SlideShare a Scribd company logo
FACE RECOGNITION
TECHNOLOGY

SARATH GOVIND K.K
S7 IT
NO:33
GECI
Introduction
• Face recognition is a challenging task in
pattern recognition research.
• Most technology are based on image
• It ensure user authentication and security.
What are biometrics?
• A biometric is a unique, measurable
characteristic of a human being .
• used to automatically recognize an individual
or verify an individual’s identity.
• measure both physiological and behavioral
characteristics.
Physiological biometrics
•
•
•
•
•

a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
Behavioral biometrics
• based on measurements and data derived
from an action.
• a. Voice-scan
• b. Signature-scan
• c. Keystroke-scan
Why we choose face recognition over
other biometric?
• It requires no physical interaction on behalf of
the user.
• It can use your existing hardware
infrastructure, existing cameras and image
capture Devices will work with no problems
The Face
• The face is an important part of who you are
and how people identify you.
• Expect in the case of identical twins
Continued..
• In face recognition there are two types of
comparisons
• Verification and identification
Verification
• This is where the system compares the given
individual with who that individual says they
are, and gives a yes or no decision.
Identification
• This is where the system compares the given
individual to all the Other individuals in the
database and gives a ranked list of matches.
Continued…
• All identification or authentication
technologies operate using the following four
stages:
• Capture
• Extraction
• Comparison
• Match/non match
Capture
• A physical or behavioral sample is captured by
the system during Enrollment and also in
identification or verification process
Extraction
• unique data is extracted from the sample and
a template is created.
Comparison
• the template is then compared with a new
sample stored in the data base
Match /non match
• the system decides if the features extracted
from the new Samples are a match or a non
match
Continued..
• Face recognition technology analyze the
unique shape, pattern and positioning of the
facial features.
• Face recognition is very complex technology
and is largely software based.
• The face recognition system locates the head
and finally the eyes of the individual.
Continued..
• A matrix is then developed based on the
characteristics of the Individual’s face.
• This matrix is then compared to matrices that
are in a database and a similarity score is
generated for each comparison.
Capturing methods
• Video imaging
• Thermal imaging
Video imaging
• Video imaging is more common as standard
video cameras can be used .
• The complete facial image is usually captured
and a number of points on the face can then
be mapped, position of the eyes, mouth, nose
tip and the nostrils as a example.
Thermal imaging
• It has better accuracy .
• it uses facial temperature variations caused by
vein structure as the distinguishing traits.
• As the heat pattern is emitted from the face
itself without source of external radiation
these systems can capture images despite the
lighting condition, even in the dark.
Thermal imaging continued..
• The drawback is high cost.
• They are more expensive than standard video
cameras.
Block diagram..
• Fig 1.
CAPTURE

EXTRACT

COMPARISON

MATCH/
NO MATCH

ACCEPT/
REJUCT
Components of face recognition
system
• An automated mechanism that scans and
captures a digital or an analog image of a living
personal characteristics.(enrollment module)
• Another entity which handles compression,
processing, storage and compression of the
captured data with stored data (database)
• The third interfaces with the application system (
identification module)
Explanation
• User interface captures the analog or digital
image of the person's face. In the enrollment
module the obtained sample is preprocessed
and analyzed. This analyzed data is stored in
the database for the purpose of future
comparison.
Continued..
• The database compresses the obtained
sample and stores it. It should have retrieval
property also that is it compares all the stored
sample with the newly obtained sample and
retrieves the matched sample for the purpose
of verification by the user and determine
whether the match declared is right or wrong.
Continued..
• The verification module also consists of a
preprocessing system.
• Verification means the system checks as to who
the person says he or she is and gives a yes or no
decision.
• In this module the newly obtained sample is
preprocessed and compared with the sample
stored in the database.
• The decision is taken depending on the match
obtained from the database. Correspondingly the
sample is accepted or rejected.
Performance
• False acceptance rates(FAR)
• False rejection rates(FRR)
FAR
• The probability that a system will incorrectly
identify an individual or will fail to reject an
imposter.
• It is also called as type 2 error rate
FAR
• FAR= NFA/NIIA
• Where FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter
identification attempts
FRR
• The probability that a system will fail to
identify an enrollee. It is also called
• type 1 error rate.
FRR
•
•
•
•

FRR= NFR/NEIA
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification
attempt
Response time
• The time period required by a biometric
system to return a decision on identification of
a sample.
Threshold/ decision Threshold:
• The acceptance or rejection of a data is
dependent on the match score falling above
or below the threshold.
• The threshold is adjustable so that the system
can be made more or less strict; depending on
the requirements of any given application.
Conclusion
• Face recognition technologies have been
associated generally with very costly top secure
applications. Today the core technologies have
evolved and the cost of equipments is going
down dramatically due to the integration and the
increasing processing power. Certain applications
of face recognition technology are now cost
effective, reliable and highly accurate. As a result
there are no technological or financial barriers for
stepping from the pilot project to widespread
deployment.
References
• IEEE Intelligent Systems
• M.A. Turk and A.P. Pent land, “Face
Recognition Using Eigen faces”, IEEE Conf. on
Computer Vision and Pattern Recognition, pp.
586-591, 1991.

More Related Content

What's hot

Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Face recognition
Face recognitionFace recognition
Face recognition
Satyendra Rajput
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
Akash Satamkar
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face Detection
Face DetectionFace Detection
Face Detection
Reber Novanta
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
hetvi naik
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
Dharmesh Tank
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 

What's hot (20)

Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
face detection
face detectionface detection
face detection
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
Ankit Gupta
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
Minh Tran
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
BioEnable
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
Wuxi Junyu Technology Co.,Ltd. (China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyDivya Tirunagari
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
Md. Atiqur Rahman
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
Marwan H. Noman
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
Sindhi Madhuri
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
Wesley De Neve
 
Academic Entrepreneurship at UCY
Academic Entrepreneurship at UCYAcademic Entrepreneurship at UCY

Viewers also liked (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
 
Women Body Builders
Women Body BuildersWomen Body Builders
Women Body Builders
 
Academic Entrepreneurship at UCY
Academic Entrepreneurship at UCYAcademic Entrepreneurship at UCY
Academic Entrepreneurship at UCY
 

Similar to Face recognition technology

Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
Mayank Raiborde
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
shivagreenevv
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
Arjun Agnihotri
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
Harshavardhan851231
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 

Similar to Face recognition technology (20)

Face recognition
Face recognitionFace recognition
Face recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face recognition
Face recognition Face recognition
Face recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Face recognition technology

  • 2. Introduction • Face recognition is a challenging task in pattern recognition research. • Most technology are based on image • It ensure user authentication and security.
  • 3. What are biometrics? • A biometric is a unique, measurable characteristic of a human being . • used to automatically recognize an individual or verify an individual’s identity. • measure both physiological and behavioral characteristics.
  • 4. Physiological biometrics • • • • • a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan
  • 5. Behavioral biometrics • based on measurements and data derived from an action. • a. Voice-scan • b. Signature-scan • c. Keystroke-scan
  • 6. Why we choose face recognition over other biometric? • It requires no physical interaction on behalf of the user. • It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
  • 7. The Face • The face is an important part of who you are and how people identify you. • Expect in the case of identical twins
  • 8. Continued.. • In face recognition there are two types of comparisons • Verification and identification
  • 9. Verification • This is where the system compares the given individual with who that individual says they are, and gives a yes or no decision.
  • 10. Identification • This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 11. Continued… • All identification or authentication technologies operate using the following four stages: • Capture • Extraction • Comparison • Match/non match
  • 12. Capture • A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process
  • 13. Extraction • unique data is extracted from the sample and a template is created.
  • 14. Comparison • the template is then compared with a new sample stored in the data base
  • 15. Match /non match • the system decides if the features extracted from the new Samples are a match or a non match
  • 16. Continued.. • Face recognition technology analyze the unique shape, pattern and positioning of the facial features. • Face recognition is very complex technology and is largely software based. • The face recognition system locates the head and finally the eyes of the individual.
  • 17. Continued.. • A matrix is then developed based on the characteristics of the Individual’s face. • This matrix is then compared to matrices that are in a database and a similarity score is generated for each comparison.
  • 18. Capturing methods • Video imaging • Thermal imaging
  • 19. Video imaging • Video imaging is more common as standard video cameras can be used . • The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth, nose tip and the nostrils as a example.
  • 20.
  • 21. Thermal imaging • It has better accuracy . • it uses facial temperature variations caused by vein structure as the distinguishing traits. • As the heat pattern is emitted from the face itself without source of external radiation these systems can capture images despite the lighting condition, even in the dark.
  • 22. Thermal imaging continued.. • The drawback is high cost. • They are more expensive than standard video cameras.
  • 23. Block diagram.. • Fig 1. CAPTURE EXTRACT COMPARISON MATCH/ NO MATCH ACCEPT/ REJUCT
  • 24. Components of face recognition system • An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.(enrollment module) • Another entity which handles compression, processing, storage and compression of the captured data with stored data (database) • The third interfaces with the application system ( identification module)
  • 25.
  • 26. Explanation • User interface captures the analog or digital image of the person's face. In the enrollment module the obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose of future comparison.
  • 27. Continued.. • The database compresses the obtained sample and stores it. It should have retrieval property also that is it compares all the stored sample with the newly obtained sample and retrieves the matched sample for the purpose of verification by the user and determine whether the match declared is right or wrong.
  • 28. Continued.. • The verification module also consists of a preprocessing system. • Verification means the system checks as to who the person says he or she is and gives a yes or no decision. • In this module the newly obtained sample is preprocessed and compared with the sample stored in the database. • The decision is taken depending on the match obtained from the database. Correspondingly the sample is accepted or rejected.
  • 29. Performance • False acceptance rates(FAR) • False rejection rates(FRR)
  • 30. FAR • The probability that a system will incorrectly identify an individual or will fail to reject an imposter. • It is also called as type 2 error rate
  • 31. FAR • FAR= NFA/NIIA • Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 32. FRR • The probability that a system will fail to identify an enrollee. It is also called • type 1 error rate.
  • 33. FRR • • • • FRR= NFR/NEIA FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt
  • 34. Response time • The time period required by a biometric system to return a decision on identification of a sample.
  • 35. Threshold/ decision Threshold: • The acceptance or rejection of a data is dependent on the match score falling above or below the threshold. • The threshold is adjustable so that the system can be made more or less strict; depending on the requirements of any given application.
  • 36. Conclusion • Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment.
  • 37. References • IEEE Intelligent Systems • M.A. Turk and A.P. Pent land, “Face Recognition Using Eigen faces”, IEEE Conf. on Computer Vision and Pattern Recognition, pp. 586-591, 1991.