SlideShare a Scribd company logo
1 of 27
FACIAL
RECOGNITION
TECHNOLOGY
SUBMITED BY : PRIYABRATA MANSINGH
GUIDED BY : DR. SANGITA PAL(ASSISTANT PROFESSOR)
ROLL NO. :374032
REGD NO. :1805105032
SEMESTER :4TH
1
OUTLINE
 Introduction
 Biometrics
 Need of Facial Recognition
 Facial Recognition
 Implementation
 Working Principle
 Advantages & Disadvantages
 Applications
 Conclusion
 Reference
2
INTRODUCTION
 Everyday actions are increasingly being handled
electronically, instead of ink and paper or face to face.
 This growth in electronic transactions results in great demand
for fast and accurate user identification and authentication.
 Access codes for buildings, banks accounts and computer
systems often use PIN's for identification and security
clearances.
 Using the proper PIN gains access, but the user of the PIN is
not verified. When credit and ATM cards are lost or stolen, an
unauthorized user can often come up with the correct
personal codes.
 BIOMETRICS technology may solve this problem .
3
BIOMETRICS
 A biometric is a unique,
measurable characteristic of
a human being .
 used to automatically
recognize an individual or
verify an individual’s
identity.
 measure both physiological
and behavioral
characteristics.
4
Physiolosical Biometrics
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
5
6
Behavioral Biometrics
a.Voice-scan
b. Signature-scan
c. Keystroke-scan
7
Why We Choose Facial Recognition
There are number reasons to choose face recognition. This includes the
following :
 It requires no physical interaction on behalf of the user.
 It is accurate and allows for high enrolment and verification rates.
 It does not require an expert to interpret the comparison result.
 It can use your existing hardware infrastructure, existing camaras and
image capture Devices will work with no problems
 It is the only biometric that allow you to perform passive identification in
a one to Many environments (e.g.: identifying a terrorist in a busy Airport
terminal)
8
Facial Recognition
 For face recognition there are two types of comparisons
1. Verification.
This is where the system compares the given individual
with who that individual says they are and gives a yes or no
decision.
2. Identification.
This is where the system compares the given individual to
all the Other individuals in the database and gives a ranked list
of matches.
9
All identification or authentication
technologies operate
using the following four stages:
 Capture: A physical or behavioral sample is captured by the
system during Enrollment and also in identification or
verification process
 Extraction: Unique data is extracted from the sample and a
template is created.
 Comparison: The template is then compared with a new
sample.
 Match/non match: The system decides if the features
extracted from the new Samples are a match or a non match
10
11Capture
Extraction
Accept/
Project
Comparison
Match/
Non-
match
Components Of Face Recognition
Systems:
 Enrollment module : An automated mechanism that scans
and captures a digital or an analog image of a living personal
characteristics
 Database : Another entity which handles compression,
processing, storage and compression of the captured data
with stored data
 Identification module : The third interfaces with the
application system
12
13
Implementation
The implementation of face recognition technology
includes the following three stages:
 Data acquisition
 Input processing
 Face image classification and decision making
14
1.Data Acquisition:
The input can be recorded video of
the speaker or a still image. A sample
of 1 sec duration consists of a 25
frame video sequence. More than one
camera can be used to produce a 3D
representation of the face and to
protect against the usage of
photographs to gain unauthorized
access.
15
2.Input Processing:
 A pre-processing module locates the eye
position and takes care of the surrounding
lighting condition and colour variance. First
the presence of faces or face in a scene must
be detected. Once the face is detected, it must
be localized.
 Some facial recognition approaches use the
whole face while others concentrate on facial
components and/ or regions (such as lips,
eyes etc). The appearance of the face can
change considerably during speech and due
to facial expressions.
16
3.Face image classification and
decision making:
Synergetic computer are used to classify optical and audio features, respectively . A
synergetic computer is a set of algorithm that simulate synergetic phenomena. In
training phase the BIOID creates a prototype called face print for each person. A newly
recorded pattern is pre-processed and compared with each face print stored in the
database. As comparisons are made, the system assigns a value to the comparison
using a scale of one to ten. If a score is above a predetermined threshold, a match is
declared.
17
HOW FACE RECOGNITION SYSTEM WORK
 If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial features.
Software defines these landmarks as nodal points.
 There are about “80 nodal points” on a human face.
 Here are few nodal points that are measured by the software;
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
• chin
18
19
Face Bunch Graph:
 A Face bunch graph is created from “70 nodal points” to obtain a general
representation of face.
 Given an image the face is matched to the Face bunch graph to find the same point.
 These nodal points are measured to create a numerical code, a string of numbers
that represents a face in the database. This code is called face print.
 Only 14 to 22 nodal points are needed for faceit software to complete the
recognition process.
20
21
Advantages:
 There are many benefits to face recognition systems
such as its convenience and Social acceptability.
 Face recognition is easy to use and in many cases it
can be performed without a Person even knowing.
 Face recognition is also one of the most inexpensive
biometric in the market.
22
Disadvantages:
 Face recognition systems can not tell the difference
between identical twins.
 The illumination problem, the pose problem, scale
variability , images taken years apart, glasses,
moustaches, beards, low quality image acquisition,
partially occluded faces, etc.
 Privacy concern.
23
Applications:
 The natural use of face recognition technology is the replacement of PIN.
 Government Use:
a. Law Enforcement: Minimizing victim trauma verifying Identify for court records, and
comparing school surveillance camera images to know child molesters.
b. Security/Counterterrorism: Access control, comparing surveillance images to Know
terrorist.
c. Immigration: Rapid progression through Customs.
d. Voter verification: Where eligible politicians are required to verify their identity during
a voting process this is intended to stop “proxy‟ voting where the vote may not go as
expected.
 Commercial Use:
a. Residential Security: Alert homeowners of approaching personnel.
d. Banking using ATM: The software is able to quickly verify a customer’s face.
c. Physical access control of buildings areas, doors, cars or net access.
24
Conclusion:
Face recognition technologies have been associated generally
with very costly top secure applications. Today the core
technologies have evolved and the cost of equipment is going
down dramatically due to the integration and the increasing
processing power. Certain applications of face recognition
technology are now cost effective, reliable and highly accurate.
As a result there are no technological or financial barriers for
stepping from the pilot project to widespread deployment.
25
References:
 https://www.forbes.com/sites/bernardmarr/2019/08/19/facial-
recognition-technology-here-are-the-important-pros-and-
cons/#2d7a025f14d1
 https://timesofindia.indiatimes.com/topic/facial-recognition-
technology
26
THANK YOU…
27

More Related Content

What's hot

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition TechniquesDaksh Verma
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognitionrahulmonikasharma
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 

What's hot (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
face recognition
face recognitionface recognition
face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Facial Recognition Technology

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 

Similar to Facial Recognition Technology (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometrics
BiometricsBiometrics
Biometrics
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Facial Recognition Technology

  • 1. FACIAL RECOGNITION TECHNOLOGY SUBMITED BY : PRIYABRATA MANSINGH GUIDED BY : DR. SANGITA PAL(ASSISTANT PROFESSOR) ROLL NO. :374032 REGD NO. :1805105032 SEMESTER :4TH 1
  • 2. OUTLINE  Introduction  Biometrics  Need of Facial Recognition  Facial Recognition  Implementation  Working Principle  Advantages & Disadvantages  Applications  Conclusion  Reference 2
  • 3. INTRODUCTION  Everyday actions are increasingly being handled electronically, instead of ink and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances.  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  BIOMETRICS technology may solve this problem . 3
  • 4. BIOMETRICS  A biometric is a unique, measurable characteristic of a human being .  used to automatically recognize an individual or verify an individual’s identity.  measure both physiological and behavioral characteristics. 4
  • 5. Physiolosical Biometrics a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan 5
  • 6. 6
  • 8. Why We Choose Facial Recognition There are number reasons to choose face recognition. This includes the following :  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It does not require an expert to interpret the comparison result.  It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems  It is the only biometric that allow you to perform passive identification in a one to Many environments (e.g.: identifying a terrorist in a busy Airport terminal) 8
  • 9. Facial Recognition  For face recognition there are two types of comparisons 1. Verification. This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. 2. Identification. This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. 9
  • 10. All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process  Extraction: Unique data is extracted from the sample and a template is created.  Comparison: The template is then compared with a new sample.  Match/non match: The system decides if the features extracted from the new Samples are a match or a non match 10
  • 12. Components Of Face Recognition Systems:  Enrollment module : An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics  Database : Another entity which handles compression, processing, storage and compression of the captured data with stored data  Identification module : The third interfaces with the application system 12
  • 13. 13
  • 14. Implementation The implementation of face recognition technology includes the following three stages:  Data acquisition  Input processing  Face image classification and decision making 14
  • 15. 1.Data Acquisition: The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access. 15
  • 16. 2.Input Processing:  A pre-processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized.  Some facial recognition approaches use the whole face while others concentrate on facial components and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably during speech and due to facial expressions. 16
  • 17. 3.Face image classification and decision making: Synergetic computer are used to classify optical and audio features, respectively . A synergetic computer is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype called face print for each person. A newly recorded pattern is pre-processed and compared with each face print stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared. 17
  • 18. HOW FACE RECOGNITION SYSTEM WORK  If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Software defines these landmarks as nodal points.  There are about “80 nodal points” on a human face.  Here are few nodal points that are measured by the software; • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line • chin 18
  • 19. 19
  • 20. Face Bunch Graph:  A Face bunch graph is created from “70 nodal points” to obtain a general representation of face.  Given an image the face is matched to the Face bunch graph to find the same point.  These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print.  Only 14 to 22 nodal points are needed for faceit software to complete the recognition process. 20
  • 21. 21
  • 22. Advantages:  There are many benefits to face recognition systems such as its convenience and Social acceptability.  Face recognition is easy to use and in many cases it can be performed without a Person even knowing.  Face recognition is also one of the most inexpensive biometric in the market. 22
  • 23. Disadvantages:  Face recognition systems can not tell the difference between identical twins.  The illumination problem, the pose problem, scale variability , images taken years apart, glasses, moustaches, beards, low quality image acquisition, partially occluded faces, etc.  Privacy concern. 23
  • 24. Applications:  The natural use of face recognition technology is the replacement of PIN.  Government Use: a. Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school surveillance camera images to know child molesters. b. Security/Counterterrorism: Access control, comparing surveillance images to Know terrorist. c. Immigration: Rapid progression through Customs. d. Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop “proxy‟ voting where the vote may not go as expected.  Commercial Use: a. Residential Security: Alert homeowners of approaching personnel. d. Banking using ATM: The software is able to quickly verify a customer’s face. c. Physical access control of buildings areas, doors, cars or net access. 24
  • 25. Conclusion: Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment. 25