SlideShare a Scribd company logo
1 of 25
Head of department
-Sabina Ansari
Case study teacher
-Priyanka pawar
LAXMAN DEVRAM SONAWANE
COLLEGE
Case study
on
Face recognition in
e-attendance
Overview
Introduction History
What are
biometrics
Why we
choose face
recognition
over other
biometrics
What is face
recognition
Components
of face
recognition
How facial
recognition
system works
Where face
recognition
technology is
used
Future of face
recognition
Introduction
• In today's networked world, the need to maintain the security of
information or physical property is becoming both increasingly
important and increasingly difficult.
• Face recognition is one of the few biometric methods that possess the
merits of both high accuracy & Complex and largely software based
technique.
• Analyze unique shape, pattern & positioning of facial features.
• It compare scans to records stored in central or local database or
even on a smart card.
History
• The first attempts to use face recognition began in the 1960’s with a
semi-automated system.
• Marks were made on photographs to locate the major features; it
used features such as eyes, ears, noses, and mouths.
• Then distances and ratios were computed from these marks to a
common reference point and compared to reference data.
• In 1970s, Goldstein and Harmon used 21 specific subjective markers
such as hair color and lip thickness to automate the recognition.
• This proved even harder to automate due to the subjective nature of
many of the measurements still made completely by hand.
What are biometrics
• A biometric is a unique, measurable
characteristic of a human being that
Can be used to automatically recognize
an individual or verify an individual’s
identity.
Biometrics can measure both physiological and behavioral
characteristics –
• Physiological biometrics:- This types of biometrics is based on
measurements and data derived from direct measurement of a part
of the human body.
• Behavioral biometrics:- This types of biometrics is based on
measurements and data derived from an action.
Types of biometrics
PHYSIOLOGICAL BEHAVIORAL
 Finger-scan Voice-scan
 Facial Recognition Signature-scan
 Iris-scan Keystroke-scan
 Retina-scan
 Hand-scan
Why we choose face recognition over other biometrics
• It requires no physical interaction on behalf of user.
• It is accurate and allows for high enrolment and verification.
• Not require an expert to interpret the comparison result.
• It can use your existing hardware infrastructure, existing cameras and
image capture, devices will work with no problems.
• It is the only biometric that allow you to perform passive identification
in one to Many environments (e.g.: identifying a terrorist in a busy
Airport terminal.
What is face recognition
• Face recognition is one of the few
biometric methods that possess the
merits of both high accuracy and low
intrusiveness.
• A facial recognition system is a computer application for
automatically identifying or verifying a person from a digital
image from the source, One of the ways to do this is by comparing
selected facial features from the image and a facial database.
• Detection – two-class classification.
• Face vs. Non-face.
• Recognition – multi-class classification.
• One person vs. all the others.
Difference between face detection and recognition
Two types of comparison in face recognition
• Face Verification: The system compares a face image that might not
belong to the database, verify whether it is from the person it is
claimed to be in the database.
• Face Identification: The system compares a face image that belongs
to a person in a database, tell whose image it is.
Stages of identification
Capture
Extraction
Comparison
Match/Non match
Accept/Project
1
2
3
4
5
Capture- Capture the behavioral
and physical sample.
Extraction- Unique data is extracted
from the sample and a template is
created.
Comparison- The template is
compared with a new sample.
Match/non match- The system
decides whether the new samples
are matched or not.
Components of face recognition
 Enrollment module-An automated
mechanism that scans and
captures a digital or analog
image of a living personal
characteristics.
 Database-Another entity which
handles compression ,processing
,data storage and compression of
the captured data with stored
data.
 Identification module-The third
interfaces with the application
system.
How facial recognition system works
• Facial recognition software is based on the ability to first recognize
faces, which is a technological feat in itself. If you look at the mirror,
you can see that your face has certain distinguishable landmarks.
These are the peaks and valleys that make up the different facial
features.
• VISIONICS defines these landmarks as nodal points. There are about
80 nodal points on a human face.
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
Nodal points that are measured by the software
• Detection- when the system is attached to a video surveillance
system, the recognition software searches the field of view of a
video camera for faces. If there is a face in the view, it is detected
within a fraction of a second. A multi-scale algorithm is used to
search for faces in low resolution. The system switches to a high-
resolution search only after a head-like shape is detected.
• Alignment- Once a face is detected, the system determines the
head's position, size and pose. A face needs to be turned at least 35
degrees toward the camera for the system to register it.
• Normalization-The image of the head is scaled and rotated so that it
can be registered and mapped into an appropriate size and pose.
Normalization is performed regardless of the head's location and
distance from the camera. Light does not impact the normalization
process.
• Representation-The system translates the facial data into a unique
code. This coding process allows for easier comparison of the newly
acquired facial data to stored facial data.
• Matching- The newly acquired facial data is compared to the stored
data and (ideally) linked to at least one stored facial representation.
Advantages and disadvantages
ADVANTAGES
• Convenient, social acceptability.
• More user friendly.
• Inexpensive technique of identification.
DISADVANTAGES
• Problem with false rejection when people change their hair style, grow
or shave a beard or wear glasses.
• Face recognition systems can’t tell the difference between identical
twins.
Where face recognition technology is used
• Airports and railway stations
• Voter verification
• Cashpoints
• Stadiums
• Public transportation
• Financial institutions
• Government offices
• Businesses of all kinds
Future of face recognition
• Some consider the problem impossible.
• Advancements in hardware and software.
• Slow integration into society in limited environments.
• Very large potential market.
CONCLUSION
• Face recognition technologies have been associated generally with
very costly top secure applications. Today the core technologies have
evolved and the cost of equipment's is going down dramatically due
to the integration and the increasing processing power. Certain
applications of face recognition technology are now cost effective,
reliable and highly accurate. As a result there are no technological or
financial barriers for stepping from pilot project to widespread
deployment.
• For implementations where the biometric system must verify and
identify users reliably over time, facial scan can be a very difficult, but
not impossible, technology to implement successfully.
Thanks
Movie on face recognition in e attendace

More Related Content

What's hot

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition TechnologyAvinash Singh
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 
Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Alexa Dovgopolaya
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra AdhikariDEBENDRA ADHIKARI
 
Face detection system
Face detection systemFace detection system
Face detection systemAkshay Surve
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyJawhar Ali
 
Facial Recognition Vinod
Facial Recognition VinodFacial Recognition Vinod
Facial Recognition VinodVinod siragaon
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemshraddha mane
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1Ankit Gupta
 

What's hot (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
 
Face detection system
Face detection systemFace detection system
Face detection system
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
Facial Recognition Vinod
Facial Recognition VinodFacial Recognition Vinod
Facial Recognition Vinod
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Face Detection
Face DetectionFace Detection
Face Detection
 

Similar to Movie on face recognition in e attendace

Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySARATHGOVINDKK
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 

Similar to Movie on face recognition in e attendace (20)

Face recognition
Face recognition Face recognition
Face recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
ACET.pptx
ACET.pptxACET.pptx
ACET.pptx
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Movie on face recognition in e attendace

  • 1. Head of department -Sabina Ansari Case study teacher -Priyanka pawar LAXMAN DEVRAM SONAWANE COLLEGE
  • 3.
  • 4. Overview Introduction History What are biometrics Why we choose face recognition over other biometrics What is face recognition Components of face recognition How facial recognition system works Where face recognition technology is used Future of face recognition
  • 5. Introduction • In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. • Face recognition is one of the few biometric methods that possess the merits of both high accuracy & Complex and largely software based technique. • Analyze unique shape, pattern & positioning of facial features. • It compare scans to records stored in central or local database or even on a smart card.
  • 6. History • The first attempts to use face recognition began in the 1960’s with a semi-automated system. • Marks were made on photographs to locate the major features; it used features such as eyes, ears, noses, and mouths. • Then distances and ratios were computed from these marks to a common reference point and compared to reference data. • In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition. • This proved even harder to automate due to the subjective nature of many of the measurements still made completely by hand.
  • 7. What are biometrics • A biometric is a unique, measurable characteristic of a human being that Can be used to automatically recognize an individual or verify an individual’s identity.
  • 8. Biometrics can measure both physiological and behavioral characteristics – • Physiological biometrics:- This types of biometrics is based on measurements and data derived from direct measurement of a part of the human body. • Behavioral biometrics:- This types of biometrics is based on measurements and data derived from an action.
  • 9. Types of biometrics PHYSIOLOGICAL BEHAVIORAL  Finger-scan Voice-scan  Facial Recognition Signature-scan  Iris-scan Keystroke-scan  Retina-scan  Hand-scan
  • 10. Why we choose face recognition over other biometrics • It requires no physical interaction on behalf of user. • It is accurate and allows for high enrolment and verification. • Not require an expert to interpret the comparison result. • It can use your existing hardware infrastructure, existing cameras and image capture, devices will work with no problems. • It is the only biometric that allow you to perform passive identification in one to Many environments (e.g.: identifying a terrorist in a busy Airport terminal.
  • 11. What is face recognition • Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. • A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image from the source, One of the ways to do this is by comparing selected facial features from the image and a facial database.
  • 12. • Detection – two-class classification. • Face vs. Non-face. • Recognition – multi-class classification. • One person vs. all the others. Difference between face detection and recognition
  • 13. Two types of comparison in face recognition • Face Verification: The system compares a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database. • Face Identification: The system compares a face image that belongs to a person in a database, tell whose image it is.
  • 14. Stages of identification Capture Extraction Comparison Match/Non match Accept/Project 1 2 3 4 5 Capture- Capture the behavioral and physical sample. Extraction- Unique data is extracted from the sample and a template is created. Comparison- The template is compared with a new sample. Match/non match- The system decides whether the new samples are matched or not.
  • 15. Components of face recognition  Enrollment module-An automated mechanism that scans and captures a digital or analog image of a living personal characteristics.  Database-Another entity which handles compression ,processing ,data storage and compression of the captured data with stored data.  Identification module-The third interfaces with the application system.
  • 16. How facial recognition system works • Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. • VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 17. • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line Nodal points that are measured by the software
  • 18. • Detection- when the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high- resolution search only after a head-like shape is detected. • Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it. • Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.
  • 19. • Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data. • Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 20. Advantages and disadvantages ADVANTAGES • Convenient, social acceptability. • More user friendly. • Inexpensive technique of identification. DISADVANTAGES • Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. • Face recognition systems can’t tell the difference between identical twins.
  • 21. Where face recognition technology is used • Airports and railway stations • Voter verification • Cashpoints • Stadiums • Public transportation • Financial institutions • Government offices • Businesses of all kinds
  • 22. Future of face recognition • Some consider the problem impossible. • Advancements in hardware and software. • Slow integration into society in limited environments. • Very large potential market.
  • 23. CONCLUSION • Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment's is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from pilot project to widespread deployment. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.