2. INTERODUCTION
The new era or generation is growing day by day
side by side the advancement of technology is
also being developing. But one of the major
issue of todays date is not growing as it should
have grown. And that is the security.
We still found most of the places where old
fashion passwords are being used.
This technology can bring some classical change
in the world of security.
2
3. USE OF BIOMETRICS:
Biometrics are on of the unique
technique used for security purpose.
Finger scan
Eris scan
Hand scan
3
4. Why we choose face recognition over
biometric?
It requires no physical interaction on
behalf of the user.
It is accurate and allows high
enrolment and verification rates .
It does not require any expert to
interpret the comparison result.
No extra hardware is needed to install.
4
5. Face Recognition
The face- Unique part.
For face recognition there
are two types of comparison.
1.Verification.
2.identification.
5
7. Components of face recognition
system
a. Enrolment module.
b. Database.
c. Identification module.
7
8. Implementation of face recognition
technology
The implementation of this technology is divided into three stages.
1. Data acquisition.
2. Input processing.
3. Face image classification and decision makling.
8
9. How this technology works?
Well to do this all we need to know about some
interesting facts about our face. In all our face
have “80 nodal points”. Some of them are easily
read by scanner.
1. Distances between the eyes.
2. Width of the nose.
3. Depth of eye socket
4. Chin.
And many more….
9
10. Face Bunch Graph
A face bunch graph is created using
“70 nodal points” to obtain a general
representation of face.
Given an image is matched to the
Face Bunch Graph to find the same
point.
These nodal points are measured to
create a numerical code known as
face points.
Only 14 -22 points are required for a
faceit software to complete the
process.
10
11. Advantages and Disadvantages
Advantages:
All we need to do is just a picture to make it work.
Can be used for very confidential things.
Very though to hack this type of passwords.
Disadvantages:
It cannot distinguish between the two identical faces.
11
12. Use of Face Recognition technology
Government uses:
a. Law Enforcement.
b. Security/counterterrorism.
c. Immigration.
d. Vote poles.
Commercial uses:
a. Residential security.
b. Banking using ATM.
c. Confidential things.
12
13. Conclusion
Face Recognition technologies have been associated generally with very
costly top secure application. But in todays generation core technology have
evolved and cost of equipment is going down dramatically due to the
integration and the increasing processing power. Certain technologies of Face
Recognition are now cost effective and reliable and highly effective. As a
result there are no technological or financial barriers for stepping from the
piolet project to widespread deployment.
13