SlideShare a Scribd company logo
1 of 20
RAKESH KHURANA
Born: November 22nd 1967
Education: He received his bachelor's degree from Cornell University in 1990,
his Sociology from Harvard in 1997 and his PhD in organizational behavior from
Harvard's in 1998.
He is an American organizational theorist and an associate professor of
organizational behavior at Harvard Business School.
Books: From higher aims to hired hands, Searching for a corporate savior.
He is known for interviewing GE CEO Jack Welch at a Harvard Business School
forum.
He was officially appointed as the next dean of Harvard College.
Ritvika
Manoj
Jai Surya
Priyanka
Abdulla Ahmed
FACE DETECTION TECHNOLOGY
CONTENT
Biometrics History Applications
Advantages Disadvantages Conclusion
Meaning
BIOMETRICS
A biometric is a unique, measurable characteristic of a human being that can be
used to automatically recognize an individual or verify an individual’s identity.
FACE DETECTION
TECHNOLOGY
Face detection is a computer technology being
used in a variety of applications that identifies
human faces in digital images.
It is a function of the camera that detects human
faces so that the camera can set the focus and
appropriate exposure for the shot automatically.
HISTORY
• Francis Galton(1888)
Designed a biometric system for description and identification of
faces.
• In 1960s, the first semi-automated system for facial recognition
to locate the features(such as eyes, ears, nose and mouth).
CONTD…
• Woody Bledsoe(1964)
First implementation of automatic facial recognition.
• In 1970’s, Goldstein and Harmon used 21 specific subjective
markers such as hair color and lip thickness to automate the
recognition.
APPLICATIONS OF FACE DETECTION TECHNOLOGY
1. Easy people tagging:
Facebook’s automatic tag suggestion feature, which used
face recognition
to suggest people you might want to tag in your photos.
Face recognition for people tagging certainly saves time.
2. Security:
Nowadays, security is becoming an important issue in our lives.
This technology is being used today from crime solving to
authentication.
Face recognition is slowly replacing password login.
Information Security Intranet security, file
encryption.
Law enforcement CCTV control, shop lifting and
suspect tracking, passport,
national ID
3. Digital attendance:
Digital attendance system is being used because the digital
information is easy to process and far easy to access as compared
to manual data.
4. This software help researchers to study animal population.
5. Access control
6. Image database investigations
ADVANTAGES
1.Accurate and Fast Identification
2. High Usability and Security
3. User friendly design
4. Can identify terrorists, criminals
LIMITATIONS
1. Image quality
2. Isn't always accurate
3. Hindered by glasses, masks, long hair etc.
4. Considered an invasion of privacy to be watched
5. Cannot identify identical twins.
CONCLUSION
Face recognition technology has come a long way in the last
twenty years. Today, machines are able to automatically verify
identity information for secure transactions, for surveillance and
security tasks, and for access control.,
Next generation face recognition systems are going to have
widespread application in smart environments -- where computers
and machines are more like helpful assistants.
Thank you!

More Related Content

What's hot

Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Alexa Dovgopolaya
 
Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCVVasile Chelban
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technologyVivek Soni
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์BAINIDA
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research ReportSandeep Garg
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

What's hot (20)

Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.
 
Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCV
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research Report
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 

Similar to Face Detection Technology

HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameterijtsrd
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyijtsrd
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Baseline Brainwave Biometrics
Baseline Brainwave BiometricsBaseline Brainwave Biometrics
Baseline Brainwave BiometricsOlivia Moran
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdfgulfam ali
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identificationdswazalwar
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 
Trends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfTrends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfIdentity Herald
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...IAESIJAI
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyJawhar Ali
 

Similar to Face Detection Technology (20)

HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Baseline Brainwave Biometrics
Baseline Brainwave BiometricsBaseline Brainwave Biometrics
Baseline Brainwave Biometrics
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Iris based Human Identification
Iris based Human IdentificationIris based Human Identification
Iris based Human Identification
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
Trends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdfTrends in Biometric Identity Management.pdf
Trends in Biometric Identity Management.pdf
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Face Detection Technology

  • 1. RAKESH KHURANA Born: November 22nd 1967 Education: He received his bachelor's degree from Cornell University in 1990, his Sociology from Harvard in 1997 and his PhD in organizational behavior from Harvard's in 1998. He is an American organizational theorist and an associate professor of organizational behavior at Harvard Business School. Books: From higher aims to hired hands, Searching for a corporate savior. He is known for interviewing GE CEO Jack Welch at a Harvard Business School forum. He was officially appointed as the next dean of Harvard College.
  • 3. CONTENT Biometrics History Applications Advantages Disadvantages Conclusion Meaning
  • 4. BIOMETRICS A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity.
  • 5.
  • 6. FACE DETECTION TECHNOLOGY Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. It is a function of the camera that detects human faces so that the camera can set the focus and appropriate exposure for the shot automatically.
  • 7. HISTORY • Francis Galton(1888) Designed a biometric system for description and identification of faces. • In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth).
  • 8. CONTD… • Woody Bledsoe(1964) First implementation of automatic facial recognition. • In 1970’s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition.
  • 9. APPLICATIONS OF FACE DETECTION TECHNOLOGY 1. Easy people tagging: Facebook’s automatic tag suggestion feature, which used face recognition to suggest people you might want to tag in your photos. Face recognition for people tagging certainly saves time.
  • 10. 2. Security: Nowadays, security is becoming an important issue in our lives. This technology is being used today from crime solving to authentication. Face recognition is slowly replacing password login. Information Security Intranet security, file encryption. Law enforcement CCTV control, shop lifting and suspect tracking, passport, national ID
  • 11.
  • 12. 3. Digital attendance: Digital attendance system is being used because the digital information is easy to process and far easy to access as compared to manual data.
  • 13.
  • 14. 4. This software help researchers to study animal population.
  • 15. 5. Access control 6. Image database investigations
  • 16.
  • 17. ADVANTAGES 1.Accurate and Fast Identification 2. High Usability and Security 3. User friendly design 4. Can identify terrorists, criminals
  • 18. LIMITATIONS 1. Image quality 2. Isn't always accurate 3. Hindered by glasses, masks, long hair etc. 4. Considered an invasion of privacy to be watched 5. Cannot identify identical twins.
  • 19. CONCLUSION Face recognition technology has come a long way in the last twenty years. Today, machines are able to automatically verify identity information for secure transactions, for surveillance and security tasks, and for access control., Next generation face recognition systems are going to have widespread application in smart environments -- where computers and machines are more like helpful assistants.