SlideShare a Scribd company logo
FACE RECOGNITION
TECHNOLOGY
BY :-
SUDHANSHU KUMAR
124127704
ROHIT KUMAR
124081460
INTRODUCTION
Facial recognition (or face recognition) is a type of biometric software
application that can identify a specific individual in a digital image by analyzing
and comparing patterns.
Facial recognition systems are commonly used for security purposes but are
increasingly being used in a variety of other applications. For example,
Facebook uses facial recognition software to help automate user tagging in
photographs.
Biometrics :
A biometric is a unique, measurable characteristic of a human being that can be
used to automatically recognize an individual or verify an individual identity.
Biometrics can measure both physiological and behavioral characteristics.
Physiological biometrics (based on measurements and data derived from direct the
human body) include:
a. Finger-scan ,
b. Facial Recognition,
c. Iris-scan ,
d. Retina-scan and
e. Hand-scan.
Behavioral biometrics (based on measurements and data derived from an action) include:
a. Voice-scan ,
b. Signature-scan
FACE RECOGNITION
The face is an important part of who you are and how people identify you.
For face recognition there are two types of comparisons.
The first is verification and the second is identification.
verification is where the system compares the given individual with who that
individual says they are and gives a yes or no decision..
identification is where the system compares the given individual to all the Other
individuals in the database and gives a ranked list of matches.
All identification or authentication technologies operate using the following four
stages:
1. Capture: A physical sample is captured by the system during enrollment and
also in identification or Verification process.
2. Extraction: unique data is extracted from the sample and a template is
created.
3. Comparison: the template is then compared with a new sample.
4. Match/Non match: the system decides if the features extracted from the new
CAPTURING OF IMAGE BY STANDARD
VIDEO CAMERAS
The image is optical in characteristics and may be thought of as a collection of a
large number of bright and dark areas representing the picture details.
In other words the picture information is a function of two variables:
Time and Space.
It would require infinite number of channels to transmit optical information
corresponding to picture elements simultaneously. There is practical difficulty in
transmitting all information simultaneously so we use a method called scanning.
COMPONENTS OF FACE RECOGNITION
SYSTEMS
The 3 main components of face recognition systems, they are as follows
 Enrollment module,
 Database and
 Identification module.
HOW FACE RECOGNITION SYSTEMS WORK
Facial recognition software is based on the ability to first recognize faces, which is
a technological feat in itself.
If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial
features.
There are about 80 nodal points on a human face. Here are few nodal points that
are measured by the software.
• Distance between the eyes
• Width of the nose
• Depth of the eye socket
• Cheekbones
• Jaw line and
• Chin
These nodal points are measured to create a numerical code, a string of numbers
that represents a face in the database. This code is called face print.
Only 14 to 22 nodal points are needed for face it software to complete the
recognition process.
IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
The implementation of face recognition technology includes the
following four stages:
1. Data acquisition,
2. Input processing ,
3. Face image classification and
4. Decision making .
PERFORMANCE
1. False rejection rates (FRR) :
The probability that a system will fail to identify an enrollee. It is also called
type 1 error rate.
FRR= NFR/NEIA
Where
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification attempt
2. False acceptance rate (FAR) :
The probability that a system will incorrectly identify an individual or will
fail
to reject an imposter. It is also called as type 2 error rate
FAR= NFA/NIIA
Where
FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter identification attempts
SOFTWARES
Facial recognition software falls into a larger group of technologies known as
biometrics. Facial recognition methods may vary, but they generally involve a
series of steps that serve to capture, analyze and compare your face to a database
of stored images.
The basic process that is used by the Face it system to capture and compare
images:
1. Detection,
2. Alignment,
3. Normalization,
4. Representation and
5. Matching.
Advantages :
1. There are many benefits to face recognition systems such as its convenience
and Social acceptability. All you need is your picture taken for it to work.
2. Face recognition is easy to use and in many cases it can be performed without
a Person even knowing.
3. Face recognition is also one of the most inexpensive biometric in the market
and Its price should continue to go down.
ADVANTAGES AND DISADVANTAGES
Disadvantage:
1. Face recognition systems cant tell the difference between identical twins.
There are numerous applications for face recognition technology:
• Commercial Use:
a. Day Care: Verify identity of individuals picking up the children.
b. Residential Security: Alert homeowners of approaching
personnel
c. Voter verification: Where eligible politicians are required to verify
their identity during a voting process.
d. Banking using ATM: The software is able to quickly verify a
customer.
APPLICATIONS
Face recognition technologies have been associated
generally with very costly top secure applications. Today
the core technologies have evolved and the cost of
equipment is going down dramatically due to the
integration and the increasing processing power. Certain
applications of face recognition technology are now cost
effective, reliable and highly accurate.
CONCLUSION
Face recognition Technology By Rohit

More Related Content

What's hot

Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Automated Face Recognition System for Office Door Access Control Application
Automated Face Recognition System for Office Door Access Control Application Automated Face Recognition System for Office Door Access Control Application
Automated Face Recognition System for Office Door Access Control Application
Er. Ashish Pandey
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
Investorideas.com
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
Biju Patnaik University
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face recognition
Face recognitionFace recognition
Face recognition
Chuu Htet Naing
 
VisageCloud - Face Recognition meets Big Data.
VisageCloud - Face Recognition meets Big Data.VisageCloud - Face Recognition meets Big Data.
VisageCloud - Face Recognition meets Big Data.
Bogdan Bocse
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
best face detection technology ppt
best face detection technology pptbest face detection technology ppt
best face detection technology ppt
Dharmendra Prajapat
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SYED HOZAIFA ALI
 
Face identification
Face  identificationFace  identification
Face identification
27vipin92
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
Pallavi Agarwal
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 

What's hot (20)

Face recognition
Face recognitionFace recognition
Face recognition
 
Automated Face Recognition System for Office Door Access Control Application
Automated Face Recognition System for Office Door Access Control Application Automated Face Recognition System for Office Door Access Control Application
Automated Face Recognition System for Office Door Access Control Application
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recognition
Face recognitionFace recognition
Face recognition
 
VisageCloud - Face Recognition meets Big Data.
VisageCloud - Face Recognition meets Big Data.VisageCloud - Face Recognition meets Big Data.
VisageCloud - Face Recognition meets Big Data.
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
best face detection technology ppt
best face detection technology pptbest face detection technology ppt
best face detection technology ppt
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face identification
Face  identificationFace  identification
Face identification
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Face recognition Technology By Rohit

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
4GH20CS408Rajeshk
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
Jawhar Ali
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
Biometrics
BiometricsBiometrics
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
Abdul Hanan
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Asif Muhammad
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
IRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
ijiert bestjournal
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
dominichilton98
 

Similar to Face recognition Technology By Rohit (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

Face recognition Technology By Rohit

  • 1. FACE RECOGNITION TECHNOLOGY BY :- SUDHANSHU KUMAR 124127704 ROHIT KUMAR 124081460
  • 2. INTRODUCTION Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other applications. For example, Facebook uses facial recognition software to help automate user tagging in photographs. Biometrics : A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct the human body) include: a. Finger-scan , b. Facial Recognition, c. Iris-scan , d. Retina-scan and e. Hand-scan. Behavioral biometrics (based on measurements and data derived from an action) include: a. Voice-scan , b. Signature-scan
  • 3. FACE RECOGNITION The face is an important part of who you are and how people identify you. For face recognition there are two types of comparisons. The first is verification and the second is identification. verification is where the system compares the given individual with who that individual says they are and gives a yes or no decision.. identification is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. All identification or authentication technologies operate using the following four stages: 1. Capture: A physical sample is captured by the system during enrollment and also in identification or Verification process. 2. Extraction: unique data is extracted from the sample and a template is created. 3. Comparison: the template is then compared with a new sample. 4. Match/Non match: the system decides if the features extracted from the new
  • 4. CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS The image is optical in characteristics and may be thought of as a collection of a large number of bright and dark areas representing the picture details. In other words the picture information is a function of two variables: Time and Space. It would require infinite number of channels to transmit optical information corresponding to picture elements simultaneously. There is practical difficulty in transmitting all information simultaneously so we use a method called scanning.
  • 5. COMPONENTS OF FACE RECOGNITION SYSTEMS The 3 main components of face recognition systems, they are as follows  Enrollment module,  Database and  Identification module.
  • 6. HOW FACE RECOGNITION SYSTEMS WORK Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. There are about 80 nodal points on a human face. Here are few nodal points that are measured by the software. • Distance between the eyes • Width of the nose • Depth of the eye socket • Cheekbones • Jaw line and • Chin These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print. Only 14 to 22 nodal points are needed for face it software to complete the recognition process.
  • 7. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY The implementation of face recognition technology includes the following four stages: 1. Data acquisition, 2. Input processing , 3. Face image classification and 4. Decision making .
  • 8. PERFORMANCE 1. False rejection rates (FRR) : The probability that a system will fail to identify an enrollee. It is also called type 1 error rate. FRR= NFR/NEIA Where FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt 2. False acceptance rate (FAR) : The probability that a system will incorrectly identify an individual or will fail to reject an imposter. It is also called as type 2 error rate FAR= NFA/NIIA Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 9. SOFTWARES Facial recognition software falls into a larger group of technologies known as biometrics. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. The basic process that is used by the Face it system to capture and compare images: 1. Detection, 2. Alignment, 3. Normalization, 4. Representation and 5. Matching.
  • 10. Advantages : 1. There are many benefits to face recognition systems such as its convenience and Social acceptability. All you need is your picture taken for it to work. 2. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. 3. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. ADVANTAGES AND DISADVANTAGES Disadvantage: 1. Face recognition systems cant tell the difference between identical twins.
  • 11. There are numerous applications for face recognition technology: • Commercial Use: a. Day Care: Verify identity of individuals picking up the children. b. Residential Security: Alert homeowners of approaching personnel c. Voter verification: Where eligible politicians are required to verify their identity during a voting process. d. Banking using ATM: The software is able to quickly verify a customer. APPLICATIONS
  • 12. Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. CONCLUSION