SlideShare a Scribd company logo
1 of 29
FACE RECOGNITION
PRESENTED BY:
AYUSHI SAXENA
120271
1
Outline
1. Introduction
2. Biometrics
3. How it works
4. Comparison
5. Stages of identification
6. Implementation
7. Strengths & Weaknesses
8. Applications
9. Conclusion
10. References
2
What is Face Recognition? 3
Introduction
• A Computer Application.
• Automatic identification or verification of a
person or an object.
• Can be used on a digital image or a
video.
• Can be compared other biometrics such
as fingerprint.
4
WHAT IS BIOMETRICS ?
• Biometrics refers to the identification of humans
by their characteristics or traits.
• In physiological:
 Finger scan
 Facial recognition
 Retina-scan
 Hand-scan
• Behavioural biometrics include:
 Voice-scan
 Signature-scan
5
HOW FACE RECOGNITION WORKS
?
6
Detection- When the system is attached to a video
surveillance
system, the recognition software searches the field of
view of a
video camera for faces.
Alignment- Once a face is detected, the system
determines the head's size and
position. A face needs to be turned at least 35
degrees toward the camera for the system to register
it.
7
Normalization- Normalization is performed
regardless of the head's location and
distance from the camera. Light does not
impact the normalization process.
Representation- The system translates the
facial data into a unique code. This coding
process allows for easier comparison of the
newly acquired facial data to stored facial
data.
8
Matching- The newly acquired
facial data is compared to the
stored data and (ideally) linked
to at least one stored facial
representation.
9
COMPARISON
1) IDENTFICATION
- figure out “Who is X?”
- accomplished by system performing a
“one-to-many ”
search
10
2) VERIFICATION
- answer the question “Is this X?”
- accomplished by the system
performing a “one-to-one”
search
11

12STAGES OF IDENTIFICATION
Capture Extraction Comparison
Match/Non
match
Accept/Project
Capture- Capture the behavioral sample
Extraction- Unique data is extracted from the
sample and a template is created.
Comparison- The template is compared with a
new sample.
Match/non match- The system decides whether
the new samples are matched or not.
13
implement of face recognition
 data acquisition
input processing
 face image classification and
decision making
14
Data acquisition:
The input can be recorded video of the
speaker or a still image. A sample of 1 sec
duration consists of a 25 frame video
sequence.
More than one camera can be used to
produce a 3D representation of the face
and to protect against the usage of
photographs to gain unauthorized access
15
Input processing:
A pre-processing module locates the eye
position and takes care of the surrounding
lighting condition and colour variance.
Firstly the scene is detected of faces or
face in a scene must be detected. Once
the face is detected, it must be localized.
Some facial recognition approaches use of
the whole face while others concentrate
16
Face image classification and
decision making
 Synergetic computer are used to classify optical and
audio features, respectively.
 A synergetic computer is a set of algorithm that
simulate synergetic phenomena.
 A newly recorded pattern is preprocessed and
compared with each faceprint stored in the database.
As comparisons are made, the system assigns a value
to the comparison using a scale of one to ten. If a
score is above a predetermined threshold, a match is
declared.
17
ADVANTAGES AND
DISADVANTAGESADVANTAGES:
• Fast and convenient in identifying a person
• Social acceptability
• Inexpensive technique of identification
• Great use in society:
- crime detection
- security use
18
DISADVANTAGES:
1) Problem with false rejection when
people change their hair style, grow or
shave a beard or wear glasses.
2) Change of facial characteristics –
wearing of glasses.
3) Face recognition systems can’t tell
the difference between identical twins.
19
APPLICATIONS
 Commercial Use:
a. Day Care: Verify identity of individuals picking up the
children.
b. Residential Security: Alert homeowners of
approaching personnel.
c. Voter verification: Where eligible politicians are
required to verify their identity during a voting
process.
d. Banking using ATM: The software is able to quickly
verify a customer.
20
Applications Available in Market
Face Recognition based Time Attendance
System
• Fastest and safest method of tracking employee
time and attendance.
• Easy to install and use.
• Cost saving and convenient way of time tracking.
• Provide easy and efficient way of
recording attendance.
• Easily manage employee time and attendance
21
Facial Recognition PC Security
• Logon and a PC camera only provides access when
a live-feed face image of an authorized user is
detected, effectively preventing unauthorized
access.
• Fast & Secured Login Process.
22
NameTag
 NameTag lets strangers get a broad range of
personal information—including a person’s name,
photos, and dating website profiles—simply by
looking at that person’s face with the Glass
camera.
 Using the NameTag smartphone or Google Glass
app, simply snap a pic of someone you want to
connect with and see their entire public online
presence in one place.
23
24
25
Conclusion
Face recognition technologies have been
associated generally with very costly top
secure applications. Today the core
technologies have evolved and the cost of
equipments is going down dramatically due
to the integration and the increasing
processing power. Certain applications of
face recognition technology are now cost
effective, reliable and highly accurate.
26
References
http://www.face-rec.org/general-
info/
http://www.nametag.ws/
http://www.dailymail.co.uk
http://electronics.howstuffworks.co
m
http://www.arcticstartup.com
27
28
29

More Related Content

What's hot

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 

What's hot (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
face recognition
face recognitionface recognition
face recognition
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face detection
Face detectionFace detection
Face detection
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Viewers also liked

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Sift Happens John Pearce June 27 Timed
Sift Happens John Pearce June 27 TimedSift Happens John Pearce June 27 Timed
Sift Happens John Pearce June 27 TimedJP Consultancy
 
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
PCA-SIFT: A More Distinctive Representation for Local Image DescriptorsPCA-SIFT: A More Distinctive Representation for Local Image Descriptors
PCA-SIFT: A More Distinctive Representation for Local Image Descriptorswolf
 
face recognition system
face recognition systemface recognition system
face recognition systemAnil Kumar
 
Scale Invariant Feature Transform
Scale Invariant Feature TransformScale Invariant Feature Transform
Scale Invariant Feature Transformkislayabhi
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognitionDhanush Kasargod
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentationwolf
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 

Viewers also liked (15)

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Sift Happens John Pearce June 27 Timed
Sift Happens John Pearce June 27 TimedSift Happens John Pearce June 27 Timed
Sift Happens John Pearce June 27 Timed
 
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
PCA-SIFT: A More Distinctive Representation for Local Image DescriptorsPCA-SIFT: A More Distinctive Representation for Local Image Descriptors
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors
 
face recognition system
face recognition systemface recognition system
face recognition system
 
Scale Invariant Feature Transform
Scale Invariant Feature TransformScale Invariant Feature Transform
Scale Invariant Feature Transform
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Student Attendance System
Student Attendance SystemStudent Attendance System
Student Attendance System
 
PPT - Powerful Presentation Techniques
PPT - Powerful Presentation TechniquesPPT - Powerful Presentation Techniques
PPT - Powerful Presentation Techniques
 

Similar to Face Recognition

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access ControlMd. Saddam Hossain Noyon
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
REAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLES
REAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLESREAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLES
REAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLEScscpconf
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 

Similar to Face Recognition (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
REAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLES
REAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLESREAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLES
REAL TIME DROWSY DRIVER DETECTION USING HAARCASCADE SAMPLES
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 

Recently uploaded

BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...Kayode Fayemi
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationFahadFazal7
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNtntlai16
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdfNancy Goebel
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developersTeri Eyenike
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXRMegan Campos
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 

Recently uploaded (19)

BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 

Face Recognition

  • 2. Outline 1. Introduction 2. Biometrics 3. How it works 4. Comparison 5. Stages of identification 6. Implementation 7. Strengths & Weaknesses 8. Applications 9. Conclusion 10. References 2
  • 3. What is Face Recognition? 3
  • 4. Introduction • A Computer Application. • Automatic identification or verification of a person or an object. • Can be used on a digital image or a video. • Can be compared other biometrics such as fingerprint. 4
  • 5. WHAT IS BIOMETRICS ? • Biometrics refers to the identification of humans by their characteristics or traits. • In physiological:  Finger scan  Facial recognition  Retina-scan  Hand-scan • Behavioural biometrics include:  Voice-scan  Signature-scan 5
  • 7. Detection- When the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. Alignment- Once a face is detected, the system determines the head's size and position. A face needs to be turned at least 35 degrees toward the camera for the system to register it. 7
  • 8. Normalization- Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process. Representation- The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data. 8
  • 9. Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation. 9
  • 10. COMPARISON 1) IDENTFICATION - figure out “Who is X?” - accomplished by system performing a “one-to-many ” search 10
  • 11. 2) VERIFICATION - answer the question “Is this X?” - accomplished by the system performing a “one-to-one” search 11 
  • 12. 12STAGES OF IDENTIFICATION Capture Extraction Comparison Match/Non match Accept/Project
  • 13. Capture- Capture the behavioral sample Extraction- Unique data is extracted from the sample and a template is created. Comparison- The template is compared with a new sample. Match/non match- The system decides whether the new samples are matched or not. 13
  • 14. implement of face recognition  data acquisition input processing  face image classification and decision making 14
  • 15. Data acquisition: The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access 15
  • 16. Input processing: A pre-processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. Firstly the scene is detected of faces or face in a scene must be detected. Once the face is detected, it must be localized. Some facial recognition approaches use of the whole face while others concentrate 16
  • 17. Face image classification and decision making  Synergetic computer are used to classify optical and audio features, respectively.  A synergetic computer is a set of algorithm that simulate synergetic phenomena.  A newly recorded pattern is preprocessed and compared with each faceprint stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared. 17
  • 18. ADVANTAGES AND DISADVANTAGESADVANTAGES: • Fast and convenient in identifying a person • Social acceptability • Inexpensive technique of identification • Great use in society: - crime detection - security use 18
  • 19. DISADVANTAGES: 1) Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. 2) Change of facial characteristics – wearing of glasses. 3) Face recognition systems can’t tell the difference between identical twins. 19
  • 20. APPLICATIONS  Commercial Use: a. Day Care: Verify identity of individuals picking up the children. b. Residential Security: Alert homeowners of approaching personnel. c. Voter verification: Where eligible politicians are required to verify their identity during a voting process. d. Banking using ATM: The software is able to quickly verify a customer. 20
  • 21. Applications Available in Market Face Recognition based Time Attendance System • Fastest and safest method of tracking employee time and attendance. • Easy to install and use. • Cost saving and convenient way of time tracking. • Provide easy and efficient way of recording attendance. • Easily manage employee time and attendance 21
  • 22. Facial Recognition PC Security • Logon and a PC camera only provides access when a live-feed face image of an authorized user is detected, effectively preventing unauthorized access. • Fast & Secured Login Process. 22
  • 23. NameTag  NameTag lets strangers get a broad range of personal information—including a person’s name, photos, and dating website profiles—simply by looking at that person’s face with the Glass camera.  Using the NameTag smartphone or Google Glass app, simply snap a pic of someone you want to connect with and see their entire public online presence in one place. 23
  • 24. 24
  • 25. 25
  • 26. Conclusion Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. 26
  • 28. 28
  • 29. 29