SlideShare a Scribd company logo
Facial Recognition


                     Presented by :
                             J.S.V. Suresh Kumar
                              09131A1223
                             21/01/2013
03/12/13                                           1
Outline
1. Introduction
2. Biometrics
3. History
4. Facial Recognition
5. Implementation
6. How it works
7. Strengths & Weaknesses
8. Applications
9. Conclusion
10. Refrences

03/12/13                         2
Introduction

 Everyday actions are increasingly being handled
  electronically, instead of pencil and paper or face to
  face.

 This growth in electronic transactions results in
  great demand for fast and accurate user
  identification and authentication.


03/12/13                                               3
 Access codes for buildings, banks accounts and
    computer systems often use PIN's for
    identification and security clearences.
   Using the proper PIN gains access, but the user
    of the PIN is not verified. When credit and
    ATM cards are lost or stolen, an unauthorized
    user can often come up with the correct
    personal codes.
   Face recognition technology may solve this
    problem since a face is undeniably connected
    to its owner expect in the case of identical
    twins.

03/12/13                                              4
 A biometric is a unique, measurable characteristic
  of a human being that can be used to automatically
  recognize an individual or verify an individual’s
  identity.
 Biometrics can measure both physiological and
  behavioral characteristics.
 Physiological biometrics:- This biometrics is based
  on measurements and data derived from direct
  measurement of a part of the human body.
 Behavioral biometrics:- this biometrics is based on
  measurements and data derived from an action.
03/12/13                                                5
Types Of Biometrics
     PHYSIOLOGICAL        BEHAVIORAL

a. Finger-scan          a. Voice-scan
b. Facial Recognition   b. Signature-scan
c. Iris-scan            c. Keystroke-scan
d. Retina-scan
e. Hand-scan



03/12/13                                    6
Facial Recognition ???

    It requires no physical interaction on behalf of
     the user.
    It is accurate and allows for high enrolment
     and verification rates.
    It can use your existing hardware
     infrastructure, existing camaras and image
     capture Devices will work with no problems


03/12/13                                                7
History
 In 1960s, the first semi-automated system for facial
  recognition to locate the features(such as eyes, ears,
  nose and mouth) on the photographs.
 In 1970s, Goldstein and Harmon used 21 specific
  subjective markers such as hair color and lip
  thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
  algebra technique, to the face recognition.


03/12/13                                               8
Facial Recognition
In     Facial recognition   there   are   two   types   of
     comparisons:-

      VERIFICATION- The system compares the given
     individual with who they say they are and gives a yes
     or no decision.

 IDENTIFICATION- The system compares the given
  individual to all the Other individuals in the database
  and gives a ranked list of matches.
03/12/13                                                 9
Contd…
 All identification or authentication technologies
  operate using the following four stages:
 Capture: A physical or behavioural sample is
  captured by the system during Enrollment and
  also in identification or verification process.
 Extraction: unique data is extracted from the
  sample and a template is created.
 Comparison: the template is then compared
  with a new sample.
 Match/non-match: the system decides if the
  features extracted from the new Samples are a
  match or a non match.
03/12/13                                              10
Implementation

     The implementation of face recognition technology
    includes the following four stages:
•   Image acquisition
•   Image processing
•   Distinctive characteristic location
•   Template creation
•   Template matching



03/12/13                                            11
Image acquisition
• Facial-scan technology can acquire faces from almost
  any static camera or video system that generates
  images of sufficient quality and resolution.
• High-quality enrollment is essential to eventual
  verification and identification enrollment images
  define the facial characteristics to be used in all
  future authentication events.




03/12/13                                            12
03/12/13   13
Image Processing
• Images are cropped such that the ovoid facial image
  remains, and color images are normally converted to
  black and white in order to facilitate initial
  comparisons based on grayscale characteristics.
• First the presence of faces or face in a scene must
  be detected. Once the face is detected, it must be
  localized and Normalization process may be required
  to bring the dimensions of the live facial sample in
  alignment with the one on the template.


03/12/13                                            14
Distinctive characteristic location
 All facial-scan systems attempt to match visible facial
  features in a fashion similar to the way people
  recognize one another.
 The features most often utilized in facial-scan
  systems are those least likely to change significantly
  over time: upper ridges of the eye sockets, areas
  around the cheekbones, sides of the mouth, nose
  shape, and the position of major features relative to
  each other.


03/12/13                                               15
Contd..

 Behavioural changes such as alteration of hairstyle,
  changes in makeup, growing or shaving facial hair,
  adding or removing eyeglasses are behaviours that
  impact the ability of facial-scan systems to locate
  distinctive features, facial-scan systems are not yet
  developed to the point where they can overcome
  such variables.



03/12/13                                              16
Template creation




03/12/13                       17
• Enrollment templates are normally created from
   a multiplicity of processed facial images.
 • These templates can vary in size from less than
   100 bytes, generated through certain vendors
   and to over 3K for templates.
 • The 3K template is by far the largest among
   technologies considered physiological biometrics.
 • Larger templates are normally associated with
   behavioral biometrics,



03/12/13                                               18
Template matching
   • It compares match templates against enrollment
     templates.
   • A series of images is acquired and scored against
     the enrollment, so that a user attempting 1:1
     verification within a facial-scan system may have
     10 to 20 match attempts take place within 1 to 2
     seconds.
   • facial-scan is not as effective as finger-scan or iris-
     scan in identifying a single individual from a large
     database, a number of potential matches are
     generally returned after large-scale facial-scan
     identification searches.
03/12/13                                                       19
How Facial Recognition System Works

• Facial recognition software is based on the ability to
  first recognize faces, which is a technological feat in
  itself. If you look at the mirror, you can see that your
  face has certain distinguishable landmarks. These are
  the peaks and valleys that make up the different
  facial features.
• VISIONICS defines these landmarks as nodal points.
  There are about 80 nodal points on a human face.



03/12/13                                                 20
Contd..
     Here are few nodal points that are measured by the
     software.
1.   distance between the eyes
2.   width of the nose
3.   depth of the eye socket
4.   cheekbones
5.   jaw line
6.   chin



03/12/13                                              21
SOFTWARE
 Detection- when the system is attached to a video
  surveilance system, the recognition software searches
  the field of view of a video camera for faces. If there is
  a face in the view, it is detected within a fraction of a
  second. A multi-scale algorithm is used to search for
  faces in low resolution. The system switches to a high-
  resolution search only after a head-like shape is
  detected.
 Alignment- Once a face is detected, the system
  determines the head's position, size and pose. A face
  needs to be turned at least 35 degrees toward the
  camera for the system to register it.
03/12/13                                                  22
 Normalization-The image of the head is scaled and
   rotated so that it can be registered and mapped into
   an appropriate size and pose. Normalization is
   performed regardless of the head's location and
   distance from the camera. Light does not impact the
   normalization process.
  Representation-The system translates the facial data
   into a unique code. This coding process allows for
   easier comparison of the newly acquired facial data to
   stored facial data.
  Matching- The newly acquired facial data is
   compared to the stored data and (ideally) linked to at
   least one stored facial representation.
03/12/13                                              23
 The system maps the face and creates a
       faceprint, a unique numerical code for that face.
       Once the system has stored a faceprint, it can
       compare it to the thousands or millions of
       faceprints stored in a database.
      Each faceprint is stored as an 84-byte file.




03/12/13                                                   24
Strengths

 It has the ability to leverage existing image
  acquisition equipment.
 It can search against static images such as driver’s
  license photographs.
 It is the only biometric able to operate without user
  cooperation.




03/12/13                                             25
Weaknesses

    Changes in acquisition environment
     reduce matching accuracy.
    Changes in physiological characteristics
     reduce matching accuracy.
    It has the potential for privacy abuse due
     to noncooperative enrollment and
     identification capabilities.
03/12/13                                          26
Applications
 Security/Counterterrorism. Access control, comparing
  surveillance images to Know terrorist.
 Day Care: Verify identity of individuals picking up the
  children.
 Residential     Security:   Alert   homeowners       of
  approaching personnel
 Voter verification: Where eligible politicians are
  required to verify their identity during a voting
  process this is intended to stop voting where the vote
  may not go as expected.
 Banking using ATM: The software is able to quickly
  verify a customer’s face.
03/12/13                                               27
Conclusion
• Factors such as environmental changes and mild
  changes in appearance impact the technology to a
  greater degree than many expect.
• For implementations where the biometric system
  must verify and identify users reliably over time,
  facial scan can be a very difficult, but not impossible,
  technology to implement successfully.




03/12/13                                                28
References
• www.biometricgroup.com/wiley
• Biometrics- identify verification in a
  networked world by Samir Nanavati, Micheal
  Thieme and Raj Nanavati.
• History- www.biometrics.gov.




03/12/13                                       29
Thank You…




03/12/13                30

More Related Content

What's hot

Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
Vishnu Mysterio
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
Akash Satamkar
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
Shruti Chandra
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
Tarun tyagi
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Abstract Silent Sound Technology
Abstract   Silent Sound TechnologyAbstract   Silent Sound Technology
Abstract Silent Sound Technology
vishnu murthy
 
Image recognition
Image recognitionImage recognition
Image recognition
Aseed Usmani
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 

What's hot (20)

Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Abstract Silent Sound Technology
Abstract   Silent Sound TechnologyAbstract   Silent Sound Technology
Abstract Silent Sound Technology
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 

Viewers also liked

Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
FaceNet: A Unified Embedding for Face Recognition and Clustering
FaceNet: A Unified Embedding for Face Recognition and ClusteringFaceNet: A Unified Embedding for Face Recognition and Clustering
FaceNet: A Unified Embedding for Face Recognition and Clustering
ssuser1e0c53
 
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Universitat Politècnica de Catalunya
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
Arjun Agnihotri
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
Dhanush Kasargod
 
딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)
딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)
딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)
Daehee Han
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
Carol Smith
 

Viewers also liked (8)

Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
FaceNet: A Unified Embedding for Face Recognition and Clustering
FaceNet: A Unified Embedding for Face Recognition and ClusteringFaceNet: A Unified Embedding for Face Recognition and Clustering
FaceNet: A Unified Embedding for Face Recognition and Clustering
 
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
Face Recognition (D2L5 2017 UPC Deep Learning for Computer Vision)
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)
딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)
딥러닝을 이용한 얼굴인식 (Face Recogniton with Deep Learning)
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017
 

Similar to Face recognition ppt

face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
Satyanarayana Tammana
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
BHARATHGOWDAHA
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
Harshavardhan851231
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
Shailesh Thakur
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
ijiert bestjournal
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Murlidhar Sarda
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
Sandeep Garg
 

Similar to Face recognition ppt (20)

face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
 

More from Santosh Kumar

human computer interface
human computer interfacehuman computer interface
human computer interfaceSantosh Kumar
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence pptSantosh Kumar
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systemsSantosh Kumar
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technologySantosh Kumar
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
Santosh Kumar
 

More from Santosh Kumar (8)

Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Bit torrent ppt
Bit torrent pptBit torrent ppt
Bit torrent ppt
 
Software technologies in defence ppt
Software technologies in defence pptSoftware technologies in defence ppt
Software technologies in defence ppt
 
Holographic memory systems
Holographic memory systemsHolographic memory systems
Holographic memory systems
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
M commerce ppt
M commerce pptM commerce ppt
M commerce ppt
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Face recognition ppt

  • 1. Facial Recognition Presented by : J.S.V. Suresh Kumar 09131A1223 21/01/2013 03/12/13 1
  • 2. Outline 1. Introduction 2. Biometrics 3. History 4. Facial Recognition 5. Implementation 6. How it works 7. Strengths & Weaknesses 8. Applications 9. Conclusion 10. Refrences 03/12/13 2
  • 3. Introduction  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication. 03/12/13 3
  • 4.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearences.  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. 03/12/13 4
  • 5.  A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity.  Biometrics can measure both physiological and behavioral characteristics.  Physiological biometrics:- This biometrics is based on measurements and data derived from direct measurement of a part of the human body.  Behavioral biometrics:- this biometrics is based on measurements and data derived from an action. 03/12/13 5
  • 6. Types Of Biometrics PHYSIOLOGICAL BEHAVIORAL a. Finger-scan a. Voice-scan b. Facial Recognition b. Signature-scan c. Iris-scan c. Keystroke-scan d. Retina-scan e. Hand-scan 03/12/13 6
  • 7. Facial Recognition ???  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems 03/12/13 7
  • 8. History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition. 03/12/13 8
  • 9. Facial Recognition In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. 03/12/13 9
  • 10. Contd…  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match. 03/12/13 10
  • 11. Implementation The implementation of face recognition technology includes the following four stages: • Image acquisition • Image processing • Distinctive characteristic location • Template creation • Template matching 03/12/13 11
  • 12. Image acquisition • Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution. • High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events. 03/12/13 12
  • 13. 03/12/13 13
  • 14. Image Processing • Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics. • First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template. 03/12/13 14
  • 15. Distinctive characteristic location  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.  The features most often utilized in facial-scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other. 03/12/13 15
  • 16. Contd..  Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables. 03/12/13 16
  • 18. • Enrollment templates are normally created from a multiplicity of processed facial images. • These templates can vary in size from less than 100 bytes, generated through certain vendors and to over 3K for templates. • The 3K template is by far the largest among technologies considered physiological biometrics. • Larger templates are normally associated with behavioral biometrics, 03/12/13 18
  • 19. Template matching • It compares match templates against enrollment templates. • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds. • facial-scan is not as effective as finger-scan or iris- scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial-scan identification searches. 03/12/13 19
  • 20. How Facial Recognition System Works • Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. • VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face. 03/12/13 20
  • 21. Contd.. Here are few nodal points that are measured by the software. 1. distance between the eyes 2. width of the nose 3. depth of the eye socket 4. cheekbones 5. jaw line 6. chin 03/12/13 21
  • 22. SOFTWARE  Detection- when the system is attached to a video surveilance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high- resolution search only after a head-like shape is detected.  Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it. 03/12/13 22
  • 23.  Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.  Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation. 03/12/13 23
  • 24.  The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database.  Each faceprint is stored as an 84-byte file. 03/12/13 24
  • 25. Strengths  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation. 03/12/13 25
  • 26. Weaknesses  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to noncooperative enrollment and identification capabilities. 03/12/13 26
  • 27. Applications  Security/Counterterrorism. Access control, comparing surveillance images to Know terrorist.  Day Care: Verify identity of individuals picking up the children.  Residential Security: Alert homeowners of approaching personnel  Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop voting where the vote may not go as expected.  Banking using ATM: The software is able to quickly verify a customer’s face. 03/12/13 27
  • 28. Conclusion • Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully. 03/12/13 28
  • 29. References • www.biometricgroup.com/wiley • Biometrics- identify verification in a networked world by Samir Nanavati, Micheal Thieme and Raj Nanavati. • History- www.biometrics.gov. 03/12/13 29