SlideShare a Scribd company logo
Face recognition
Author: ASIF GUL
Institute: QUAID-E-AWAM
UNIVERSITY OF SCIENCE &
TECHNOLOGY, NAWABSHAH,
SINDH, PAKISTAN
1
Outline
Biometric & its types
Facial recognition.
Implementation.
Process of working.
Strengths & weaknesses.
Applications.
References.
2
3
Biometric
The measuring and analysis of such physical attributes as facial features ,
voice or retinal scans.
This technology is can be used to define an individual’s unique identity.
Types of Biometrics
Behavioral Biometrics
 Voice scan
Signature scan
Keystroke scan
Physiological Biometrics
Finger-scan
Facial recognition
Hand-scan
Retina-scan
Face recognition
4
Face recognition(facial recognition) is a type of
biometric system application that can identify
specific individual in digital image by analyzing and
comparing patterns.
Face recognition
5
Types of comparison
 Verification:
In verification the system compares the input
digital image with the particular which the
user says he/she is.
 Identification:
In this type of comparison the system
compares the taken digital image with
the whole records in database.
Face recognition
6
Implementation of the face recognition
technology includes the following four stages.
Image acquisition
Image processing
Distinctive characteristics location
Template creation
Template matching
How Face recognition works
7
 There are some variances that make up the different facial
features
 Visionics defines these landmarks as nodal points. There
are 80 nodal points on human face.
Few are given below
Distance between the eyes
Width of the nose
Cheekbones
Jaw line
Chin
8
Face recognition algorithm working
Face Localization
Lighting Compensation
Skin Color Detection
Color Space Transformation
Variance-based Segmentation
Connected Component &
Grouping
Face Boundary Detection
Verifying/ Weighting
Eyes-Mouth Triangles
Eye/ Mouth Detection
Facial Feature Detection
Input Image
Output Image
Strengths and weakness.
9
Strengths:
 it can search against static such as driver’s license
photograph.
 It is the only biometric that is able to operate without
cooperation .
Weakness:
Changes in acquisition environment reduce matching
accuracy.
Changes in physiological characteristics reduce matching
accuracy
It has the potential for privacy abuse due to non-
cooperative enrollment and identification capabilities.
Applications of face recognition
10
 Security: access control, comparing
surveillance images to know terrorist.
 Day care: verifying the identity of
individuals picking up the children
 Residential security: alert the homeowners
of approaching personal.
Banking using ATM: the software is able to
quickly verify the customer’s face.
 Voter verification:
References
11
 https://en.wikipedia.org/wiki/facial_reco
gnition_system
 https://boimetricgroup.com/wily
 https://www.youtube.com

More Related Content

What's hot

Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
shraddha mane
 

What's hot (20)

Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
face recognition
face recognitionface recognition
face recognition
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
Aditech Infotech Pvt Ltd.
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
mishrasubrat
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
KAMLESH KUMAR
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
BioEnable
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
Wuxi Junyu Technology Co.,Ltd. (China)
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Watermark
WatermarkWatermark
Watermark
ravi33s
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
nafees321
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
Qaisar Ayub
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7
swathi b
 
C# simplified
C#  simplifiedC#  simplified
C# simplified
Mohd Manzoor Ahmed
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
biitsumudu
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
Sej Visawadia
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
avinash raibole
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
Koduru KrisHna
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 

Viewers also liked (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
 
Watermark
WatermarkWatermark
Watermark
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermark
WatermarkWatermark
Watermark
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7
 
C# simplified
C#  simplifiedC#  simplified
C# simplified
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 
Thesis
ThesisThesis
Thesis
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 

Similar to Face Recognition

Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Biometrics
BiometricsBiometrics
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
BHARATHGOWDAHA
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Murlidhar Sarda
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
ijceronline
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
IOSR Journals
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
IOSR Journals
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
Shailesh Thakur
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
Anooja Pillai
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Kavika Roy
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
usha2016
 

Similar to Face Recognition (20)

Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
G041041047
G041041047G041041047
G041041047
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Biometric systems
Biometric systemsBiometric systems
Biometric systems
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Face Recognition

  • 1. Face recognition Author: ASIF GUL Institute: QUAID-E-AWAM UNIVERSITY OF SCIENCE & TECHNOLOGY, NAWABSHAH, SINDH, PAKISTAN 1
  • 2. Outline Biometric & its types Facial recognition. Implementation. Process of working. Strengths & weaknesses. Applications. References. 2
  • 3. 3 Biometric The measuring and analysis of such physical attributes as facial features , voice or retinal scans. This technology is can be used to define an individual’s unique identity. Types of Biometrics Behavioral Biometrics  Voice scan Signature scan Keystroke scan Physiological Biometrics Finger-scan Facial recognition Hand-scan Retina-scan
  • 4. Face recognition 4 Face recognition(facial recognition) is a type of biometric system application that can identify specific individual in digital image by analyzing and comparing patterns.
  • 5. Face recognition 5 Types of comparison  Verification: In verification the system compares the input digital image with the particular which the user says he/she is.  Identification: In this type of comparison the system compares the taken digital image with the whole records in database.
  • 6. Face recognition 6 Implementation of the face recognition technology includes the following four stages. Image acquisition Image processing Distinctive characteristics location Template creation Template matching
  • 7. How Face recognition works 7  There are some variances that make up the different facial features  Visionics defines these landmarks as nodal points. There are 80 nodal points on human face. Few are given below Distance between the eyes Width of the nose Cheekbones Jaw line Chin
  • 8. 8 Face recognition algorithm working Face Localization Lighting Compensation Skin Color Detection Color Space Transformation Variance-based Segmentation Connected Component & Grouping Face Boundary Detection Verifying/ Weighting Eyes-Mouth Triangles Eye/ Mouth Detection Facial Feature Detection Input Image Output Image
  • 9. Strengths and weakness. 9 Strengths:  it can search against static such as driver’s license photograph.  It is the only biometric that is able to operate without cooperation . Weakness: Changes in acquisition environment reduce matching accuracy. Changes in physiological characteristics reduce matching accuracy It has the potential for privacy abuse due to non- cooperative enrollment and identification capabilities.
  • 10. Applications of face recognition 10  Security: access control, comparing surveillance images to know terrorist.  Day care: verifying the identity of individuals picking up the children  Residential security: alert the homeowners of approaching personal. Banking using ATM: the software is able to quickly verify the customer’s face.  Voter verification:

Editor's Notes

  1. Face is the primary focus of the interaction with the society, face communicates Identify, emotions, age, gender, size & even the character of the person