Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
INTELLIGENT FACE RECOGNITION TECHNIQUESChirag Jain
Face recognition is a form of biometric identification. A biometrics is, “Automated methods of recognizing an individual based on their unique physical or behavioral characteristics.” The process of facial recognition involves automated methods to determine identity, using facial features as essential elements of distinction.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
Four feature extraction algorithms are discussed here.
1. Principal Component Analysis
2. Discreet LInear Transform
3. Independent Component Analysis
4. Linear Discriminant Aalysis
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
INTELLIGENT FACE RECOGNITION TECHNIQUESChirag Jain
Face recognition is a form of biometric identification. A biometrics is, “Automated methods of recognizing an individual based on their unique physical or behavioral characteristics.” The process of facial recognition involves automated methods to determine identity, using facial features as essential elements of distinction.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
Four feature extraction algorithms are discussed here.
1. Principal Component Analysis
2. Discreet LInear Transform
3. Independent Component Analysis
4. Linear Discriminant Aalysis
Face recognition system plays an important role when its comes to security, In this slide using of neural networking system for face recognition system has demonstrated.
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
New Facial Biometric Technology for Law Enforcement: An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
Program
Outline:
- Introduction and Background
- New Facial Biometric Technology for Law Enforcement: Investigative Face Recognition and Animetrics ForensicaGPS
- Deep Dive: ForensicaGPS
- Case Study: How Pennsylvania law enforcement (JNET) are identifying suspects and furthering investigations with facial recognition and ForensicaGPS, Animetrics’ new facial identity biometric solution
- Conclusion
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The goal of this paper is to present a critical survey of existing literatures on human face detection and recognition over the last 4-5 years. An application for automatic face detection and tracking in video streams from surveillance cameras in public or commercial places is discussed in this paper. Prototype is designed to work with web cameras for the face detection and tracking system based on Visual 2010 C# and Open CV. This system can be used for security purpose to record the visitor face as well as to detect and track the face.
Keywords:- Face Detection, Face Recognition, Open CV, Face Tracking, Video Streams.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
Face recognition system plays an important role when its comes to security, In this slide using of neural networking system for face recognition system has demonstrated.
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
New Facial Biometric Technology for Law Enforcement: An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
Program
Outline:
- Introduction and Background
- New Facial Biometric Technology for Law Enforcement: Investigative Face Recognition and Animetrics ForensicaGPS
- Deep Dive: ForensicaGPS
- Case Study: How Pennsylvania law enforcement (JNET) are identifying suspects and furthering investigations with facial recognition and ForensicaGPS, Animetrics’ new facial identity biometric solution
- Conclusion
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The goal of this paper is to present a critical survey of existing literatures on human face detection and recognition over the last 4-5 years. An application for automatic face detection and tracking in video streams from surveillance cameras in public or commercial places is discussed in this paper. Prototype is designed to work with web cameras for the face detection and tracking system based on Visual 2010 C# and Open CV. This system can be used for security purpose to record the visitor face as well as to detect and track the face.
Keywords:- Face Detection, Face Recognition, Open CV, Face Tracking, Video Streams.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
It is a machine learning based approach where a cascade function is trained from a lot of positive and negative images. It is then used to detect objects in other images. Here we will work with face detection.
Technology that identifies you based on your physical or behavioral traits- for added security to confirm that you are who you claim to be.(this ppt is very dear to me as i have given a talk on this topic twice. this also fetched me and migmar first prize at deen dayal upadhyay college- converging vectors - an inter college presentation competition organized by arya bhata science forum)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
2. INTRODUCTION
Everyday action are increasingly being handled electronically, instead of pencil and paper
or face to face.
This growth in electronic transaction result in great demand for fast and accurate user
identification and authentication.
Access codes for buildings, banks account and computer system often use PIN for
identification and security clearances.
Using the proper PIN gain access, but the user of the pin is not verified. When credit or
ATM card is lost or stolen, an unauthorized user can often come up with correct personal
codes.
Face recognition technology may solve this problem since a face is undeniably
connected to its owner except in case of identical twins.
3. BIOMETRIC
A biometric is a unique, measurable characteristic of a human being that can be used to
automatically recognize an individual or verify an individual identity.
CHARACTERISTICS TEMPLATES
011001010010101…
011010100100110…
001100010010010...
4. TYPES OF BIOMETRIC
PHYSIOLOGICAL BIOMETRICS
(based on measurements and data
derived from direct the human
body) include:
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan.
BEHAVIORAL BIOMETRICS
(based on measurements and data
derived from an action) include:
a. Voice-scan
b. Signature-scan
c. Keystroke-scan
Biometrics can measure both physiological and behavioral
characteristics.
5. STEPS OF AUTHENTICATION
All identification or authentication technologies operate using the
following four stages:
CAPTURE: A physical sample is captured by the system during enrollment
and also in identification or Verification process.
EXTRACTION: unique data is extracted from the sample and a template is
created.
COMPARISON: the template is then compared with a new sample.
MATCH/NON MATCH: the system decides if the features extracted from
the new samples are a match or a non match.
7. FACIAL RECOGNITION
Facial recognition (or face recognition) is a type of biometric software
application that can identify a specific individual in a digital image by
analyzing and comparing patterns.
Facial recognition systems are commonly used for security purposes but
are increasingly being used in a variety of other applications. For example,
Facebook uses facial recognition software to help automate user tagging
in photographs.
8. For face recognition there are two
types of comparisons.
VERIFICATION is where the system
compares the given individual with
who that individual says they are and
gives a yes or no decision
IDENTIFICATION is where the system
compares the given individual to all
the Other individuals in the database
and gives a ranked list of matches.
10. HOW FACE RECOGNITION SYSTEMS WORK
Facial recognition software is based on the ability to first recognize faces, which is a
technological feat in itself.
If you look at the mirror, you can see that your face has certain distinguishable landmarks.
These are the peaks and valleys that make up the different facial features. There are about 80
nodal points on a human face.
Here are few nodal points that are measured by the software.
Distance between the eyes
Width of the nose
Depth of the eye socket
Cheekbones
Jaw line
Chin
These nodal points are measured to create a numerical code, a string of numbers that represents
a face in the database. This code is called face print. Only 14 to 22 nodal points are needed for
software to complete the recognition process.
11. IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
The implementation of face recognition technology includes
the following four stages:
1. Data acquisition
2. Input processing
3. Face image classification
4. Decision making .
12. 1.DATA ACQUISITION
Facial scan technology can acquire faces from
almost any static camera or video system that
generate images of sufficient quality and
resolution.
High quality enrollment is essential to eventual
verification and identification enrollment
images define the facial characteristics to be
used in all future authentication events.
13.
14. 2.INPUT PROCESSING
Images are cropped such that the ovoid facial image remain
and color images are normally converted to black and white
in order to facilitate initial comparisons based on grayscale
characteristics.
First the presence of faces or face in scene must be detected.
Once the face is detected , it must be localized and
normalization process may be required to bring the
dimensions of the live facial sample in alignment with the one
on the template.
15. 3.FACE IMAGE CLASSIFICATION
All facial scan system attempt to match visible facial features in a fashion
to the way people recognize one another.
The features most utilized are those least likely to change significantly
over time:
upper ridges of eye sockets, areas around the cheekbones, sides of the
mouth, nose shape, and position of major features relative to each other.
16.
17. 4.DECISION MAKING
Enrollment templates are normally created from a multiplicity of
processed facial images.
These template can vary in size from less than 100 bytes, generated
through certain vendors and to over 3K for templates.
It compares match template against enrollment template.
A series of images is acquired and scored against the enrollment,
so that a user attempting 1:1 verification within a facial scan system
may have 10 to 20 match attempts take place within 1 to 2
seconds.
18. SOFTWARES
Facial recognition software falls into a larger group of technologies
known as biometrics. Facial recognition methods may vary, but they
generally involve a series of steps that serve to capture, analyze and
compare your face to a database of stored images.
The basic process that is used by the Facial system to capture and
compare images:
1. Detection
2. Alignment
3. Normalization
4. Representation
5.Matching.
19. DETECTION: when the system is attached to a video surveillance system, the
recognition software searches the field of view of a video camera for faces. If
there is a face in the view, it is detected within a fraction of second. The
system switches to a high resolution search only after a head like shape is
detected.
ALIGNMENT: once a face is detected, the system determines the head’s
position, size and pose. A face needs to be turned at least 35 degree to the
camera for the system to register it.
NORMALIZATION: the image of the head a scaled and rotated so that it can
be registered and mapped into an appropriate size and pose. Normalization
is performed regardless of the head’s location and the distance of the
camera. Light does not impact the normalization process.
20. REPRESENTATION: the system translate the facial data into a unique code.
The coding process allows for easier comparison of the newly acquired facial
data to stored facial data.
MATCHING: the newly acquired facial data is compared to the stored data
and linked to at least one stored facial representation.
21. FACIAL RECOGNITION ALGORITHM
2D Eigen face
Principle Component Analysis (PCA)
3D Face Recognition
3D Expression Invariant Recognition
3D Morphable Model
22. FACIAL RECOGNITION: EIGENFACE
Decompose face images into a small
set of characteristic feature images.
A new face is compared to these
stored images.
A match is found if the new faces is
close to one of these images.
24. FACIAL RECOGNITION: PCA TRAINING
Find average of training images.
Subtract average face from each
image.
Create covariance matrix.
Generate Eigenfaces.
Each original image can be
expressed as a linear combination
of the Eigenfaces – facespace.
25. FACIAL RECOGNITION: PCA RECOGNITION
A new image is project into the “facespace”.
Create a vector of weights that describes this image.
The distance from the original image to this Eigenfaces is
compared.
If within certain thresholds then it is a recognized face.
26. FACIAL RECOGNITION: 3D EXPRESSION INVARIANT
RECOGNITION
Treats face as a deformable object.
3D system maps a face.
Captures facial geometry in canonical
form.
Can be compared to other canonical
forms.
27. FACIAL RECOGNITION: 3D MORPHABLE MODEL
Create a 3D face model
from 2D images.
Synthetic facial images
are created to add to
training set.
PCA can then be done
using these images.
The figure shows an
application of our
approach. Matching a
Morphable model
automatically to a single
sample image (1) of a
face results in a 3D
shape (2) and a texture
map estimate. The
texture estimate can be
improved by additional
texture extraction (4).
The 3D model is
rendered back into the
image after changing
facial attributes, such as
gaining (3) and loosing
weight (5), frowning (6),
or being forced to smile
(7).
28. PERFORMANCE
1. False rejection rates (FRR) : The probability that a system will
fail to identify an enrollee. It is also called type 1 error rate.
FRR= NFR/NEIA Where FRR= false rejection rates NFR=
number of false rejection rates NEIA= number of enrollee
identification attempt
2. False acceptance rate (FAR) : The probability that a system
will incorrectly identify an individual or will fail to reject an
imposter. It is also called as type 2 error rate FAR= NFA/NIIA
Where FAR= false acceptance rate NFA= number of false
acceptance NIIA= number of imposter identification attempts
29. ADVANTAGES AND DISADVANTAGES
Advantages :
1. There are many benefits to face recognition systems such as its
convenience and Social acceptability. All you need is your picture taken
for it to work.
2. Face recognition is easy to use and in many cases it can be
performed without a Person even knowing.
3. Face recognition is also one of the most inexpensive biometric in the
market and Its price should continue to go down.
Disadvantage:
1. Face recognition systems cant tell the difference between identical
twins.
30. APPLICATIONS
There are numerous applications for face recognition technology:
Commercial Use:
Day Care: Verify identity of individuals picking up the children.
Residential Security: Alert homeowners of approaching personnel
Voter verification: Where eligible politicians are required to verify
their identity during a voting process.
Banking using ATM: The software is able to quickly verify a
customer.
31. CONCLUSION
Face recognition technologies have been associated generally
with very costly top secure applications. Today the core
technologies have evolved and the cost of equipment is going
down dramatically due to the integration and the increasing
processing power. Certain applications of face recognition
technology are now cost effective, reliable and highly
accurate.