SlideShare a Scribd company logo
1 of 4
FACIAL RECOGNITION SYSTEMS
SUBMITTED BY,
SRUTHI SARA BABU
ALISHA ELIABETH ANOOP
M.B.A - VIDYUT
Facial recognition is a type of biometric technology that uses statistical measurements of
people’s features to digitally determine identity.Though facial recognition can allow for more
ease in day to day life, it comes with major security and privacy issues that might cause concerns
for users.
Facebook, Oregin Department of Motor vehicles etc. use these facial recognition
systems for various purposes.
Facebook’s facial recognition tool called Deepface is nearly as accurate the human
brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy
whether the photos shows the same face.Humans are able to perform the same task with 97.53%
accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon
will be ready for commercial use, most likely to help facebook improve the accuracy of its
existing facial recognition capabilities.Deepface might also be used for real world facial-
tracking.
The Oregon Department of Motor Vehicles uses facial recognition to ensure that
drivers licenses, instruction permits,and ID cards are not issued under false names.Police can
capture a 3D video and upload it to an image gallery for comparison to identify people with prior
criminal records or outstanding warrants.
Facial analysis has progressed beyond scruitinizing static features.Frame by frame
analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While
these insights can drive productive endeavours,they are fraught with privacy implications.
Emotient, another expression analysis start up located in California, received a 6
million infusion of funds in early2014 to support glassware for retail salespeople.Emotient is
confident that the ability to objectively and accurately gauge customer emotions will give retail
teams more tools to increase sales, but customer response to being recorded by cameras
embedded in smartglass is uncertain.
Face recognition technology has come a longway.However, next generation face
recognition systems are going to have widespread application in smart environments-where
computers and machines are more likely helpful to assistants.
QUESTIONS AND ANSWERS
1. What are some of the benefits of using facial recognition technology?Describe some
current and future applications of this technology.
Some of the benefits of facial recognition technology are:
 Increased Security: One of the biggest pros of facial recognition technology is that it
enhances safety and security. From government agencies to personal use, there is an
increasing demand for advanced security and surveillance systems. Organizations can
easily identify and track anyone who comes onto the premises, and they can easily flag
visitors who aren’t welcome. It can be very helpful when it comes to finding potential
terrorists. Plus, there is no key, badge, or password that can be stolen or lost.
 Fast and Accurate: With the ever-increasing demand for speed and the growing number
of cyberattacks, having fast and accurate technology is key. Facial recognition
technology provides verification that is convenient, quick, and accurate. Although
possible, it is very difficult to fool facial recognition technology, which makes it
beneficial in helping prevent fraud.
 No Contact: Facial recognition is preferred over fingerprint scanning because of its non-
contact process. People don’t have to worry about the potential drawbacks related to
fingerprint identification technology, such as germs or smudges.
Deepface soon will be ready for commercial use, most likely to help facebook improve
the accuracy of its existing facial recognition capabilities.Deepface might also be used for real
world facial-tracking.Foe example, monitoring someone’s shopping habits as that person moves
from physical store to store.
The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers
licenses, instruction permits,and ID cards are not issued under false names.Police can capture a
3D video and upload it to an image gallery for comparison to identify people with prior criminal
records or outstanding warrants.
2.How does facial recognition technology threaten the protection of individual privacy?
Facial analysis has progressed beyond scruitinizing static features.Frame by frame
analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While
these insights can drive productive endeavours,they are fraught with privacy implications.For
example , do you want the person conducting the job interview to be able to review a videotape ,
identify fleeting moments of confusion or indecision and decide against hiring you.
3.Would you like deepface to track your activities on facebook and in the physical world?
Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2
photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans
are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s
AI research group in California.Deepface soon will be ready for commercial use, most likely to
help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might
also be used for real world facial-tracking.

More Related Content

What's hot

ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
Hai Nguyen
 

What's hot (20)

Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 

Similar to Facial recognition__systems[1]

facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
gulfam ali
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 

Similar to Facial recognition__systems[1] (20)

Frs
FrsFrs
Frs
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Image Recognition? But why?
Image Recognition? But why?Image Recognition? But why?
Image Recognition? But why?
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Ai in Society
Ai in SocietyAi in Society
Ai in Society
 

Recently uploaded

Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Lisi Hocke
 

Recently uploaded (20)

Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
Team Transformation Tactics for Holistic Testing and Quality (NewCrafts Paris...
 
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test Automation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
Abortion Clinic In Springs ](+27832195400*)[ 🏥 Safe Abortion Pills in Springs...
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...Incident handling is a clearly defined set of procedures to manage and respon...
Incident handling is a clearly defined set of procedures to manage and respon...
 
Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeCon
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
Test Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdfTest Automation Design Patterns_ A Comprehensive Guide.pdf
Test Automation Design Patterns_ A Comprehensive Guide.pdf
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with GraphGraphSummit Milan - Neo4j: The Art of the Possible with Graph
GraphSummit Milan - Neo4j: The Art of the Possible with Graph
 
Weeding your micro service landscape.pdf
Weeding your micro service landscape.pdfWeeding your micro service landscape.pdf
Weeding your micro service landscape.pdf
 
Software Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements EngineeringSoftware Engineering - Introduction + Process Models + Requirements Engineering
Software Engineering - Introduction + Process Models + Requirements Engineering
 
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
Workshop -  Architecting Innovative Graph Applications- GraphSummit MilanWorkshop -  Architecting Innovative Graph Applications- GraphSummit Milan
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
 
GraphSummit Milan - Visione e roadmap del prodotto Neo4j
GraphSummit Milan - Visione e roadmap del prodotto Neo4jGraphSummit Milan - Visione e roadmap del prodotto Neo4j
GraphSummit Milan - Visione e roadmap del prodotto Neo4j
 
Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?Prompt Engineering - an Art, a Science, or your next Job Title?
Prompt Engineering - an Art, a Science, or your next Job Title?
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 

Facial recognition__systems[1]

  • 1. FACIAL RECOGNITION SYSTEMS SUBMITTED BY, SRUTHI SARA BABU ALISHA ELIABETH ANOOP M.B.A - VIDYUT
  • 2. Facial recognition is a type of biometric technology that uses statistical measurements of people’s features to digitally determine identity.Though facial recognition can allow for more ease in day to day life, it comes with major security and privacy issues that might cause concerns for users. Facebook, Oregin Department of Motor vehicles etc. use these facial recognition systems for various purposes. Facebook’s facial recognition tool called Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial- tracking. The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers licenses, instruction permits,and ID cards are not issued under false names.Police can capture a 3D video and upload it to an image gallery for comparison to identify people with prior criminal records or outstanding warrants. Facial analysis has progressed beyond scruitinizing static features.Frame by frame analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While these insights can drive productive endeavours,they are fraught with privacy implications. Emotient, another expression analysis start up located in California, received a 6 million infusion of funds in early2014 to support glassware for retail salespeople.Emotient is confident that the ability to objectively and accurately gauge customer emotions will give retail teams more tools to increase sales, but customer response to being recorded by cameras embedded in smartglass is uncertain. Face recognition technology has come a longway.However, next generation face recognition systems are going to have widespread application in smart environments-where computers and machines are more likely helpful to assistants.
  • 3. QUESTIONS AND ANSWERS 1. What are some of the benefits of using facial recognition technology?Describe some current and future applications of this technology. Some of the benefits of facial recognition technology are:  Increased Security: One of the biggest pros of facial recognition technology is that it enhances safety and security. From government agencies to personal use, there is an increasing demand for advanced security and surveillance systems. Organizations can easily identify and track anyone who comes onto the premises, and they can easily flag visitors who aren’t welcome. It can be very helpful when it comes to finding potential terrorists. Plus, there is no key, badge, or password that can be stolen or lost.  Fast and Accurate: With the ever-increasing demand for speed and the growing number of cyberattacks, having fast and accurate technology is key. Facial recognition technology provides verification that is convenient, quick, and accurate. Although possible, it is very difficult to fool facial recognition technology, which makes it beneficial in helping prevent fraud.  No Contact: Facial recognition is preferred over fingerprint scanning because of its non- contact process. People don’t have to worry about the potential drawbacks related to fingerprint identification technology, such as germs or smudges. Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial-tracking.Foe example, monitoring someone’s shopping habits as that person moves from physical store to store. The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers licenses, instruction permits,and ID cards are not issued under false names.Police can capture a 3D video and upload it to an image gallery for comparison to identify people with prior criminal records or outstanding warrants.
  • 4. 2.How does facial recognition technology threaten the protection of individual privacy? Facial analysis has progressed beyond scruitinizing static features.Frame by frame analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While these insights can drive productive endeavours,they are fraught with privacy implications.For example , do you want the person conducting the job interview to be able to review a videotape , identify fleeting moments of confusion or indecision and decide against hiring you. 3.Would you like deepface to track your activities on facebook and in the physical world? Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial-tracking.