SlideShare a Scribd company logo
Face recognition system
Introduction
5 Methodology
4 Face Recognition
3 Why we choose face recognition over other biometric ?
2 What is Biometrics ?
1
Contents
6
7
8
9
Implementation of Face Recognition Technology
How Face Recognition Systems Work
Entity – relationship (ER) diagram
Advantages and Disadvantages
10
11
Applications
Conclusion
Introduction
In today's networked world, the need to maintain the security of
information or physical property is becoming both increasingly important
and increasingly difficult.
Face recognition is one of the few biometric methods that possess the
merits of high accuracy.
Complex and largely software based technique
Analyze unique shape, pattern &positioning of facial features
It compare scans to records stored in central or local database or even on a
smart card.
What is Biometrics ?
It is a unique measurable characteristics of a human being used to
automatically recognize an individual’s identity.
Two types
1.physiological
2. behavioral characteristics
A “biometric system” refers to integrated hardware and software used to
conduct biometric identification
Why we choose face recognition over other
biometric ?
• It requires no physical interaction on behalf of the user.
• It is accurate and allows for high enrolment and verification rates.
• It does not require an expert to interpret the comparison result.
• It can use your existing hardware infrastructure ,existing cameras and
image capture devices will work with no problems.
• It is the only biometric that allow you to perform passive identification in a
one to many environments (Eg. Identifying a terrorists in a busy Airport
terminal)
Face Recognition
• The Face – unique part .
• For face recognition there are two types of comparisons.
1 . Verification
This is where the system compares the given individual with who that
individual says they are and gives a yes or no decision.
2. Identification
This is where the system compares the given individual to all the other
individuals in the database and gives a ranked list of matches .
Image
Face
detection
Feature
extraction
Face
recognition
Results
Methodology
A picture taken from a digital camera, we’d like to know if there is any
person inside, where his/her face locates at, and who he/she is. Towards
this goal, we generally separate the face recognition procedure into five
steps .
Implementation of Face Recognition
Technology
2
1
3
4
Decision
making
Face images
classification
Input
processing
Data
acquisition
Data acquisition
• The input can be recorded video of the real or still image. A
sample of 1 sec duration consists of a 25 frame image
sequence. More than one camera can be used to produce a
3D representation of the face .
Input processing
• A pre – processing module locates the eye position and
takes care of the surrounding lighting condition and color
variance. First the presence of faces or face in a scene must
be detected . Once the face is detected ,it must be localized.
Face image classification
• Synergetic computer is used to classify optical and audio
features, respectively .A synergetic computer is a set of
algorithm that simulate synergetic phenomena.
1.If you look at the mirror ,you can see that your face has certain
distinguishable landmarks. These are the peaks and valleys that make up
the different facial features. Software defines these landmarks as nodal
points .
2.There are about ’80 nodal points ’ on a human face .
3.Here are few nodal points that are measured by the software .
Depth of the eye
socket
Width of the
nose
Distance
between the
eyes
Jaw line chin
How Face Recognition Systems Work
Entity – relationship (ER) diagram
User
Adhar id
Education
AgeSex
Name
Advantages
• Convenient, social acceptability
• More user friendly
• Inexpensive technique of
identification
Disadvantages
• Problem with false rejection when
people change their hair style,
grow or shave a beard or wear
glasses.
• Face recognition systems can’t tell
the difference between identical
twins
Applications
1 . Government Use:
a. Law Enforcement :Minimizing victim trauma verifying identify for
court records ,and comparing school surveillance camera images to know
child molesters .
b. Security/Counter terrorism :Access control ,comparing surveillance
images to know terrorist.
c. Immigration : Rapid progression through customs.
d. Voter verification : Where eligible politicians are required to verify
their identity during a voting process this is intended to stop ‘ proxy ’
voting where the vote may not go as expected.
2. Commercial Use :
a. Residential Security : Alert home owners of approaching personnel .
b. Banking using ATM :The software is able to quickly verify a customer’s
face.
c. Physical access control of building areas ,doors , cars or net access .
Conclusion
• Face recognition technologies have been associated generally with very
costly top secure applications. Today the core technologies have evolved
and the cost of equipment is going down dramatically due to the
integration and the increasing processing power . Certain applications of
face recognition technology are now cost effective , reliable and highly
accurate .As a result there are no technological or financial barriers for
stepping from the pilot project to widespread deployment .
Do you have
any questions?

More Related Content

What's hot

Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
shraddha mane
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
usha2016
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
Arjun Agnihotri
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
KAMLESH KUMAR
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 

What's hot (20)

Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 

Viewers also liked

Face Recognition Human Computer Interaction
Face Recognition Human Computer InteractionFace Recognition Human Computer Interaction
Face Recognition Human Computer Interaction
ines beltaief
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyVengadesh Raja
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Enterprise system architecture togaf
Enterprise system architecture togafEnterprise system architecture togaf
Enterprise system architecture togaf
ines beltaief
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
ines beltaief
 
Real-time Face Detection and Recognition
Real-time Face Detection and RecognitionReal-time Face Detection and Recognition
Real-time Face Detection and Recognition
Jia-Bin Huang
 
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
RajaGopal Reddy
 
Difference in biometric systems (Face Recognition Rules)
Difference in biometric systems (Face Recognition Rules)Difference in biometric systems (Face Recognition Rules)
Difference in biometric systems (Face Recognition Rules)
Mary_Joy
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
Data warehouse design
Data warehouse designData warehouse design
Data warehouse design
ines beltaief
 
NEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition System
NECIndia
 
Biometric attendance system
Biometric attendance systemBiometric attendance system
Biometric attendance system
Divinity IT Solutions
 
Camshaft
CamshaftCamshaft
Camshaft
Ahmed Tememe
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Suvadip Shome
 
Aadhaar enabled biometric attendance system
Aadhaar enabled biometric attendance systemAadhaar enabled biometric attendance system
Aadhaar enabled biometric attendance system
Akshay Kashyap
 
Facial expression recognition based on image feature
Facial expression recognition based on image featureFacial expression recognition based on image feature
Facial expression recognition based on image feature
Tasnim Tara
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniquesAbhineet Bhamra
 

Viewers also liked (20)

Face Recognition Human Computer Interaction
Face Recognition Human Computer InteractionFace Recognition Human Computer Interaction
Face Recognition Human Computer Interaction
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Enterprise system architecture togaf
Enterprise system architecture togafEnterprise system architecture togaf
Enterprise system architecture togaf
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Real-time Face Detection and Recognition
Real-time Face Detection and RecognitionReal-time Face Detection and Recognition
Real-time Face Detection and Recognition
 
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
 
Difference in biometric systems (Face Recognition Rules)
Difference in biometric systems (Face Recognition Rules)Difference in biometric systems (Face Recognition Rules)
Difference in biometric systems (Face Recognition Rules)
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Data warehouse design
Data warehouse designData warehouse design
Data warehouse design
 
NEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition System
 
Biometric attendance system
Biometric attendance systemBiometric attendance system
Biometric attendance system
 
Camshaft
CamshaftCamshaft
Camshaft
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
 
Aadhaar enabled biometric attendance system
Aadhaar enabled biometric attendance systemAadhaar enabled biometric attendance system
Aadhaar enabled biometric attendance system
 
Facial expression recognition based on image feature
Facial expression recognition based on image featureFacial expression recognition based on image feature
Facial expression recognition based on image feature
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 

Similar to Face recognition

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
4GH20CS408Rajeshk
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
Jawhar Ali
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Asif Muhammad
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
Harshavardhan851231
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SARATHGOVINDKK
 

Similar to Face recognition (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Recently uploaded

How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 

Recently uploaded (20)

How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 

Face recognition

  • 2. Introduction 5 Methodology 4 Face Recognition 3 Why we choose face recognition over other biometric ? 2 What is Biometrics ? 1 Contents 6 7 8 9 Implementation of Face Recognition Technology How Face Recognition Systems Work Entity – relationship (ER) diagram Advantages and Disadvantages 10 11 Applications Conclusion
  • 3. Introduction In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. Face recognition is one of the few biometric methods that possess the merits of high accuracy. Complex and largely software based technique Analyze unique shape, pattern &positioning of facial features It compare scans to records stored in central or local database or even on a smart card.
  • 4. What is Biometrics ? It is a unique measurable characteristics of a human being used to automatically recognize an individual’s identity. Two types 1.physiological 2. behavioral characteristics A “biometric system” refers to integrated hardware and software used to conduct biometric identification
  • 5. Why we choose face recognition over other biometric ? • It requires no physical interaction on behalf of the user. • It is accurate and allows for high enrolment and verification rates. • It does not require an expert to interpret the comparison result. • It can use your existing hardware infrastructure ,existing cameras and image capture devices will work with no problems. • It is the only biometric that allow you to perform passive identification in a one to many environments (Eg. Identifying a terrorists in a busy Airport terminal)
  • 6. Face Recognition • The Face – unique part . • For face recognition there are two types of comparisons. 1 . Verification This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. 2. Identification This is where the system compares the given individual to all the other individuals in the database and gives a ranked list of matches .
  • 7. Image Face detection Feature extraction Face recognition Results Methodology A picture taken from a digital camera, we’d like to know if there is any person inside, where his/her face locates at, and who he/she is. Towards this goal, we generally separate the face recognition procedure into five steps .
  • 8. Implementation of Face Recognition Technology 2 1 3 4 Decision making Face images classification Input processing Data acquisition
  • 9. Data acquisition • The input can be recorded video of the real or still image. A sample of 1 sec duration consists of a 25 frame image sequence. More than one camera can be used to produce a 3D representation of the face . Input processing • A pre – processing module locates the eye position and takes care of the surrounding lighting condition and color variance. First the presence of faces or face in a scene must be detected . Once the face is detected ,it must be localized. Face image classification • Synergetic computer is used to classify optical and audio features, respectively .A synergetic computer is a set of algorithm that simulate synergetic phenomena.
  • 10. 1.If you look at the mirror ,you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Software defines these landmarks as nodal points . 2.There are about ’80 nodal points ’ on a human face . 3.Here are few nodal points that are measured by the software . Depth of the eye socket Width of the nose Distance between the eyes Jaw line chin How Face Recognition Systems Work
  • 11. Entity – relationship (ER) diagram User Adhar id Education AgeSex Name
  • 12. Advantages • Convenient, social acceptability • More user friendly • Inexpensive technique of identification Disadvantages • Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. • Face recognition systems can’t tell the difference between identical twins
  • 13. Applications 1 . Government Use: a. Law Enforcement :Minimizing victim trauma verifying identify for court records ,and comparing school surveillance camera images to know child molesters . b. Security/Counter terrorism :Access control ,comparing surveillance images to know terrorist. c. Immigration : Rapid progression through customs. d. Voter verification : Where eligible politicians are required to verify their identity during a voting process this is intended to stop ‘ proxy ’ voting where the vote may not go as expected.
  • 14. 2. Commercial Use : a. Residential Security : Alert home owners of approaching personnel . b. Banking using ATM :The software is able to quickly verify a customer’s face. c. Physical access control of building areas ,doors , cars or net access .
  • 15. Conclusion • Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power . Certain applications of face recognition technology are now cost effective , reliable and highly accurate .As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment .
  • 16. Do you have any questions?