SlideShare a Scribd company logo
1 of 26
PRESENTATION OUTCOMES
• What is face Recognition?
• How facial recognition works ?
• Face detection and recognition.
• Different approaches of face Recognition.
– Feature extraction methods
– Holistic methods
– Hybrid methods
• Problems
• Applications Available in Market
ABSTRACT
• Images play an important role in todays information because A
single image represents a thousand words.
• Google's image search, where we can easily search for images
using keywords.
Getting the computer to understand the semantics inside of images
isn't easy. The reason for this is simply because the computer isn't
able to understand the context.
Find the human face in the display as fast as you can. Ready?
Now find the animal face. Ready?
• Getting the computer to understand
the semantics inside of images isn't
easy. The reason for this is simply
because the computer isn't able to
understand the context.
KEYWORDS
Face Detection
Face Recognition
face interface v.2a 8
Face detection Face recognition
Face database
Face Detection and Face Recognition
HOW FACIAL RECOGNITION WORKS ?
FACE DETECTION + RECOGNITION
• Detection accuracy affects the recognition
stage
• Key issues:
– Correct location of key facial features
(e.g. the eye corners)
– False detection
– Missed detection
DIFFERENT APPROACHE
• Describe the different methods of face
recognition.
– Feature extraction methods
– Holistic methods
– Hybrid methods
1. FEATURE EXTRACTION METHODS
• Feature extraction is the task where we locate
facial features,
– Eg: the eyes, the nose, and the chins etc.
This task may be performed after the face detection task Or
recognition time.
• big challenge for feature extraction methods is feature
“restoration“.
– Facial features are invisible according to the large variation.
FEATURE EXTRACTION METHODS
• This method is widely used to create
individual vectors for each person in a
system, the vectors are matched when an
input image is being recognized.
Kanade's APPROACH
2. HOLISTIC METHODS
• Holistic methods uses the whole face region as
the input to a recognition system.
• focuses a holistic method using eigenfaces to
recognize still faces.
FACE RECOGNITION USING EIGENFACES
1. The first stage is to insert a set of images into a database, these images are
called the training set, this is because they will be used when we compare
images and when we create the eigenfaces.
2. The second stage is to create the eigenfaces. Eigenfaces can now be extracted
from the image data
3. When the eigenfaces have been created, each image will be represented as a
vector of weights.
4. The system is now ready to accept incoming queries.
FACE RECOGNITION USING EIGENFACES
5. The weight of the incoming unknown image is found and then
compared to the weights of those already in the system. If the input
image's weight is over a given threshold it is considered to be
unknown. The identification of the input image is done by finding the
image in the database whose weights are the closest to the weights of
the input image. The image in the database with the closest weight
will be returned as a hit to the user of the system.
3. HYBRID METHODS
• Hybrid face recognition systems uses a combination of both
holistic and feature extraction methods.
• Hybrid method of face recognition by using 3D model. The
model makes it possible to change the pose and the
illumination on the face.
3D MORPHABLE MODEL
• Took face recognition to a new level. By being
able to use a morphable 3D model to create
synthetic images has proven to give good
results. It is a very applicable approach that
solves many of the problems.
system achieved a recognition rate
of 90%.
Problems of Face Recognition
• when comparing a database image with an input image.
The main concern is of course that all images of the same
face are heterogeneous.
• When image databases are created they contain good
scenario images.
• concerning deferent facial
expressions as well. The system
must be able to know that two
images of the same person with
deferent facial expressions actually
is the same person. Makeup, posing
positions, illumination conditions,
and comparing images of the same
person with and without glasses.
• Fastest and safest method of tracking
employee time and attendance.
• Easy to install and use.
• Cost saving and convenient way of time
tracking.
• Provide easy and efficient way of recording
attendance.
• Easily manage employee time and attendance
profiles.
• Get rid of buddy punching.
• Also manage employee payroll record.
• On-demand time attendance record for
reference.
• Easily customizable as per your requirement.
Applications Available in Market
 Face Recognition based Time Attendance System
Applications Available in Market
 Access Control System
• Convenient and secure method of controlling
door entry
• Authentication by Facial Biometrics to gain
entry
• Higher security than conventional systems
• No keys or cards to carry
• No need to issue keys or cards for every user
• Accurate recording of arrivals and departures
• Real time monitoring of door access
• Intelligent access control by group or time
schedule
Applications Available in Market
 Facial Recognition PC Security
Logon provides a simple but effective
option. The integration of Logon and PC
camera provides access only when a live-fed
face image of authorized user is
detected, thus effectively preventing
unauthorized access. Logon is a non-invasive
technology that does not require physical
contact.
Applications Available in Market
 Face Biometric Login Through Web
• Embeddable in any web page
• Global Face Authentication capability
• Free version available
• View of authenticated clients
• Messaging to Clients possible
• Remote Backup/Restore
 Google's Picasa, Facebook
 Facial Recognition Software in
Online Gaming and Crime Prevention
THANK YOU

More Related Content

What's hot

Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCVVasile Chelban
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Facel expression recognition
Facel expression recognitionFacel expression recognition
Facel expression recognitionMintoo Jakhmola
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detectionSaurabh Sutone
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfacesadique_ghitm
 
Build up and tune PC website(prototype)
Build up and tune PC website(prototype)Build up and tune PC website(prototype)
Build up and tune PC website(prototype)Saurabh Sutone
 

What's hot (12)

Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCV
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Facel expression recognition
Facel expression recognitionFacel expression recognition
Facel expression recognition
 
Week6 face detection
Week6 face detectionWeek6 face detection
Week6 face detection
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detection
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
Face detection
Face detectionFace detection
Face detection
 
Final ppt
Final pptFinal ppt
Final ppt
 
Build up and tune PC website(prototype)
Build up and tune PC website(prototype)Build up and tune PC website(prototype)
Build up and tune PC website(prototype)
 
new tesring resume.
new tesring resume.new tesring resume.
new tesring resume.
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsInvestorideas.com
 
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUESINTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUESChirag Jain
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Sudhanshu Saxena
 
Face Detection
Face DetectionFace Detection
Face DetectionAmr Sheta
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Suvadip Shome
 
Mindolia- Facial Recognition - Pitch deck
Mindolia- Facial Recognition - Pitch deckMindolia- Facial Recognition - Pitch deck
Mindolia- Facial Recognition - Pitch deckMostapha Benhenda
 
Face Recognition on MATLAB
Face Recognition on MATLABFace Recognition on MATLAB
Face Recognition on MATLABMukesh Taneja
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABSindhi Madhuri
 
Face Detection
Face DetectionFace Detection
Face Detectionamar kakde
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognitionDerek Budde
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 

Viewers also liked (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUESINTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUES
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
 
Mindolia- Facial Recognition - Pitch deck
Mindolia- Facial Recognition - Pitch deckMindolia- Facial Recognition - Pitch deck
Mindolia- Facial Recognition - Pitch deck
 
Face Recognition on MATLAB
Face Recognition on MATLABFace Recognition on MATLAB
Face Recognition on MATLAB
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 

Similar to Face recognition

Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Attendance system using Face recognition
Attendance system using Face recognition Attendance system using Face recognition
Attendance system using Face recognition PavanEluri2
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation Sandeep Garg
 
Real Time Image Based Attendance System using Python
Real Time Image Based Attendance System using PythonReal Time Image Based Attendance System using Python
Real Time Image Based Attendance System using PythonIRJET Journal
 

Similar to Face recognition (20)

Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Attendance system using Face recognition
Attendance system using Face recognition Attendance system using Face recognition
Attendance system using Face recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
 
Real Time Image Based Attendance System using Python
Real Time Image Based Attendance System using PythonReal Time Image Based Attendance System using Python
Real Time Image Based Attendance System using Python
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Face recognition

  • 1.
  • 2. PRESENTATION OUTCOMES • What is face Recognition? • How facial recognition works ? • Face detection and recognition. • Different approaches of face Recognition. – Feature extraction methods – Holistic methods – Hybrid methods • Problems • Applications Available in Market
  • 3. ABSTRACT • Images play an important role in todays information because A single image represents a thousand words. • Google's image search, where we can easily search for images using keywords. Getting the computer to understand the semantics inside of images isn't easy. The reason for this is simply because the computer isn't able to understand the context.
  • 4. Find the human face in the display as fast as you can. Ready?
  • 5. Now find the animal face. Ready?
  • 6. • Getting the computer to understand the semantics inside of images isn't easy. The reason for this is simply because the computer isn't able to understand the context.
  • 8. face interface v.2a 8 Face detection Face recognition Face database Face Detection and Face Recognition
  • 10. FACE DETECTION + RECOGNITION • Detection accuracy affects the recognition stage • Key issues: – Correct location of key facial features (e.g. the eye corners) – False detection – Missed detection
  • 11. DIFFERENT APPROACHE • Describe the different methods of face recognition. – Feature extraction methods – Holistic methods – Hybrid methods
  • 12. 1. FEATURE EXTRACTION METHODS • Feature extraction is the task where we locate facial features, – Eg: the eyes, the nose, and the chins etc. This task may be performed after the face detection task Or recognition time. • big challenge for feature extraction methods is feature “restoration“. – Facial features are invisible according to the large variation.
  • 13. FEATURE EXTRACTION METHODS • This method is widely used to create individual vectors for each person in a system, the vectors are matched when an input image is being recognized.
  • 15. 2. HOLISTIC METHODS • Holistic methods uses the whole face region as the input to a recognition system. • focuses a holistic method using eigenfaces to recognize still faces.
  • 16. FACE RECOGNITION USING EIGENFACES 1. The first stage is to insert a set of images into a database, these images are called the training set, this is because they will be used when we compare images and when we create the eigenfaces. 2. The second stage is to create the eigenfaces. Eigenfaces can now be extracted from the image data 3. When the eigenfaces have been created, each image will be represented as a vector of weights. 4. The system is now ready to accept incoming queries.
  • 17. FACE RECOGNITION USING EIGENFACES 5. The weight of the incoming unknown image is found and then compared to the weights of those already in the system. If the input image's weight is over a given threshold it is considered to be unknown. The identification of the input image is done by finding the image in the database whose weights are the closest to the weights of the input image. The image in the database with the closest weight will be returned as a hit to the user of the system.
  • 18. 3. HYBRID METHODS • Hybrid face recognition systems uses a combination of both holistic and feature extraction methods. • Hybrid method of face recognition by using 3D model. The model makes it possible to change the pose and the illumination on the face.
  • 19. 3D MORPHABLE MODEL • Took face recognition to a new level. By being able to use a morphable 3D model to create synthetic images has proven to give good results. It is a very applicable approach that solves many of the problems. system achieved a recognition rate of 90%.
  • 20. Problems of Face Recognition • when comparing a database image with an input image. The main concern is of course that all images of the same face are heterogeneous. • When image databases are created they contain good scenario images.
  • 21. • concerning deferent facial expressions as well. The system must be able to know that two images of the same person with deferent facial expressions actually is the same person. Makeup, posing positions, illumination conditions, and comparing images of the same person with and without glasses.
  • 22. • Fastest and safest method of tracking employee time and attendance. • Easy to install and use. • Cost saving and convenient way of time tracking. • Provide easy and efficient way of recording attendance. • Easily manage employee time and attendance profiles. • Get rid of buddy punching. • Also manage employee payroll record. • On-demand time attendance record for reference. • Easily customizable as per your requirement. Applications Available in Market  Face Recognition based Time Attendance System
  • 23. Applications Available in Market  Access Control System • Convenient and secure method of controlling door entry • Authentication by Facial Biometrics to gain entry • Higher security than conventional systems • No keys or cards to carry • No need to issue keys or cards for every user • Accurate recording of arrivals and departures • Real time monitoring of door access • Intelligent access control by group or time schedule
  • 24. Applications Available in Market  Facial Recognition PC Security Logon provides a simple but effective option. The integration of Logon and PC camera provides access only when a live-fed face image of authorized user is detected, thus effectively preventing unauthorized access. Logon is a non-invasive technology that does not require physical contact.
  • 25. Applications Available in Market  Face Biometric Login Through Web • Embeddable in any web page • Global Face Authentication capability • Free version available • View of authenticated clients • Messaging to Clients possible • Remote Backup/Restore  Google's Picasa, Facebook  Facial Recognition Software in Online Gaming and Crime Prevention