SlideShare a Scribd company logo
Research Paper Analysis Ranasinghe A.A.S.P UWU/IIT/08/033 Independent Study and Seminar IIT362-1 Industrial Information Technology Uva Wellassa University Of Sri Lanka
Presentation Outcomes What is face Recognition? How facial recognition works ? Face detection and recognition. Different approaches of face Recognition. Feature extraction methods Holistic methods Hybrid methods Problems ,[object Object],[object Object]
Keywords   Face Detection Face Recognition
Introduction Face recognition has become a popular area of research in computer vision and one of the most successful applications of image analysis and understanding.  A set of two task: Face Identification: Given a face image that belongs to a person in a database, tell whose image it is. Face Verification: Given a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database.
How facial recognition works ?
Face Detection + Recognition Detection accuracy affects the recognition stage Key issues: Correct location of key facial features (e.g. the eye corners) False detection Missed detection
DIFFERENT APPROACHE Describe the different methods of face recognition.  Feature extraction methods Holistic methods Hybrid methods
Feature extraction methods Feature extraction is the task where we locate facial features,   Eg: the eyes, the nose, and the chins etc. This task may be performed after the face detection task Or recognition time. big challenge for feature extraction methods is feature “restoration“. Facial features are invisible according to the large variation.
Feature extraction methods This method is widely used to create individual vectors for each person in a system, the vectors are matched when an input image is being recognized.
Kanade's approach
Holistic methods Holistic methods uses the whole face region as the input to a recognition system. focuses a holistic method using eigenfacesto recognize still faces.
Face Recognition Using Eigenfaces The first stage is to insert a set of images into a database, these images are called the training set, this is because they will be used when we compare images and when we create the eigenfaces. The second stage is to create the eigenfaces.   Eigenfacescan now be extracted from the image data by using a mathematical tool called Principal Component Analysis (PCA). When the eigenfaceshave been created, each image will be represented as a vector of weights. The system is now ready to accept incoming queries.
Face Recognition Using Eigenfaces The weight of the incoming unknown image is found and then compared to the weights of those already in the system. If the input image's weight is over a given threshold it is considered to be unknown. The identification of the input image is done by finding the image in the database whose weights are the closest to the weights of the input image. The image in the database with the closest weight will be returned as a hit to the user of the system.
Hybrid methods Hybrid face recognition systems uses a combination of both holistic and feature extraction methods. Hybrid method of face recognition by using 3D morphable model. The model makes it possible to change the pose and the illumination on the face.
3D morphablemodel Took face recognition to a new level. By being able to use a morphable3D model to create synthetic images has proven to give good results. It is a very applicable approach that solves many of the problems. system achieved a recognition rate of 90%.
Problems of Face Recognition when comparing a database image with an input image. The main concern is of course that all images of the same face are heterogeneous. When image databases are created they contain good scenario images. concerning deferent facial expressions as well. The system must be able to know that two images of the same person with deferent facial expressions actually is the same person. makeup, posing positions, illumination conditions, and comparing images of the same person with and without glasses.
Applications Available in Market ,[object Object]
Fastest and safest method of tracking employee time and attendance.
Easy to install and use.
Cost saving and convenient way of time tracking.
Provide easy and efficient way of recording attendance.
Easily manage employee time and attendance profiles.
Get rid of buddy punching.
Also manage employee payroll record.

More Related Content

What's hot

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
Koduru KrisHna
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCV
Vasile Chelban
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
Ritvika Florence
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
Prabhat kumar Suman
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
Ankit Gupta
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
Abdul Hanan
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
sadique_ghitm
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
Vivek Soni
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SARATHGOVINDKK
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research Report
Sandeep Garg
 
face recognition
face recognitionface recognition
face recognition
Swetha Swethu
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
Arjun Agnihotri
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
Yogesh Lamture
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 

What's hot (20)

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCV
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research Report
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition
Face recognition Face recognition
Face recognition
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
BioEnable
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
Wuxi Junyu Technology Co.,Ltd. (China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
VisageCloud - Face Recognition meets Big Data
VisageCloud - Face Recognition meets Big DataVisageCloud - Face Recognition meets Big Data
VisageCloud - Face Recognition meets Big Data
VisageCloud
 
Av0702 face
Av0702 faceAv0702 face
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
Wesley De Neve
 
Academic Entrepreneurship at UCY
Academic Entrepreneurship at UCYAcademic Entrepreneurship at UCY
Face Recognition with Camera
Face Recognition with CameraFace Recognition with Camera
Face Recognition with Camera
Lin BH
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
Aditech Infotech Pvt Ltd.
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
iosrjce
 
Sj 공학심리학 Speech Perception
Sj 공학심리학 Speech PerceptionSj 공학심리학 Speech Perception
Sj 공학심리학 Speech PerceptionSeojung Ko
 

Viewers also liked (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
VisageCloud - Face Recognition meets Big Data
VisageCloud - Face Recognition meets Big DataVisageCloud - Face Recognition meets Big Data
VisageCloud - Face Recognition meets Big Data
 
Av0702 face
Av0702 faceAv0702 face
Av0702 face
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
 
Women Body Builders
Women Body BuildersWomen Body Builders
Women Body Builders
 
Academic Entrepreneurship at UCY
Academic Entrepreneurship at UCYAcademic Entrepreneurship at UCY
Academic Entrepreneurship at UCY
 
Face Recognition with Camera
Face Recognition with CameraFace Recognition with Camera
Face Recognition with Camera
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
 
Sj 공학심리학 Speech Perception
Sj 공학심리학 Speech PerceptionSj 공학심리학 Speech Perception
Sj 공학심리학 Speech Perception
 

Similar to Face Recognition by Sumudu Ranasinghe

Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Farwa Ansari
 
Face recognition
Face recognitionFace recognition
Face recognitionNaman Ahuja
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
ijiert bestjournal
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
ijiert bestjournal
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
pproject345
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
Star Link Communication Pvt Ltd
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
Tejas More
 
Real Time Image Based Attendance System using Python
Real Time Image Based Attendance System using PythonReal Time Image Based Attendance System using Python
Real Time Image Based Attendance System using Python
IRJET Journal
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
D1061825
D1061825D1061825
D1061825
IJERD Editor
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
Improved Approach for Eigenface Recognition
Improved Approach for Eigenface RecognitionImproved Approach for Eigenface Recognition
Improved Approach for Eigenface Recognition
BRNSSPublicationHubI
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
IOSR Journals
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 

Similar to Face Recognition by Sumudu Ranasinghe (20)

Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Face recognition
Face recognitionFace recognition
Face recognition
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
 
Real Time Image Based Attendance System using Python
Real Time Image Based Attendance System using PythonReal Time Image Based Attendance System using Python
Real Time Image Based Attendance System using Python
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
D1061825
D1061825D1061825
D1061825
 
2009HT12895
2009HT128952009HT12895
2009HT12895
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Improved Approach for Eigenface Recognition
Improved Approach for Eigenface RecognitionImproved Approach for Eigenface Recognition
Improved Approach for Eigenface Recognition
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
G041041047
G041041047G041041047
G041041047
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Face Recognition by Sumudu Ranasinghe

  • 1. Research Paper Analysis Ranasinghe A.A.S.P UWU/IIT/08/033 Independent Study and Seminar IIT362-1 Industrial Information Technology Uva Wellassa University Of Sri Lanka
  • 2.
  • 3. Keywords Face Detection Face Recognition
  • 4. Introduction Face recognition has become a popular area of research in computer vision and one of the most successful applications of image analysis and understanding. A set of two task: Face Identification: Given a face image that belongs to a person in a database, tell whose image it is. Face Verification: Given a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database.
  • 6. Face Detection + Recognition Detection accuracy affects the recognition stage Key issues: Correct location of key facial features (e.g. the eye corners) False detection Missed detection
  • 7. DIFFERENT APPROACHE Describe the different methods of face recognition. Feature extraction methods Holistic methods Hybrid methods
  • 8. Feature extraction methods Feature extraction is the task where we locate facial features, Eg: the eyes, the nose, and the chins etc. This task may be performed after the face detection task Or recognition time. big challenge for feature extraction methods is feature “restoration“. Facial features are invisible according to the large variation.
  • 9. Feature extraction methods This method is widely used to create individual vectors for each person in a system, the vectors are matched when an input image is being recognized.
  • 11. Holistic methods Holistic methods uses the whole face region as the input to a recognition system. focuses a holistic method using eigenfacesto recognize still faces.
  • 12. Face Recognition Using Eigenfaces The first stage is to insert a set of images into a database, these images are called the training set, this is because they will be used when we compare images and when we create the eigenfaces. The second stage is to create the eigenfaces. Eigenfacescan now be extracted from the image data by using a mathematical tool called Principal Component Analysis (PCA). When the eigenfaceshave been created, each image will be represented as a vector of weights. The system is now ready to accept incoming queries.
  • 13. Face Recognition Using Eigenfaces The weight of the incoming unknown image is found and then compared to the weights of those already in the system. If the input image's weight is over a given threshold it is considered to be unknown. The identification of the input image is done by finding the image in the database whose weights are the closest to the weights of the input image. The image in the database with the closest weight will be returned as a hit to the user of the system.
  • 14. Hybrid methods Hybrid face recognition systems uses a combination of both holistic and feature extraction methods. Hybrid method of face recognition by using 3D morphable model. The model makes it possible to change the pose and the illumination on the face.
  • 15. 3D morphablemodel Took face recognition to a new level. By being able to use a morphable3D model to create synthetic images has proven to give good results. It is a very applicable approach that solves many of the problems. system achieved a recognition rate of 90%.
  • 16. Problems of Face Recognition when comparing a database image with an input image. The main concern is of course that all images of the same face are heterogeneous. When image databases are created they contain good scenario images. concerning deferent facial expressions as well. The system must be able to know that two images of the same person with deferent facial expressions actually is the same person. makeup, posing positions, illumination conditions, and comparing images of the same person with and without glasses.
  • 17.
  • 18. Fastest and safest method of tracking employee time and attendance.
  • 19. Easy to install and use.
  • 20. Cost saving and convenient way of time tracking.
  • 21. Provide easy and efficient way of recording attendance.
  • 22. Easily manage employee time and attendance profiles.
  • 23. Get rid of buddy punching.
  • 24. Also manage employee payroll record.
  • 25. On-demand time attendance record for reference.
  • 26.
  • 27. Convenient and secure method of controlling door entry
  • 28. Authentication by Facial Biometrics to gain entry
  • 29. Higher security than conventional systems
  • 30. No keys or cards to carry
  • 31. No need to issue keys or cards for every user
  • 32. Accurate recording of arrivals and departures
  • 33. Real time monitoring of door access
  • 34.
  • 35.
  • 36. Embeddable in any web page
  • 43.
  • 45. Face detection and recognition.
  • 46. Different approaches of face Recognition.
  • 50.