SlideShare a Scribd company logo
Presentation by: -
SHABEER KHAN
UNIT 3:
WHO ARE YOU,REALLY
Some important vacabularys used in :
 Capture:
 To capture means to grab, trap, to take.
 Anticipate:
 To think of something that will or might happen in the future.
 Mount:
 To attach (something) to something for support or use
 Monitor:
 To watch, observe, listen to, or check (something) for a special purpose
over a period of time.
 Surveillance:
 The act of carefully watching someone or something especially in order to
prevent or detect a crime.
Looking For Bad Guys At The Big
Game:
Warning : -
DON’T BREAK THE RULES WE ARE
LOOKING AT YOU
How does an authorized organization
control accidents in different
situations..?
Main topics
 face recognition.
Biomatrics.
Contents:-
 INTRODUCTION:
 FACE RECOGNITION:
 HOW FACE RECIGNITION WORKS
 STAGES OF FACE RECOGNITION.
 EXAMPLE FROM THE BOOK.
 BIOMETRICS.
 HOW BiOMETRICS WORKS.
 EXAMPLE FROM THE BOOK.
 CONCLUSION.
INTRODUCTION : -
 In today’s networked world the need to maintain
the security of information Or physical property is
becoming both increasingly important and
increasingly difficult
 Complex and largely software based techneque
Analyze unique shape, pattern and positioning of
facial features.
 It compare scans to records stored in central or local
database or even on a smart card
1: FACE RECOGNITION: -
What is face recognition..?
 A facial recognition System is a computer
appllication for autoatically identifying or verifying a
person from digital image the source. One of the
way to do this is by comparing selected facial
features from the image and a facial database.
How face recognition system works:-
 It runs in 3 steps:
 1: the digital photo( or scanned photo print) that
you provide is loaded.
 2:Face detection technology Is applied to
Automatically detect human faces in your photo.
 3: face recognition technology is apllied to
recognize the faces detected in the privious step.
Stages of face recognition : -
Main Area where we have to apply
 According to our unit (BOOK)
 AT COLLEGES AND
UNIVERSITIES.
 SPORTS STADIUMS
 AT CASHPOINTS ( BANK).
 GOVT.OFFICES.
 PUBLIC TRANSPORTAION.
 FINANCIAL INSTITUTIONS.
 AIRPORTS AND RAILWAY
STATIONS.
 BUSSINESSES OF ALL KINDS.
Example from the unit
Why people of U.S complained about the
new face recognition system
Invasion of privacy.
From Book ( unit 3) page: 34-35
 In united states when firstly FR face recognition system was insatalled in
RAYMOND JAMES STADIUM at Tampa’s ( a city in florida).to do so by using
machines that organizes faces .After that The law-enforcement agencies installed
the cctv cameras in the streets as well to control the crimes. So peopl of united
states complained about it ,because not every one thinks this kind of surveillance
is a good thing.non of them give permission to capture their pictures without
their permission.thay said that the technology has not been proven to be
reliable.what if the system point out an innoncent person as a criminal by
mistake.it makes many people angry .so the security officials replied that the face
recognition is very useful to jusify any small inconvenince.Banks ,shoping malls
and Govt.buildings are already equipped with security cameras.and no one has a
problem with that but complain about the systems used at RAYMOND JAMES
STADIUM.
2: BIOMETRICS: -
What is biometrics..?
 It is a technique used to automatically recognize an
individual’s identity and measure a unique characteristics by
using different organs of human beings.
Types of biometrics:
it is used in 2 ways to identify or match
 A Biometric system refers to integrated hardware
and software used to conduct biometric
identification.
 It is used in two ways;
 1: physiological characteristics.
 2 Behavioral characteristics
How biometrics works:
Example from the book:-
From book unit 3 (page 35)
Biometrics in Ybor City: -
 Firstly in Ybor City ( a district adjacent to downtown Tampa), cameras
mounted on the district utility poles to monitor the street for
fights,drugs deal and other crimes .then tampa modified those
cameras to link directly to the police departments own database.this
made them true biometric tools.instead of human analyzing a video
the machine did the identifiying.the LEA also suggest that it will also
help us to analyze the crowd’s at soccer’s world cup tournament in
Brazil in 2014
 But The opponents of this system objected.they argue that machine
are easily fooled by such simple devices like hats, new hair styles,or
glasses and they say humans are a lot better at recognizing
individuals than computer systems are.
Conclusion:-
 In the last I will conclude that modern technology is very helful
especially Face recognition and Biometric system makes our daily
works too easy and it also helps to control crimes in our society
but Government should develop a proper policy to monitor the
systems by making a seprate organization for that.
 Any Question .
 Thank you .
 Be happy.

More Related Content

Similar to Face recognition

4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Arhind Gautam
 
Frs
FrsFrs
Biometrics
BiometricsBiometrics
Biometrics
Rajan Kumar
 
Mis biometrics version 2
Mis   biometrics version 2Mis   biometrics version 2
Mis biometrics version 2
Christopher Ticoy
 
Biometrics
BiometricsBiometrics
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
Turner Sparks
 
418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx
Shivanig12
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
Shiva Krishna Chandra Shekar
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Kavika Roy
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
PAPER3
PAPER3PAPER3
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
ijcsit
 
Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?
Bennat Berger
 
1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx
jackiewalcutt
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
Vivek Soni
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
usha2016
 

Similar to Face recognition (20)

4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Frs
FrsFrs
Frs
 
Biometrics
BiometricsBiometrics
Biometrics
 
Mis biometrics version 2
Mis   biometrics version 2Mis   biometrics version 2
Mis biometrics version 2
 
Biometrics
BiometricsBiometrics
Biometrics
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
 
418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
PAPER3
PAPER3PAPER3
PAPER3
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
 
Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?Could COVID-19 Kickstart Surveillance Culture?
Could COVID-19 Kickstart Surveillance Culture?
 
1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx1. What are two items to consider when creating a malware analysis.docx
1. What are two items to consider when creating a malware analysis.docx
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

More from Shabeer khan

Ulcerative colitis (inflammatory Bowel Disease)
Ulcerative  colitis (inflammatory Bowel Disease)Ulcerative  colitis (inflammatory Bowel Disease)
Ulcerative colitis (inflammatory Bowel Disease)
Shabeer khan
 
Infective endocarditis
Infective  endocarditis Infective  endocarditis
Infective endocarditis
Shabeer khan
 
Esophageal atresia
Esophageal atresiaEsophageal atresia
Esophageal atresia
Shabeer khan
 
Cardiac tamponade.
Cardiac tamponade.Cardiac tamponade.
Cardiac tamponade.
Shabeer khan
 
Autism spectrum Disorder
Autism spectrum Disorder Autism spectrum Disorder
Autism spectrum Disorder
Shabeer khan
 
Neurosis (Neurotic Disorder)
Neurosis (Neurotic Disorder)Neurosis (Neurotic Disorder)
Neurosis (Neurotic Disorder)
Shabeer khan
 
Ibn sīnā (Avicenna)
Ibn sīnā (Avicenna)Ibn sīnā (Avicenna)
Ibn sīnā (Avicenna)
Shabeer khan
 
Psychosis (Psychotic disorder )
Psychosis (Psychotic disorder )Psychosis (Psychotic disorder )
Psychosis (Psychotic disorder )
Shabeer khan
 
Operating system
Operating systemOperating system
Operating system
Shabeer khan
 
Marketing
MarketingMarketing
Marketing
Shabeer khan
 
William shaekhspear
William shaekhspearWilliam shaekhspear
William shaekhspear
Shabeer khan
 

More from Shabeer khan (11)

Ulcerative colitis (inflammatory Bowel Disease)
Ulcerative  colitis (inflammatory Bowel Disease)Ulcerative  colitis (inflammatory Bowel Disease)
Ulcerative colitis (inflammatory Bowel Disease)
 
Infective endocarditis
Infective  endocarditis Infective  endocarditis
Infective endocarditis
 
Esophageal atresia
Esophageal atresiaEsophageal atresia
Esophageal atresia
 
Cardiac tamponade.
Cardiac tamponade.Cardiac tamponade.
Cardiac tamponade.
 
Autism spectrum Disorder
Autism spectrum Disorder Autism spectrum Disorder
Autism spectrum Disorder
 
Neurosis (Neurotic Disorder)
Neurosis (Neurotic Disorder)Neurosis (Neurotic Disorder)
Neurosis (Neurotic Disorder)
 
Ibn sīnā (Avicenna)
Ibn sīnā (Avicenna)Ibn sīnā (Avicenna)
Ibn sīnā (Avicenna)
 
Psychosis (Psychotic disorder )
Psychosis (Psychotic disorder )Psychosis (Psychotic disorder )
Psychosis (Psychotic disorder )
 
Operating system
Operating systemOperating system
Operating system
 
Marketing
MarketingMarketing
Marketing
 
William shaekhspear
William shaekhspearWilliam shaekhspear
William shaekhspear
 

Recently uploaded

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 

Recently uploaded (20)

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 

Face recognition

  • 1. Presentation by: - SHABEER KHAN UNIT 3: WHO ARE YOU,REALLY
  • 2. Some important vacabularys used in :  Capture:  To capture means to grab, trap, to take.  Anticipate:  To think of something that will or might happen in the future.  Mount:  To attach (something) to something for support or use  Monitor:  To watch, observe, listen to, or check (something) for a special purpose over a period of time.  Surveillance:  The act of carefully watching someone or something especially in order to prevent or detect a crime.
  • 3. Looking For Bad Guys At The Big Game:
  • 4. Warning : - DON’T BREAK THE RULES WE ARE LOOKING AT YOU
  • 5. How does an authorized organization control accidents in different situations..? Main topics  face recognition. Biomatrics.
  • 6. Contents:-  INTRODUCTION:  FACE RECOGNITION:  HOW FACE RECIGNITION WORKS  STAGES OF FACE RECOGNITION.  EXAMPLE FROM THE BOOK.  BIOMETRICS.  HOW BiOMETRICS WORKS.  EXAMPLE FROM THE BOOK.  CONCLUSION.
  • 7. INTRODUCTION : -  In today’s networked world the need to maintain the security of information Or physical property is becoming both increasingly important and increasingly difficult  Complex and largely software based techneque Analyze unique shape, pattern and positioning of facial features.  It compare scans to records stored in central or local database or even on a smart card
  • 9. What is face recognition..?  A facial recognition System is a computer appllication for autoatically identifying or verifying a person from digital image the source. One of the way to do this is by comparing selected facial features from the image and a facial database.
  • 10. How face recognition system works:-  It runs in 3 steps:  1: the digital photo( or scanned photo print) that you provide is loaded.  2:Face detection technology Is applied to Automatically detect human faces in your photo.  3: face recognition technology is apllied to recognize the faces detected in the privious step.
  • 11. Stages of face recognition : -
  • 12. Main Area where we have to apply  According to our unit (BOOK)  AT COLLEGES AND UNIVERSITIES.  SPORTS STADIUMS  AT CASHPOINTS ( BANK).  GOVT.OFFICES.  PUBLIC TRANSPORTAION.  FINANCIAL INSTITUTIONS.  AIRPORTS AND RAILWAY STATIONS.  BUSSINESSES OF ALL KINDS.
  • 13. Example from the unit Why people of U.S complained about the new face recognition system
  • 14. Invasion of privacy. From Book ( unit 3) page: 34-35  In united states when firstly FR face recognition system was insatalled in RAYMOND JAMES STADIUM at Tampa’s ( a city in florida).to do so by using machines that organizes faces .After that The law-enforcement agencies installed the cctv cameras in the streets as well to control the crimes. So peopl of united states complained about it ,because not every one thinks this kind of surveillance is a good thing.non of them give permission to capture their pictures without their permission.thay said that the technology has not been proven to be reliable.what if the system point out an innoncent person as a criminal by mistake.it makes many people angry .so the security officials replied that the face recognition is very useful to jusify any small inconvenince.Banks ,shoping malls and Govt.buildings are already equipped with security cameras.and no one has a problem with that but complain about the systems used at RAYMOND JAMES STADIUM.
  • 16. What is biometrics..?  It is a technique used to automatically recognize an individual’s identity and measure a unique characteristics by using different organs of human beings.
  • 17. Types of biometrics: it is used in 2 ways to identify or match  A Biometric system refers to integrated hardware and software used to conduct biometric identification.  It is used in two ways;  1: physiological characteristics.  2 Behavioral characteristics
  • 19. Example from the book:- From book unit 3 (page 35)
  • 20. Biometrics in Ybor City: -  Firstly in Ybor City ( a district adjacent to downtown Tampa), cameras mounted on the district utility poles to monitor the street for fights,drugs deal and other crimes .then tampa modified those cameras to link directly to the police departments own database.this made them true biometric tools.instead of human analyzing a video the machine did the identifiying.the LEA also suggest that it will also help us to analyze the crowd’s at soccer’s world cup tournament in Brazil in 2014  But The opponents of this system objected.they argue that machine are easily fooled by such simple devices like hats, new hair styles,or glasses and they say humans are a lot better at recognizing individuals than computer systems are.
  • 21. Conclusion:-  In the last I will conclude that modern technology is very helful especially Face recognition and Biometric system makes our daily works too easy and it also helps to control crimes in our society but Government should develop a proper policy to monitor the systems by making a seprate organization for that.  Any Question .  Thank you .  Be happy.