SlideShare a Scribd company logo
Red.
Kevin, Taylor, Torriya, and Selena
Goals and
Objectives
Build a sensitive
camera
Build a thumbprint
sensor
Apply our systems
throughout the world
We plan on securing your
clients information to the
fullest extent.
To do so we will install two
new security measures
A facial recognition
camera
A thumbprint scanner
How Do We
Plan to Help
You?
Facial
Recognition
The face has many landmarks (the
different peaks and valleys that
make up facial features) and the
camera-computer system program
defines these landmarks as nodal
points (there are approximately 80
nodal points on each human face).
So basically, the customer will be
asked the keep still, their face will
be scanned with this software, and
after comparing all of the
combinations of nodal points --given
enough similarities/differences-- a
If You Aren't Close to
Someone, They Can’t
Steal Your Information
The facial recognition technology is very difficult
to be beaten but a thumbprint is fairly simple to
replicate. For facial recognition, a professional
costume designer/makeup artist/mask maker needs
about three pictures of the customer’s face to even
make a rudimentary mask of the customer’s face
sizable to anyone else’s. To make a mask that can
fool the facial recognition is nearly impossible
without an actual mold of a person’s face (basically
impossible to get without the person knowing).
The thumbprint scanner can be easily fooled by
taking a piece of tape, forcing the customer’s thumb
unto it, taping the backside of this tape to any finger
of the thief’s choosing.
Are These
Biometrics
Reliable?
In the hit family movie,
The Incredibles, the
super-suit designer, Edna
Mode, uses these two
biometrics and two other
security measures to
secure an entire area of
her facility. To the
knowledge of the viewer of
said movie, no one has
ever allegedly broken into
her secretly lair.
How Do We Protect
Your Privacy?
Obviously there may be
several concerns about high
profile or even just an average
customer having pictures of
them stored in a database
that can unlock of their bank
account. We can solve this
hacker problem by
outsourcing to other
companies to encrypt our
systems with consistent
updates to continue to keep
Can People Beat
the System?
The facial recognition technology is very
difficult to be beaten but a thumbprint is fairly
simple to replicate. For facial recognition, a
professional costume designer/makeup
artist/mask maker needs about three pictures of
the customer’s face to even make a rudimentary
mask of the customer’s face sizable to anyone
else’s. To make a mask that can fool the facial
recognition is nearly impossible without an
actual mold of a person’s face (basically
impossible to get without the person knowing).
The thumbprint scanner can be easily fooled

More Related Content

Similar to Presentation

Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxMuhammedNihadP
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptxjinaj2
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET Journal
 
Machine Vision – Augment not replace Humans
Machine Vision – Augment not replace HumansMachine Vision – Augment not replace Humans
Machine Vision – Augment not replace HumansQualitasTechnology
 
IRJET- IoT based Door Lock and Unlock System using Face Recognition
IRJET- IoT based Door Lock and Unlock System using Face RecognitionIRJET- IoT based Door Lock and Unlock System using Face Recognition
IRJET- IoT based Door Lock and Unlock System using Face RecognitionIRJET Journal
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]christeenamoses
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systemstom12thomas
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 

Similar to Presentation (20)

Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
ppt with template for reference (1).pptx
ppt with template for reference (1).pptxppt with template for reference (1).pptx
ppt with template for reference (1).pptx
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured Transaction
 
Machine Vision – Augment not replace Humans
Machine Vision – Augment not replace HumansMachine Vision – Augment not replace Humans
Machine Vision – Augment not replace Humans
 
IRJET- IoT based Door Lock and Unlock System using Face Recognition
IRJET- IoT based Door Lock and Unlock System using Face RecognitionIRJET- IoT based Door Lock and Unlock System using Face Recognition
IRJET- IoT based Door Lock and Unlock System using Face Recognition
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 

Recently uploaded

Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...sanghavirahi2
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 

Recently uploaded (20)

Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 

Presentation

  • 2. Goals and Objectives Build a sensitive camera Build a thumbprint sensor Apply our systems throughout the world
  • 3. We plan on securing your clients information to the fullest extent. To do so we will install two new security measures A facial recognition camera A thumbprint scanner How Do We Plan to Help You?
  • 4. Facial Recognition The face has many landmarks (the different peaks and valleys that make up facial features) and the camera-computer system program defines these landmarks as nodal points (there are approximately 80 nodal points on each human face). So basically, the customer will be asked the keep still, their face will be scanned with this software, and after comparing all of the combinations of nodal points --given enough similarities/differences-- a
  • 5. If You Aren't Close to Someone, They Can’t Steal Your Information The facial recognition technology is very difficult to be beaten but a thumbprint is fairly simple to replicate. For facial recognition, a professional costume designer/makeup artist/mask maker needs about three pictures of the customer’s face to even make a rudimentary mask of the customer’s face sizable to anyone else’s. To make a mask that can fool the facial recognition is nearly impossible without an actual mold of a person’s face (basically impossible to get without the person knowing). The thumbprint scanner can be easily fooled by taking a piece of tape, forcing the customer’s thumb unto it, taping the backside of this tape to any finger of the thief’s choosing.
  • 6. Are These Biometrics Reliable? In the hit family movie, The Incredibles, the super-suit designer, Edna Mode, uses these two biometrics and two other security measures to secure an entire area of her facility. To the knowledge of the viewer of said movie, no one has ever allegedly broken into her secretly lair.
  • 7. How Do We Protect Your Privacy? Obviously there may be several concerns about high profile or even just an average customer having pictures of them stored in a database that can unlock of their bank account. We can solve this hacker problem by outsourcing to other companies to encrypt our systems with consistent updates to continue to keep
  • 8. Can People Beat the System? The facial recognition technology is very difficult to be beaten but a thumbprint is fairly simple to replicate. For facial recognition, a professional costume designer/makeup artist/mask maker needs about three pictures of the customer’s face to even make a rudimentary mask of the customer’s face sizable to anyone else’s. To make a mask that can fool the facial recognition is nearly impossible without an actual mold of a person’s face (basically impossible to get without the person knowing). The thumbprint scanner can be easily fooled