BY SAGHIR HUSSAIN
ROLL NO:-162
DEPT:-CSE
ACADEMY OF TECHNOLOGY
 a. Finger-scan
 b. Facial Recognition
 c. Iris-scan
 d. Retina-scan
 e. Hand-scan
“80 nodal points” on a
human face.
Few nodal points are:
• Distance between the
eyes
• Width of the nose
• Depth of the eye
socket
• Cheekbones
• Jaw line
• Chin
1. Principal Component Analysis(PCA) based
eigenfaces
2. Linear Discriminate Analysis(LDA)
3. Elastic Bunch Graph Matching using
Fisherface Algorithm
4. Hidden Markov model
5. Neural Motivated Dynamic Link Matching
 The existing Face Recognition algorithms are
not 100% efficient yet.
The natural use of face recognition technology is the replacement of PIN.
1 Government Use:
a. Law Enforcement
b. Security/Counterterrorism
c. Immigration
d. Voter verification
2 Commercial Use:
a. Residential Security
d. Banking using ATM
c. Physical access control of buildings areas, doors, cars or net access.
ANY QUERY

FACE RECOGNITION SYSTEM PPT

  • 1.
    BY SAGHIR HUSSAIN ROLLNO:-162 DEPT:-CSE ACADEMY OF TECHNOLOGY
  • 3.
     a. Finger-scan b. Facial Recognition  c. Iris-scan  d. Retina-scan  e. Hand-scan
  • 9.
    “80 nodal points”on a human face. Few nodal points are: • Distance between the eyes • Width of the nose • Depth of the eye socket • Cheekbones • Jaw line • Chin
  • 11.
    1. Principal ComponentAnalysis(PCA) based eigenfaces 2. Linear Discriminate Analysis(LDA) 3. Elastic Bunch Graph Matching using Fisherface Algorithm 4. Hidden Markov model 5. Neural Motivated Dynamic Link Matching  The existing Face Recognition algorithms are not 100% efficient yet.
  • 13.
    The natural useof face recognition technology is the replacement of PIN. 1 Government Use: a. Law Enforcement b. Security/Counterterrorism c. Immigration d. Voter verification 2 Commercial Use: a. Residential Security d. Banking using ATM c. Physical access control of buildings areas, doors, cars or net access.
  • 15.