Time and Space. It would require infinite number of channels to transmit optical information corresponding to picture elements simultaneously. There is practical difficulty in transmitting all information simultaneously so we use a method called scanning.
  • COMPONENTS OF FACE RECOGNITION SYSTEMS The 3 main components of face recognition systems, they are as follows  Enrollment module,  Database and  Identification module.
  • HOW FACE RECOGNITION SYSTEMS WORK Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. There are about 80 nodal points on a human face. Here are few nodal points that are measured by the software. • Distance between the eyes • Width of the nose • Depth of the eye socket • Cheekbones • Jaw line and • Chin These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print. Only 14 to 22 nodal points are needed for faceit software to complete the recognition process
  • IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY The implementation of face recognition technology includes the following four stages: 1. Data acquisition, 2. Input processing , 3. Face image classification and 4. Decision making .
  • PERFORMANCE 1. False rejection rates (FRR) : The probability that a system will fail to identify an enrollee. It is also called type 1 error rate. FRR= NFR/NEIA Where FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt 2. False acceptance rate (FAR) : The probability that a system will incorrectly identify an individual or will fail to reject an imposter. It is also called as type 2 error rate FAR= NFA/NIIA Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • SOFTWARES Facial recognition software falls into a larger group of technologies known as biometrics. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. The basic process that is used by the Faceit system to capture and compare images: 1. 2. 3. 4. 5. Detection, Alignment, Normalization, Representation and Matching.
  • ADVANTAGES AND DISADVANTAGES Advantages : 1. There are many benefits to face recognition systems such as its convenience and Social acceptability. All you need is your picture taken for it to work. 2. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. 3. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. Disadvantage: 1. Face recognition systems cant tell the difference between identical twins.
  • APPLICATIONS There are numerous applications for face recognition technology: Commercial Use: a. Day Care: Verify identity of individuals picking up the children. b. Residential Security: Alert homeowners of approaching personnel c. Voter verification: Where eligible politicians are required to verify their identity during a voting process. d. Banking using ATM: The software is able to quickly verify a customer.
  • CONCLUSION Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate.
  • THANK YOU