SlideShare a Scribd company logo
1 of 17
1

SEMINAR PRESENTATION
ON

“Face Recognition Technology”
1.Introduction

2



The information age is quickly revolutionizing the way transactions are completed.
Everyday actions are increasingly being handled electronically, instead of with pencil and
paper or face to face. This growth in electronic transactions has resulted in a greater demand
for fast and accurate user identification and authentication. Access codes for buildings, banks
accounts and computer systems often use PIN's for identification and security clearences.



Using the proper PIN gains access, but the user of the PIN is not verified. When credit and
ATM cards are lost or stolen, an unauthorized user can often come up with the correct
personal codes. Despite warning, many people continue to choose easily guessed PIN‟s and
passwords: birthdays, phone numbers and social security numbers. Recent cases of identity
theft have highten the need for methods to prove that someone is truly who he/she claims to
be.



Face recognition technology may solve this problem since a face is undeniably connected to
its owner expect in the case of identical twins. Its nontransferable. The system can then
compare scans to records stored in a central or local database or even on a smart card.
1.1.What are biometrics ?

3



A biometric is a unique, measurable characteristic of a human being that can be used to
automatically recognize an individual or verify an individual‟s identity. Biometrics can measure
both physiological and behavioral characteristics. Physiological biometrics (based on measurements
and data derived from direct measurement of a part of the human body) include:



a. Finger-scan



b. Facial Recognition



c. Iris-scan



d. Retina-scan



e. Hand-scan
1.2. Why we choose face recognition
over other biometric ?


There are number reasons to choose face recognition. This includes the following :



a. It requires no physical interaction on behalf of the user.



b. It is accurate and allows for high enrolment and verification rates.



c. It does not require an expert to interpret the comparison result.



d. It can use your existing hardware infrastructure, existing camaras and image
capture Devices will work with no problems



e. It is the only biometric that allow you to perform passive identification in a one to.
Many environments (e.g.: identifying a terrorist in a busy Airport terminal

4
2. FACE RECOGNITION


The Face – unique part.



For face recognition there are two types of comparisons



5

1. Verification.

This is where the system compares the given individual with who that individual says
they are and gives a yes or no decision.


2. Identification.

This is where the system compares the given individual to all the Other individuals in the
database and gives a ranked list of matches.
2.1 All identification or authentication technologies operate
using the following four stages:

6





a

b

c

a. Capture: A physical or behavioural
sample is captured by the system during
Enrollment and also in identification or
verification process
b. Extraction: Unique data is extracted
from the sample and a template is created.



c. Comparison: The template is then
compared with a new sample.



d. Match/non match: The system
decides if the features extracted from the
new Samples are a match or a non match

d
2.2 COMPONENTS OF FACE RECOGNITION SYSTEMS

7



a. Enrollment module : An automated
mechanism that scans and captures a
digital or an analog image of a living
personal characteristics



b. Database : Another entity which
handles compression, processing, storage
and compression of the captured data with
stored data



c. Identification module : The third
interfaces with the application system
3. IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY


The implementation of face recognition technology includes the following three
stages:
• Data acquisition
• Input processing
• Face image classification and decision making

8
9



3.1 Data acquisition



The input can be recorded video of the speaker or a still image. A sample of 1 sec
duration consists of a 25 frame video sequence. More than one camera can be
used to produce a 3D representation of the face and to protect against the usage of
photographs to gain unauthorized access.



3.2 Input processing



A pre-processing module locates the eye position and takes care of the
surrounding lighting condition and colour variance. First the presence of faces or
face in a scene must be detected. Once the face is detected, it must be localized.



Some facial recognition approaches use the whole face while others concentrate
on facial components and/ or regions (such as lips, eyes etc). The appearance of
the face can change considerably during speech and due to facial expressions.
10


3.3 Face imageclassification and decision making



Synergetic computer are used to classify optical and audio features, respectively.
A synergetic computer is a set of algorithm that simulate synergetic phenomena.
In training phase the BIOID creates a prototype called face print for each person.
A newly recorded pattern is pre-processed and compared with each face print
stored in the database. As comparisons are made, the system assigns a value to
the comparison using a scale of one to ten. If a score is above a predetermined
threshold, a match is declared.
4.HOW FACE RECOGNITION SYSTEMS WORK


If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial
features. Software defines these landmarks as nodal points.



There are about “80 nodal points” on a human face.



Here are few nodal points that are measured by the software.
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
• chin

11
4.1 Face Bunch Graph


A Face bunch graph is created from “70 nodal
points” to obtain a general representation of
face.



Given an image the face is matched to the
Face bunch graph to find the same point.



These nodal points are measured to create a
numerical code, a string of numbers that
represents a face in the database. This code is
called face print.



Only 14 to 22 nodal points are needed for
faceit software to complete the recognition
process.

12
5. ADVANTAGES AND DISADVANTAGES


13

4.1 Advantages:
a. There are many benefits to face recognition systems such as its convinence and Social
acceptability. all you need is your picture taken for it to work.
b. Face recognition is easy to use and in many cases it can be performed without a Person even
knowing.
c. Face recognition is also one of the most inexpensive biometric in the market and Its price
should continue to go down.



4.2 Disadvantages:
a. Face recognition systems can’t tell the difference between identical twins.
6. APPLICATIONS


The natural use of face recognition technology is the replacement of PIN.



14

5.1 Government Use:

a. Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school
surveillance camera images to know child molesters.
b. Security/Counterterrorism: Access control, comparing surveillance images to Know terrorist.
c. Immigration: Rapid progression through Customs.
d. Voter verification: Where eligible politicians are required to verify their identity during a voting process
this is intended to stop “proxy‟ voting where the vote may not go as expected.


5.2 Commercial Use:
a. Residential Security: Alert homeowners of approaching personnel.
d. Banking using ATM: The software is able to quickly verify a customer’s face.
c. Physical access control of buildings areas, doors, cars or net access.
7. CONCLUSION


Face recognition technologies have been associated generally with
very costly top secure applications. Today the core technologies
have evolved and the cost of equipments is going down dramatically
due to the intergration and the increasing processing power. Certain
applications of face recognition technology are now cost effective,
reliable and highly accurate. As a result there are no technological or
financial barriers for stepping from the pilot project to widespread
deployment.

?

15
8. REFERENCES


1. Electronics for You: - Part 1 April 2001



2. Electronics World: - December 2002



5. www.facereg.com



6. www.Imagestechnology.com



7. www.ieee.com

16
Submitted in partial Fulfilment of requirement

17

For the award of the

Degree of
BACHELOR OF ENgineering
IN
INFORMATION TECHNOLOGY
Under the Supervision of:-

Submitted by:-

Mr. Malhar Trivedi

Siddharth Modi

Department of Information and Technology
L.D. COLLEGE OF ENGINEERING

More Related Content

What's hot

Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPLICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPAditya Mishra
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance systemNaomi Kulkarni
 
Artificial Passenger
Artificial PassengerArtificial Passenger
Artificial Passengerpriyanka kini
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.AasimAhmedKhanJawaad
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognitionAayush Agrawal
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 

What's hot (20)

Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognization
Face recognizationFace recognization
Face recognization
 
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APPLICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
LICENSE NUMBER PLATE RECOGNITION SYSTEM USING ANDROID APP
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Artificial Passenger
Artificial PassengerArtificial Passenger
Artificial Passenger
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 

Viewers also liked

Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face RecognitionMinh Tran
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
The human face of big data
The human face of big dataThe human face of big data
The human face of big dataVista Cheng
 
Human face of big data ppt
Human face of big data pptHuman face of big data ppt
Human face of big data pptMary Gorges
 
The Humanitarian Face of Big Data | ICCM 2013
The Humanitarian Face of Big Data | ICCM 2013The Humanitarian Face of Big Data | ICCM 2013
The Humanitarian Face of Big Data | ICCM 2013Jon Gosier
 
Recommender Systems in the Linked Data era
Recommender Systems in the Linked Data eraRecommender Systems in the Linked Data era
Recommender Systems in the Linked Data eraRoku
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Rewards & recognition
Rewards & recognitionRewards & recognition
Rewards & recognitionAnita Kumari
 
Rewards And Recognition
Rewards And RecognitionRewards And Recognition
Rewards And Recognitionrajeevgupta
 
Recommender system introduction
Recommender system   introductionRecommender system   introduction
Recommender system introductionLiang Xiang
 
Motivating And Rewarding Employees
Motivating And Rewarding EmployeesMotivating And Rewarding Employees
Motivating And Rewarding EmployeesRasha Shawoosh
 
Image attendance system
Image attendance systemImage attendance system
Image attendance systemMayank Garg
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognitionDhanush Kasargod
 

Viewers also liked (18)

Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Biometrics
BiometricsBiometrics
Biometrics
 
The human face of big data
The human face of big dataThe human face of big data
The human face of big data
 
Human face of big data ppt
Human face of big data pptHuman face of big data ppt
Human face of big data ppt
 
The Humanitarian Face of Big Data | ICCM 2013
The Humanitarian Face of Big Data | ICCM 2013The Humanitarian Face of Big Data | ICCM 2013
The Humanitarian Face of Big Data | ICCM 2013
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
reward and recognition
reward and recognitionreward and recognition
reward and recognition
 
Recommender Systems in the Linked Data era
Recommender Systems in the Linked Data eraRecommender Systems in the Linked Data era
Recommender Systems in the Linked Data era
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Rewards & recognition
Rewards & recognitionRewards & recognition
Rewards & recognition
 
Rewards And Recognition
Rewards And RecognitionRewards And Recognition
Rewards And Recognition
 
Student Attendance System
Student Attendance SystemStudent Attendance System
Student Attendance System
 
Recommender system introduction
Recommender system   introductionRecommender system   introduction
Recommender system introduction
 
Motivating And Rewarding Employees
Motivating And Rewarding EmployeesMotivating And Rewarding Employees
Motivating And Rewarding Employees
 
Image attendance system
Image attendance systemImage attendance system
Image attendance system
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 

Similar to Face recognition technology - BEST PPT

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET Journal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 

Similar to Face recognition technology - BEST PPT (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Face recognition technology - BEST PPT

  • 2. 1.Introduction 2  The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearences.  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN‟s and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have highten the need for methods to prove that someone is truly who he/she claims to be.  Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.
  • 3. 1.1.What are biometrics ? 3  A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual‟s identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include:  a. Finger-scan  b. Facial Recognition  c. Iris-scan  d. Retina-scan  e. Hand-scan
  • 4. 1.2. Why we choose face recognition over other biometric ?  There are number reasons to choose face recognition. This includes the following :  a. It requires no physical interaction on behalf of the user.  b. It is accurate and allows for high enrolment and verification rates.  c. It does not require an expert to interpret the comparison result.  d. It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems  e. It is the only biometric that allow you to perform passive identification in a one to. Many environments (e.g.: identifying a terrorist in a busy Airport terminal 4
  • 5. 2. FACE RECOGNITION  The Face – unique part.  For face recognition there are two types of comparisons  5 1. Verification. This is where the system compares the given individual with who that individual says they are and gives a yes or no decision.  2. Identification. This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 6. 2.1 All identification or authentication technologies operate using the following four stages: 6   a b c a. Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process b. Extraction: Unique data is extracted from the sample and a template is created.  c. Comparison: The template is then compared with a new sample.  d. Match/non match: The system decides if the features extracted from the new Samples are a match or a non match d
  • 7. 2.2 COMPONENTS OF FACE RECOGNITION SYSTEMS 7  a. Enrollment module : An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics  b. Database : Another entity which handles compression, processing, storage and compression of the captured data with stored data  c. Identification module : The third interfaces with the application system
  • 8. 3. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY  The implementation of face recognition technology includes the following three stages: • Data acquisition • Input processing • Face image classification and decision making 8
  • 9. 9  3.1 Data acquisition  The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access.  3.2 Input processing  A pre-processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized.  Some facial recognition approaches use the whole face while others concentrate on facial components and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably during speech and due to facial expressions.
  • 10. 10  3.3 Face imageclassification and decision making  Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype called face print for each person. A newly recorded pattern is pre-processed and compared with each face print stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared.
  • 11. 4.HOW FACE RECOGNITION SYSTEMS WORK  If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Software defines these landmarks as nodal points.  There are about “80 nodal points” on a human face.  Here are few nodal points that are measured by the software. • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line • chin 11
  • 12. 4.1 Face Bunch Graph  A Face bunch graph is created from “70 nodal points” to obtain a general representation of face.  Given an image the face is matched to the Face bunch graph to find the same point.  These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print.  Only 14 to 22 nodal points are needed for faceit software to complete the recognition process. 12
  • 13. 5. ADVANTAGES AND DISADVANTAGES  13 4.1 Advantages: a. There are many benefits to face recognition systems such as its convinence and Social acceptability. all you need is your picture taken for it to work. b. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. c. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down.  4.2 Disadvantages: a. Face recognition systems can’t tell the difference between identical twins.
  • 14. 6. APPLICATIONS  The natural use of face recognition technology is the replacement of PIN.  14 5.1 Government Use: a. Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school surveillance camera images to know child molesters. b. Security/Counterterrorism: Access control, comparing surveillance images to Know terrorist. c. Immigration: Rapid progression through Customs. d. Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop “proxy‟ voting where the vote may not go as expected.  5.2 Commercial Use: a. Residential Security: Alert homeowners of approaching personnel. d. Banking using ATM: The software is able to quickly verify a customer’s face. c. Physical access control of buildings areas, doors, cars or net access.
  • 15. 7. CONCLUSION  Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the intergration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment. ? 15
  • 16. 8. REFERENCES  1. Electronics for You: - Part 1 April 2001  2. Electronics World: - December 2002  5. www.facereg.com  6. www.Imagestechnology.com  7. www.ieee.com 16
  • 17. Submitted in partial Fulfilment of requirement 17 For the award of the Degree of BACHELOR OF ENgineering IN INFORMATION TECHNOLOGY Under the Supervision of:- Submitted by:- Mr. Malhar Trivedi Siddharth Modi Department of Information and Technology L.D. COLLEGE OF ENGINEERING