SlideShare a Scribd company logo
1 of 3
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 04 Issue: 02 December 2015 Page No.100-102
ISSN: 2278-2389
100
Facial Feature Recognition Using Biometrics
Brindha T,MS Josephine
Research scholar,Dr MGR Research institute and Educational University,Maduravoyal, Chennai
Prof Dept of MCA,Dr MGR Research institute and Educational University,Maduravoyal, Chennai
brindhatsambandam@gmail.com
Abstract-Face recognition is one of the few biometric methods
that possess the merits of both high accuracy and low
intrusiveness. Biometric requires no physical interaction on
behalf of the user. Biometric allows to perform passive
identification in a one to many environments. Passwords and
PINs are hard to remember and can be stolen or guessed;
cards, tokens, keys and the like can be misplaced, forgotten,
purloined or duplicated; magnetic cards can become corrupted
and unreadable. However individuals biological traits cannot
be misplaced, forgotten, stolen or forged.
Keywords— Face recognition, low intrusiveness, corrupted,
Pins
I. INTRODUCTION
Face recognition is not perfect and struggles to perform under
certain condition. A researcher at the Carnegie Mellon
Robotics Institute, describe one obstacle “Face recognition has
been getting pretty good at full frontal faces and 20 degrees
off, but as soon as u go towards profile, there have been
problems”.Other conditions where face recognition does not
work will include poor lighting, sunglasses, long hair or other
objects partially covering the subjects face and low resolution
images. Another serious disadvantage is that many systems are
less effective if facial expressions vary. The effectiveness is
critics of the technology complain that the London borough of
New ham giving disappointing results. User interface captures
the analog or digital image of the persons face. In the
enrollment module the obtained sample is preprocessed and
analyzed. This analyzed data is stored in the database for the
purpose of future comparison.As compared with other
biometrics systems using finger print/palm print and iris, face
recognition has distinct advantages because of its non-contact
process. Face images can be captured from a distance without
touching the person being identified and the identification
does not require interacting with the person. It uses existing
hardware infrastructure, existing cameras and image capture.
Devices will work with no problems. In addition, face
recognition serves the crime deter rant purpose because face
images that have been recorded and archived can later help
identify a person.Face recognition technology may solve this
problem since a face is undeniably connected to its owner
except in the case of identical twins. It’s non-transferable. The
system can then compare scans to records stored in a central or
local database or even on a smart card.
Face recognition is one of the few biometric methods that
possess the merits of both high accuracy and low
intrusiveness. From time to time we hear about the crimes of
credit card, fraud, and computer break-ins by hackers, security
breaches in a company or government building. In the year
1998, sophisticated cyber crooks caused well over US$100
million in losses. In most of these crimes, the criminals were
aware taking advantage of a fundamental flaw in the
conventional access control systems. The systems do not grant
access by “who we are”, but by “what we have”, such as ID
cards, keys, passwords, PIN numbers, or mother’s maiden
name. None of these means really define us. Rather, it is a
means to authenticate us. This technology is based in a field
called “biometrics”. Biometric access control are automated
methods of verifying or recognizing the identity of a living
person on the basis of some physiological characteristics, such
as finger prints or facial features, or some aspects of the
persons behavior like his/her handwriting style or key stroke
patterns. Since biometric systems identify a person by
biological characteristic they are difficult to forge.A biometric
is a unique, measurable characteristic of a human being that
can be used to automatically recognize an individual or verify
an individual’s identity. Biometrics can measure both
physiological and behavioral characteristics. Physiological
biometrics (based on measurements and data derived from
direct measurement of a part of the human body) include:
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
Behavioral biometrics (based on measurements and data
derived from an action) include:
a. Voice-scan
b. Signature-scan
c. Keystroke-scan
A “biometric system” refers to the integrated hardware and
software used to conduct biometric identification or
verification. Anonymously and passively captures passenger’s
facial features as they enter airport and then tracks them
through their journey. Face recognition is one of the few
biometric methods that possess the merits of both high
accuracy and low intrusiveness.
II. FACE RECOGNITION OVER OTHER
BIOMETRIC
In this section we review the features that are used for face
recognition section 2 discusses the face for recognition.
A. Face recognition features
There are number reasons to choose face recognition. This
includes the following
a. It requires no physical interaction on behalf of the user.
b. It is accurate and allows for high enrolment and verification
rates.
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 04 Issue: 02 December 2015 Page No.100-102
ISSN: 2278-2389
101
c. It does not require an expert to interpret the comparison
result.
d. It can use your existing hardware infrastructure, existing
cameras and image capture
Devices will work with no problems
e. It is the only biometric that allow you to perform passive
identification in a one to many environments (e.g.: identifying
a terrorist in a busy Airport terminal). People are more
comfortable signing their names or speaking to a microphone
than placing their eyes before a scanner or giving a drop of
blood for DNA sequencing. Passwords and PIN’s are hard to
remember and can be stolen or guessed; cards, tokens, keys
and the like can be misplaced, forgotten , purloined or
duplicated; magnetic cards can become corrupted and
unreadable. However, and individual’s biological traits cannot
be misplaced, forgotten, stolen or forged.
a. b. c.
d e. f.
Figure 1. Face for recognition
The facial identification is based on facial features left eye
and the right eye, eyebrow, position of the nose, position of
the mouth, chin shape, face width at nose position and face
width halfway between nose tip and eyes. Figure 1 shows the
features for recognition.Biometric based technologies include
identification based on physiological characteristics (such as
face, fingerprints, finger geometry, hand geometry, hand veins,
palm iris, retina, ear and voice) and behavioral traits (such as
gait, signature and key stroke dynamics).Face recognition
appears to offer several advantages over other biometric
methods, a few of which are outlined here: all the technologies
require voluntary action by the user.As compared with other
biometrics systems using finger print/palm and iris face
recognition has distinct advantages because of its non-contact
process. Face images can be captured from a distance without
touching the person being identified and the identification
does not require interacting with the person. In addition, face
recognition serves the crime deterrent purpose because face
images that have been recorded and archived can later help
identify a person.Anonymously and passively captures
passenger’s facial features as they enter airport and then tracks
them through their journey. Face recognition is one of the few
biometric methods that possess the merits of both high
accuracy and low intrusiveness.
a. b. c.
d. e. f.
Figure 2. Features of the face
The figure 2 includes facial features of different persons.
Figure 2 a. showing a female having front fore head with
hair.The figure 2b. with person with hair at front and having
spectacles worn. Figure 2 c. having bald at front face.Figure
2d. showing the face of a male having bulged chin.Figure 2e.
showing the face of male with thick spectacles. Figure 2 f.
showing the person of male with hair at forehead .From time
to time we hear about the crimes of credit card, fraud, and
computer break-in-ins by hackers, security breaches in a
company or government building in the year 1998,
sophisticated cyber crooks caused well over US$100 million
in loss. In most of these crimes, the criminals were taking
advantage of a fundamental flaw in the conventional access
control systems. The systems do not grant access by “who we
are “, but by “ what we have”, such as ID cards, keys,
passwords, PIN numbers or mother’s maiden name. None of
these means really define us. Rather, it is a means to
authenticate us. This technology is based in a field called
“biometrics”. Biometric access control are automated methods
of verifying or recognizing living person on the basis of some
physiological characteristics, such as finger prints or facial
features , or some aspects of the persons behaviour like his/
her handwriting style or key stroke patterns. Since biometric
systems identify a person by biological characteristic they are
difficult to forge.
B. Use face for recognition
People are more comfortable signing their names or speaking
to a microphone than placing their eyes before a scanner or
giving a drop of blood for DNA sequencing. Passwords and
PIN’s are hard to remember and can be stolen or guessed;
cards, tokens, keys, and the like can be misplaced, forgotten,
purloined or duplicated; magnetic cards can become corrupted
and unreadable. However, an individual’s biological traits
cannot be misplaced, forgotten, stolen or forged.Face
recognition appears to offer several advantages over other
biometric methods, a few of which are outlined here: All the
technologies require voluntary action by the user. The human
face plays an important role in our social interaction,
conveying people’s identity. Using the human face as a key to
security, biometric face recognition technology has received
significant attention in the past several years due to its
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 04 Issue: 02 December 2015 Page No.100-102
ISSN: 2278-2389
102
potential for a wide variety of applications in law enforcement
and non-law enforcement.As compared with other biometrics
systems using finger print/palm print & iris face recognition
has distinct advantages because of its non-contact process.
Face images can be captured from a distance without touching
the person being identified, and the identification does not
require interacting with the person being identified, and the
identification does not require interacting with the person. In
addition, face recognition serves the crime deterrant purpose
because face images that have been recorded and archived can
later help identify a person.Biometric can measure both
physiological and behavioral characteristics. Face recognition
technologies have been associated generally with every costly
top secure applications. Today the core technologies have
evolved and the cost of equipment’s is going down due to the
increasing processing power. Certain applications of face
recognition technology are now cost effective, reliable and
highly accurate.
III. CONCLUSION
This paper discusses the unique measurable characteristic of a
human being that can be used automatically recognize an
individual or verify an individual’s identity. Face recognition
technologies have been associated generally with every costly
top secure applications. In pattern recognition the feature
extraction is one technique that is widely deployed due to its
user friendliness.
REFERENCES
[1] Jain ,A.K.,Kumar,A.,2012 Biometric recognition: An overview, in :
my ordim,E .,Tzovaras, D.(Eds), second generation Biometric: The
ethical, legal and social context. Springer Netherlands Volume II of
The International Library of Ethics, Law and Technology, pp 49-79.
[2] Math Works MATLAB, 2013. Computer Vision System Toolbox:
2013b - Video Stabilization Using Point Feature Matching. The Math
Works Inc., Natick, Massachusetts, United States.
[3] T Wang, P Shi, Kernel Grassmannian distances and discriminant
analysis for face recognition from image sets. Pattern Recogn.Lett.
30(13), 1161-1165(2009)
[4] K Koh, SJ Kim, S Boyd, l1_ls: simple Mat lab solver for l1-
regularized least squares
problems,(2008).http://www.stanford.edu/~boyd/l1_ls/.Accessed 13
January 2014
[5] K Fukui,O Yamaguchi, Face recognition using multi-viewpoint
patterns for robot vision, in Robotics Research, ed. By Dario, R Chatila
(Springer, Heidelberg, 2005), pp.192-201
[6] Zhifeng Li, Member, IEEE, Unsang Park and Anil K.Jain ‘A
Discriminative Model for Age Invariant Face Recognition’
[7] Young H.Kwon and Niels da Victoria Lobo ‘Age Classification from
Facial Images’

More Related Content

Similar to Facial Feature Recognition Using Biometrics

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de  Reconnaissance faciale - eigenfaces, fisherfaces et lbphApplication de  Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbphSarra ERRREGUI
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameterijtsrd
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systemsnishiyath
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 

Similar to Facial Feature Recognition Using Biometrics (20)

Shamaas
ShamaasShamaas
Shamaas
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de  Reconnaissance faciale - eigenfaces, fisherfaces et lbphApplication de  Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
H029044050
H029044050H029044050
H029044050
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systems
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

More from ijbuiiir1

Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...ijbuiiir1
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoisingijbuiiir1
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...ijbuiiir1
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...ijbuiiir1
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Modelijbuiiir1
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...ijbuiiir1
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networksijbuiiir1
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...ijbuiiir1
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...ijbuiiir1
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeijbuiiir1
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transformijbuiiir1
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Schedulingijbuiiir1
 

More from ijbuiiir1 (20)

Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBee
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet SchedulingInternet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
Internet Scheduling of Bluetooth Scatter Nets By Inter Piconet Scheduling
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Facial Feature Recognition Using Biometrics

  • 1. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 04 Issue: 02 December 2015 Page No.100-102 ISSN: 2278-2389 100 Facial Feature Recognition Using Biometrics Brindha T,MS Josephine Research scholar,Dr MGR Research institute and Educational University,Maduravoyal, Chennai Prof Dept of MCA,Dr MGR Research institute and Educational University,Maduravoyal, Chennai brindhatsambandam@gmail.com Abstract-Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. Biometric requires no physical interaction on behalf of the user. Biometric allows to perform passive identification in a one to many environments. Passwords and PINs are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However individuals biological traits cannot be misplaced, forgotten, stolen or forged. Keywords— Face recognition, low intrusiveness, corrupted, Pins I. INTRODUCTION Face recognition is not perfect and struggles to perform under certain condition. A researcher at the Carnegie Mellon Robotics Institute, describe one obstacle “Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as u go towards profile, there have been problems”.Other conditions where face recognition does not work will include poor lighting, sunglasses, long hair or other objects partially covering the subjects face and low resolution images. Another serious disadvantage is that many systems are less effective if facial expressions vary. The effectiveness is critics of the technology complain that the London borough of New ham giving disappointing results. User interface captures the analog or digital image of the persons face. In the enrollment module the obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose of future comparison.As compared with other biometrics systems using finger print/palm print and iris, face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified and the identification does not require interacting with the person. It uses existing hardware infrastructure, existing cameras and image capture. Devices will work with no problems. In addition, face recognition serves the crime deter rant purpose because face images that have been recorded and archived can later help identify a person.Face recognition technology may solve this problem since a face is undeniably connected to its owner except in the case of identical twins. It’s non-transferable. The system can then compare scans to records stored in a central or local database or even on a smart card. Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. From time to time we hear about the crimes of credit card, fraud, and computer break-ins by hackers, security breaches in a company or government building. In the year 1998, sophisticated cyber crooks caused well over US$100 million in losses. In most of these crimes, the criminals were aware taking advantage of a fundamental flaw in the conventional access control systems. The systems do not grant access by “who we are”, but by “what we have”, such as ID cards, keys, passwords, PIN numbers, or mother’s maiden name. None of these means really define us. Rather, it is a means to authenticate us. This technology is based in a field called “biometrics”. Biometric access control are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics, such as finger prints or facial features, or some aspects of the persons behavior like his/her handwriting style or key stroke patterns. Since biometric systems identify a person by biological characteristic they are difficult to forge.A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include: a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan Behavioral biometrics (based on measurements and data derived from an action) include: a. Voice-scan b. Signature-scan c. Keystroke-scan A “biometric system” refers to the integrated hardware and software used to conduct biometric identification or verification. Anonymously and passively captures passenger’s facial features as they enter airport and then tracks them through their journey. Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. II. FACE RECOGNITION OVER OTHER BIOMETRIC In this section we review the features that are used for face recognition section 2 discusses the face for recognition. A. Face recognition features There are number reasons to choose face recognition. This includes the following a. It requires no physical interaction on behalf of the user. b. It is accurate and allows for high enrolment and verification rates.
  • 2. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 04 Issue: 02 December 2015 Page No.100-102 ISSN: 2278-2389 101 c. It does not require an expert to interpret the comparison result. d. It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems e. It is the only biometric that allow you to perform passive identification in a one to many environments (e.g.: identifying a terrorist in a busy Airport terminal). People are more comfortable signing their names or speaking to a microphone than placing their eyes before a scanner or giving a drop of blood for DNA sequencing. Passwords and PIN’s are hard to remember and can be stolen or guessed; cards, tokens, keys and the like can be misplaced, forgotten , purloined or duplicated; magnetic cards can become corrupted and unreadable. However, and individual’s biological traits cannot be misplaced, forgotten, stolen or forged. a. b. c. d e. f. Figure 1. Face for recognition The facial identification is based on facial features left eye and the right eye, eyebrow, position of the nose, position of the mouth, chin shape, face width at nose position and face width halfway between nose tip and eyes. Figure 1 shows the features for recognition.Biometric based technologies include identification based on physiological characteristics (such as face, fingerprints, finger geometry, hand geometry, hand veins, palm iris, retina, ear and voice) and behavioral traits (such as gait, signature and key stroke dynamics).Face recognition appears to offer several advantages over other biometric methods, a few of which are outlined here: all the technologies require voluntary action by the user.As compared with other biometrics systems using finger print/palm and iris face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified and the identification does not require interacting with the person. In addition, face recognition serves the crime deterrent purpose because face images that have been recorded and archived can later help identify a person.Anonymously and passively captures passenger’s facial features as they enter airport and then tracks them through their journey. Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. a. b. c. d. e. f. Figure 2. Features of the face The figure 2 includes facial features of different persons. Figure 2 a. showing a female having front fore head with hair.The figure 2b. with person with hair at front and having spectacles worn. Figure 2 c. having bald at front face.Figure 2d. showing the face of a male having bulged chin.Figure 2e. showing the face of male with thick spectacles. Figure 2 f. showing the person of male with hair at forehead .From time to time we hear about the crimes of credit card, fraud, and computer break-in-ins by hackers, security breaches in a company or government building in the year 1998, sophisticated cyber crooks caused well over US$100 million in loss. In most of these crimes, the criminals were taking advantage of a fundamental flaw in the conventional access control systems. The systems do not grant access by “who we are “, but by “ what we have”, such as ID cards, keys, passwords, PIN numbers or mother’s maiden name. None of these means really define us. Rather, it is a means to authenticate us. This technology is based in a field called “biometrics”. Biometric access control are automated methods of verifying or recognizing living person on the basis of some physiological characteristics, such as finger prints or facial features , or some aspects of the persons behaviour like his/ her handwriting style or key stroke patterns. Since biometric systems identify a person by biological characteristic they are difficult to forge. B. Use face for recognition People are more comfortable signing their names or speaking to a microphone than placing their eyes before a scanner or giving a drop of blood for DNA sequencing. Passwords and PIN’s are hard to remember and can be stolen or guessed; cards, tokens, keys, and the like can be misplaced, forgotten, purloined or duplicated; magnetic cards can become corrupted and unreadable. However, an individual’s biological traits cannot be misplaced, forgotten, stolen or forged.Face recognition appears to offer several advantages over other biometric methods, a few of which are outlined here: All the technologies require voluntary action by the user. The human face plays an important role in our social interaction, conveying people’s identity. Using the human face as a key to security, biometric face recognition technology has received significant attention in the past several years due to its
  • 3. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 04 Issue: 02 December 2015 Page No.100-102 ISSN: 2278-2389 102 potential for a wide variety of applications in law enforcement and non-law enforcement.As compared with other biometrics systems using finger print/palm print & iris face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified, and the identification does not require interacting with the person being identified, and the identification does not require interacting with the person. In addition, face recognition serves the crime deterrant purpose because face images that have been recorded and archived can later help identify a person.Biometric can measure both physiological and behavioral characteristics. Face recognition technologies have been associated generally with every costly top secure applications. Today the core technologies have evolved and the cost of equipment’s is going down due to the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. III. CONCLUSION This paper discusses the unique measurable characteristic of a human being that can be used automatically recognize an individual or verify an individual’s identity. Face recognition technologies have been associated generally with every costly top secure applications. In pattern recognition the feature extraction is one technique that is widely deployed due to its user friendliness. REFERENCES [1] Jain ,A.K.,Kumar,A.,2012 Biometric recognition: An overview, in : my ordim,E .,Tzovaras, D.(Eds), second generation Biometric: The ethical, legal and social context. Springer Netherlands Volume II of The International Library of Ethics, Law and Technology, pp 49-79. [2] Math Works MATLAB, 2013. Computer Vision System Toolbox: 2013b - Video Stabilization Using Point Feature Matching. The Math Works Inc., Natick, Massachusetts, United States. [3] T Wang, P Shi, Kernel Grassmannian distances and discriminant analysis for face recognition from image sets. Pattern Recogn.Lett. 30(13), 1161-1165(2009) [4] K Koh, SJ Kim, S Boyd, l1_ls: simple Mat lab solver for l1- regularized least squares problems,(2008).http://www.stanford.edu/~boyd/l1_ls/.Accessed 13 January 2014 [5] K Fukui,O Yamaguchi, Face recognition using multi-viewpoint patterns for robot vision, in Robotics Research, ed. By Dario, R Chatila (Springer, Heidelberg, 2005), pp.192-201 [6] Zhifeng Li, Member, IEEE, Unsang Park and Anil K.Jain ‘A Discriminative Model for Age Invariant Face Recognition’ [7] Young H.Kwon and Niels da Victoria Lobo ‘Age Classification from Facial Images’