Face recognition technology uses machine learning algorithms to identify or verify a person's identity from digital images or video frames. The process involves detecting faces, applying preprocessing techniques like filtering and scaling, training classifiers using labeled face images, and then classifying new faces. Common machine learning algorithms used include K-nearest neighbors, naive Bayes, decision trees, and locally weighted learning. The proposed system detects faces, builds a tabular dataset from pixel values, trains classifiers, and evaluates performance on a test set. Software applies techniques like detection, alignment, normalization, and matching to encode faces for comparison. Face recognition has advantages like convenience and low cost, and applications in security, banking, and more.
Face recognition system plays an important role when its comes to security, In this slide using of neural networking system for face recognition system has demonstrated.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
Face recognition system plays an important role when its comes to security, In this slide using of neural networking system for face recognition system has demonstrated.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
Presentation on Face detection and recognition - Credits goes to Mr Shriram, "https://www.hackster.io/sriram17ei/facial-recognition-opencv-python-9bc724"
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.
This slide is all about a detailed description of the Face Recognition System.
This application was design with help of OpenCv and C#.
Facial recognition (or face recognition) is a type of bio-metric application that can identify a specific individual in a digital image by analysing and comparing patterns.
Face recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If we look at the mirror, we can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.
This application take picture of your face and after storing it.
Then it start identifying all face which are store in database.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Face detection basedon image processing by using the segmentation methods for detection of the various types of the faces to helpfull for the many different careers and it will easy to do.
Presentation on Face detection and recognition - Credits goes to Mr Shriram, "https://www.hackster.io/sriram17ei/facial-recognition-opencv-python-9bc724"
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.
This slide is all about a detailed description of the Face Recognition System.
This application was design with help of OpenCv and C#.
Facial recognition (or face recognition) is a type of bio-metric application that can identify a specific individual in a digital image by analysing and comparing patterns.
Face recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If we look at the mirror, we can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.
This application take picture of your face and after storing it.
Then it start identifying all face which are store in database.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Face detection basedon image processing by using the segmentation methods for detection of the various types of the faces to helpfull for the many different careers and it will easy to do.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
With the advancement of human-computer interaction capabilities of robots, computer vision surveillance systems involving security yields a large impact in the research industry by helping in digitalization of certain security processes. Recognizing a face in the computer vision involves identification and classification of which faces belongs to the same person by means of comparing face embedding vectors. In an organization that has a large and diverse labelled dataset on a large number of epoch, oftentimes, creates a training difficulties involving incompatibility in different versions of face embedding that leads to poor face recognition accuracy. In this paper, we will design and implement robotic vision security surveillance system incorporating hybrid combination of MTCNN for face detection, and FaceNet as the unified embedding for face recognition and clustering.
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESPNandaSai
Digital image processing is vast fields which can be using various applications. Which include Detection of criminal face, fingerprint authentication system, in medical field, object recognition etc. Brain tumor detection plays an important role in medical field. Brain tumor detection is detection of tumor affected part in the brain along with its shape size and boundary, so it useful in medical field.
Segmentation and the subsequent quantitative assessment of lesions in medical images provide valuable information for the analysis of neuropathologist and are important for planning of treatment strategies, monitoring of disease progression and prediction of patient outcome. For a better understanding of the pathophysiology of diseases, quantitative imaging can reveal clues about the disease characteristics and effects on particular anatomical structures
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
One of the least complex method for recognizing individual character is by taking a gander at the face. Face Recognition is a kind of Personal Identification System that utilizes an individual's very own characteristics to decide their character. The Facial Expressions likewise convey rich data about human relations, feelings and assume a fundamental part in human correspondence. Programmed Face Detection and Expression Recognition had been concentrated on worldwide in most recent twenty years, which has turned into the exceptionally dynamic examination region in Computer Vision and Pattern Recognition. The necessity for Automatic Recognition and Surveillance Systems, the interest in human visual framework on face acknowledgment, and the plan of human-PC connection point are a portion of the causes. Face Detection can be applied for a wide assortment of issues like Image and Film Processing, Human-Computer Interaction, Criminal Identification, Image Database Management and so on.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. 2
INDEX
Biometrics
Face recognition
Different approaches
ML Algorithm
Proposed System
Software used in face recognition Technology
Advantage
Application
Conclusion
References
3. 3
“A biometric is a physiological or behavioral characteristic
of a human being that can distinguish one person from
another and that theoretically can be used for identification
or verification of identity.”
WHAT IS BIOMETRICS ?
Biometric applications available today are
categorized into 2 sectors
Psychological: Iris, Fingerprints, Hand, Retinal and Face
recognition
Behavioral: Voice, Typing pattern, Signature
4. Face Recognition
Face recognition systems (FRSs) are an important field in computer
vision, because it represent a non-invasive BI technique.
1. A face detection algorithm is used for extracting faces from
video frames (training videos) and generating a face database.
2. Filtering and preprocessing are applied to face images obtained
in the previous step.
3. A collection of machine learning algorithms are trained using as
input data the faces obtained in the previous step.
4. Finally, the classifiers are used for classify faces obtained from
video frames
5. Facial recognition is a form of computer vision that uses faces to
attempt to identify a person or verify a person’s claimed identity.
For face recognition there are two types of comparisons,
cont…
1) IDENTFICATION
- figure out “Who is X?”
- accomplished by system performing a “one-to-many ”
search
6. 2) VERIFICATION
- answer the question “Is this X?”
- accomplished by the system performing a “one-to-one”
search
cont…
7. DIFFERENT APPROACHES
Describe the different methods of face recognition.
Feature extraction methods
The input image to identify and extract (and measure) distinctive
facial features such as the eyes, mouth, nose, etc.
Compute the geometric relationships among those facial points,
thus reducing the input facial image to a vector of geometric
features
Holistic methods
Holistic approaches attempt to identify faces using global
representations, i.e., descriptions based on the entire image rather
than on local features of the face
8. MLAlgorithms
During the past decades, several ML algorithms have been
proposed for classification tasks.
Most of them are from the theoretical view under some
assumption about data distribution, characteristics of the classification
task, signal to-noise-ratio, etc.
In reality, these assumptions are often hard to be verified.
Therefore, a practical solution for selecting an appropriate model for a
given classification task is to experimentally compare these
algorithms.
Five widely used machine classifiers
K-Nearest Neighbor (KNN)
Locally-Weighted Learning (LWL)
Naive Bayes classifier (NB)
Decision Table Classifier (DT)
Single Decision Tree (SDT).
9. Single Decision Tree (SDT) :
Decision tree induction is the learning of decision trees from class-
labeled training tuple.
A decision tree is a flowchart-like tree structure.
Each internal node (non leaf node) denotes a test on an attribute.
Each branch represents an outcome of the test.
Each leaf node (or terminal node) holds a class label.
The topmost node in a tree is the root node.
A path is traced from the root to a leaf node.
10. Single Decision Tree (SDT) :
Most algorithms for decision tree induction follow a top-down
approach.
Starts with a training set of tuples and their associated class labels.
The training set is recursively partitioned into smaller subsets as the
tree is being built.
To split D into smaller partitions according to the outcomes of the
splitting criterion.
The specific algorithm for generating the decision tree is called
C4.5 algorithm.
11. Consider the two different videos of 10-second duration were used.
A total of 10x30x2 = 600 frames where processed. In the input
video, there was 6 different individuals, representing a total of 3, 600
samples (600 for each individual). Three versions of the dataset were
generated: one for a 100 x 100 pixels face resolution, one for a 50 x 50
pixels face resolution, and finally one for a 25 x 25 pixels face
resolution
cont…
13. Face Detection
Face detector implemented on OpenCV.
Faces were detected using the function cvHaarDetectObjects.
The Semi-Aided Labeling Module (SALM) reads the input
video, and for each frame where at least one face was detected by
the face detection module.
Filtering and Preprocessing (FPM)
This module performs the following transformations:
RGB to Gray scale Transformation: For reducing the amount of
data to be processed, a 24-bit per pixel RGB format is transformed
into a 8-bit per pixel gray-scale format.
Scaling: The face images are scaled to a fixed number of rows
and columns. The output resolution for each face can be set by
user according to the required accuracy.
cont…
14. Tabular Dataset Building Module (TDBM)
This module obtains the image pixels, and generates a tabular
dataset.
where rows are the total number of subjects, and the columns are
the image pixels.
The final column represents the class attribute.
Training
For performing the training of the classification algorithms, the
following steps are required:
Permute and split dataset. This operation is performed by the
Random Permutation and Splitting Module (RPSM). Basically, a
random permutation of the samples contained in the tabular dataset
is performed, and the resulting dataset is divided into two datasets:
the training dataset and the test dataset.
cont…
15. Train classification algorithms. Each classification algorithm takes
as input the training data set generated by the RPSM, and performs
the model building for each classifier. Later, the model for each
classifier is stored in disk for use it later in the classification step.
Classification
In this module, with the help of the previous trained
classifiers, takes as input the faces from the test set, applies filter
and pre-preprocessing operators, and evaluates the test face in each
model generated by the trained classifiers.
After doing this comparison, face image is classified with the label
or name predicted by each classified.
The output of each classified is processed by the Performance
Evaluation Module (PEM), which generates a table with a
comparison among several classifiers.
cont…
16. SOFTWARE USED IN FACE
RECOGNITION TECHNOLOGY
Facial recognition software falls into a larger group of
technologies known as biometrics.
Here is the basic process that is used by the Face system to
capture and compare images
Detection
When the system is attached to a video surveillance system, the
recognition software searches the field of view of a video camera
for faces.
17. If there is a face in the view, it is detected within a fraction of a
second. A multi-scale algorithm is used to search for faces in low
resolution.
Alignment
Once a face is detected, the system determines the head's position,
size and pose. A face needs to be turned at least 35 degrees toward
the camera for the system to register it.
Normalization
Normalization is performed regardless of the head's location and
distance from the camera. Light does not impact the normalization
process.
Representation
The system translates the facial data into a unique code. This
coding process allows for easier comparison of the newly acquired
facial data to stored facial data.
18. Matching
The newly acquired facial data is compared to the stored data and
linked to at least one stored facial representation. This is the
mathematical technique the system uses to encode faces. The system
can match multiple face prints at a rate of 60 million per minute from
memory or 15 million per minute from hard disk. The comparison
using a scale of one to 10. If a score is above a predetermined
threshold, a match is declared.
20. APPLICATIONS
1. Replacement of PIN
2. Border control
3. Voter verification
4. Computer security
5. Government Use,
a. Security/Counterterrorism.
b. Immigration
8. Commercial Use,
a. Residential Security
b. Banking using ATM
21. This technique evaluate the suitability of both computer vision
and ML techniques for solving the problem of face detection and
recognition. Face recognition technologies have been associated
generally with very costly top secure applications. Today the core
technologies have evolved and the cost of equipment’s is going
down dramatically due to the integration and the increasing
processing power.
CONCLUSION
22. References
1. E. Garc´ ıa Amaro, M.A. Nu ˜ no-Maganda and M. Morales-Sandoval, “Evaluation of Machine
Learning Techniques for Face Detection and Recognition”, IEEE 2012.
2. Claudia Iancu, Peter Corcoran and Gabriel Costache,” A Review of Face Recognition
Techniques for In-Camera Applications”, IEEE 2007.
3. Brian C. Becker, Enrique G.Ortiz, “Evaluation of Face Recognition Techniques for Application
to Facebook ” 2008 IEEE
4. D. Bhattacharyya, R. Ranjan, F. Alisherov, and M. Choi, “Biometric authentication: A review,”
International Journal of u- and e- Service, Science and Technology, vol. 3, no. 2, pp. 23–
27, 2009.
5. C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics).
Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2006
6. G. Bradski and A. Kaehler, Learning OpenCV. O’Reilly Media Inc., 2008.