FACE DETECTION SECURITY SYSTEM
ABOUT THE PROJECT
• To secure our assets and protect our privacy, there is a strong demand for
user-friendly biometric security systems. There are various types of biometric
systems that use signatures, fingerprints, voice, hand geometry, ear geometry,
face detection and so on. Among these, face recognition appears to be quite
exciting and is catching attention
• Face Detection is a computer technology being used in variety of
applications that identifies human faces in digital images.
INTRODUCTION
A. Everyday actions are increasingly being handled
electronically,instead of paper and pencil.
B. This growth in electronics transactions results in
great demand for fast and accurate user
identification and authentication.
C. Access bank accounts,computer systems,personal
lockers ands cars using PIN’s for identification
and security.
D. When credit cards and ATM cards are lost or
stolen,an unauthorized user can often come up
with correct personal codes.
E. Face recognition technology may solve this
problem since a face is undeniably connected to
its owner except in case of identical twins.
FACE RECOGNITION
A. It requires no physical interaction on behalf of the user.
B. The system captures the image of the individual and verify with
other individual in the databases.
C. Then system identifies the image of individual and sends the picture
of that person to the owner of the object with the name of the person
accessing the object otherwise it sends picture with tagline written
“unknown”.
APPLICATIONS
• Personal computer/laptop
• Locker
• Cars
• Residential security
Nodal point that are measured by the software.
• Distance between the eyes
• Width of the nose
• Depth of eye socket
• Cheekbones
• Jawline
• Chin
ADVANTAGES
• It is the only biometric able to operate without user cooperation.
• It can search against static images such as driver’s license photographs.
• Provides verification that is convenient,quick and accurate.
• It enhances safety and security as there is no key,badge or password that can
be stolen or lost.
• People don’t have to worry about the potential drawbacks related to
fingerprint identification technology,such as germs or smudges.
DISADVANTAGES
• The video and high quality images required for facial recognition take up a
signigificant amount of storage .
• Face recognition requires top quality cameras and advanced software to
ensure accuracy and speed.
• Change in physiological characteristics and acquisition environment reduce
matching accuracy.
CONCLUSION
• Factors such as environment changes and mild changes in appearance impact
the technology to a greater degree.
• For implementation where the biometric system must verify and identify
users reliably over time,facial scan can be very difficult but not impossible.
THANK YOU

Face detection security system & setting raspberry pi (1)

  • 1.
  • 2.
    ABOUT THE PROJECT •To secure our assets and protect our privacy, there is a strong demand for user-friendly biometric security systems. There are various types of biometric systems that use signatures, fingerprints, voice, hand geometry, ear geometry, face detection and so on. Among these, face recognition appears to be quite exciting and is catching attention • Face Detection is a computer technology being used in variety of applications that identifies human faces in digital images.
  • 3.
    INTRODUCTION A. Everyday actionsare increasingly being handled electronically,instead of paper and pencil. B. This growth in electronics transactions results in great demand for fast and accurate user identification and authentication. C. Access bank accounts,computer systems,personal lockers ands cars using PIN’s for identification and security. D. When credit cards and ATM cards are lost or stolen,an unauthorized user can often come up with correct personal codes. E. Face recognition technology may solve this problem since a face is undeniably connected to its owner except in case of identical twins.
  • 4.
    FACE RECOGNITION A. Itrequires no physical interaction on behalf of the user. B. The system captures the image of the individual and verify with other individual in the databases. C. Then system identifies the image of individual and sends the picture of that person to the owner of the object with the name of the person accessing the object otherwise it sends picture with tagline written “unknown”.
  • 5.
    APPLICATIONS • Personal computer/laptop •Locker • Cars • Residential security
  • 6.
    Nodal point thatare measured by the software. • Distance between the eyes • Width of the nose • Depth of eye socket • Cheekbones • Jawline • Chin
  • 7.
    ADVANTAGES • It isthe only biometric able to operate without user cooperation. • It can search against static images such as driver’s license photographs. • Provides verification that is convenient,quick and accurate. • It enhances safety and security as there is no key,badge or password that can be stolen or lost. • People don’t have to worry about the potential drawbacks related to fingerprint identification technology,such as germs or smudges.
  • 8.
    DISADVANTAGES • The videoand high quality images required for facial recognition take up a signigificant amount of storage . • Face recognition requires top quality cameras and advanced software to ensure accuracy and speed. • Change in physiological characteristics and acquisition environment reduce matching accuracy.
  • 9.
    CONCLUSION • Factors suchas environment changes and mild changes in appearance impact the technology to a greater degree. • For implementation where the biometric system must verify and identify users reliably over time,facial scan can be very difficult but not impossible.
  • 10.