SlideShare a Scribd company logo
www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
Face Recognition
 Introduction
 History
 Facial Recognition
 Implementation
 How it works
 Strengths & Weaknesses
 Applications
 Advantages
 Disadvantages
 Conclusion
 References
 Everyday actions are increasingly being
handled electronically, instead of pencil
and paper or face to face.
 This growth in electronic transactions
results in great demand for fast and
accurate user identification and
authentication.
 Access codes for buildings, banks
accounts and computer systems often use
PIN's for identification and security
clearences.
 Using the proper PIN gains access, but the
user of the PIN is not verified. When credit
and ATM cards are lost or stolen, an
unauthorized user can often come up with
the correct personal codes.
 Face recognition technology may solve
this problem since a face is undeniably
connected to its owner expect in the case
of identical twins.
 It requires no physical interaction on
behalf of the user.
 It is accurate and allows for high
enrolment and verification rates.
 It can use your existing hardware
infrastructure, existing camaras and image
capture Devices will work with no problems
 In 1960s, the first semi-automated system for
facial recognition to locate the features(such as
eyes, ears, nose and mouth) on the
photographs.
 In 1970s, Goldstein and Harmon used 21
specific subjective markers such as hair color
and lip thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition.
In Facial recognition there are two types of
comparisons:-
 VERIFICATION- The system compares the
given individual with who they say they are and
gives a yes or no decision.
 IDENTIFICATION- The system compares the
given individual to all the Other individuals in the
database and gives a ranked list of matches.
 All identification or authentication technologies
operate using the following four stages:
 Capture: A physical or behavioural sample is
captured by the system during Enrollment and
also in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared
with a new sample.
 Match/non-match: the system decides if the
features extracted from the new Samples are a
match or a non match.
The implementation of face recognition
technology includes the following four stages:
 Image acquisition
 Image processing
 Distinctive characteristic location
 Template creation
 Template matching
 Facial-scan technology can acquire faces from
almost any static camera or video system that
generates images of sufficient quality and
resolution.
 High-quality enrollment is essential to eventual
verification and identification enrollment images
define the facial characteristics to be used in all
future authentication events.
 Images are cropped such that the ovoid facial
image remains, and color images are normally
converted to black and white in order to facilitate
initial comparisons based on grayscale
characteristics.
 First the presence of faces or face in a scene
must be detected. Once the face is detected, it
must be localized and Normalization process
may be required to bring the dimensions of the
live facial sample in alignment with the one on
the template.
 All facial-scan systems attempt to match visible
facial features in a fashion similar to the way
people recognize one another.
 The features most often utilized in facial-scan
systems are those least likely to change
significantly over time: upper ridges of the eye
sockets, areas around the cheekbones, sides of
the mouth, nose shape, and the position of major
features relative to each other.
 Behavioural changes such as alteration of
hairstyle, changes in makeup, growing or
shaving facial hair, adding or removing
eyeglasses are behaviours that impact the
ability of facial-scan systems to locate
distinctive features, facial-scan systems are not
yet developed to the point where they can
overcome such variables.
 Enrollment templates are normally created
from a multiplicity of processed facial images.
 These templates can vary in size from less
than 100 bytes, generated through certain
vendors and to over 3K for templates.
 The 3K template is by far the largest among
technologies considered physiological
biometrics.
 Larger templates are normally associated
with behavioral biometrics,
 It compares match templates against
enrollment templates.
 A series of images is acquired and scored
against the enrollment, so that a user
attempting 1:1 verification within a facial-scan
system may have 10 to 20 match attempts
take place within 1 to 2 seconds.
 facial-scan is not as effective as finger-scan or
iris-scan in identifying a single individual from a
large database, a number of potential matches
are generally returned after large-scale facial-
scan identification searches.
 Facial recognition software is based on the
ability to first recognize faces, which is a
technological feat in itself. If you look at the
mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks
and valleys that make up the different facial
features.
 VISIONICS defines these landmarks as nodal
points. There are about 80 nodal points on a
human face.
Here are few nodal points that are measured by
the software.
1. distance between the eyes
2. width of the nose
3. depth of the eye socket
4. cheekbones
5. jaw line
6. chin
 Detection- when the system is attached to a video
surveilance system, the recognition software searches
the field of view of a video camera for faces. If there is
a face in the view, it is detected within a fraction of a
second. A multi-scale algorithm is used to search for
faces in low resolution. The system switches to a
high-resolution search only after a head-like shape is
detected.
 Alignment- Once a face is detected, the system
determines the head's position, size and pose. A face
needs to be turned at least 35 degrees toward the
camera for the system to register it.
 Normalization-The image of the head is scaled
and rotated so that it can be registered and
mapped into an appropriate size and pose.
Normalization is performed regardless of the
head's location and distance from the camera.
Light does not impact the normalization process.
 Representation-The system translates the facial
data into a unique code. This coding process
allows for easier comparison of the newly
acquired facial data to stored facial data.
 Matching- The newly acquired facial data is
compared to the stored data and (ideally) linked
to at least one stored facial representation.
 The system maps the face and creates a
faceprint, a unique numerical code for that
face. Once the system has stored a
faceprint, it can compare it to the thousands
or millions of faceprints stored in a database.
 Each faceprint is stored as an 84-byte file.
 It has the ability to leverage existing image
acquisition equipment.
 It can search against static images such as
driver’s license photographs.
 It is the only biometric able to operate without
user cooperation.
 Changes in acquisition environment
reduce matching accuracy.
 Changes in physiological
characteristics reduce matching
accuracy.
 It has the potential for privacy abuse
due to noncooperative enrollment and
identification capabilities.
 Replacement of PIN, physical tokens
 No need of human assistance for identification
 Prison visitor systems
 Border control
 Voting system
 Computer security
 Banking using ATM
 Physical access control of buildings ,areas etc.
Convenient, social acceptability
Easy to use
Inexpensive technique of identification
Problem with false rejection when people
change their hair style, grow or shave a
beard or wear glasses.
Identical twins
 Factors such as environmental changes and mild
changes in appearance impact the technology to
a greater degree than many expect.
 For implementations where the biometric system
must verify and identify users reliably over time,
facial scan can be a very difficult, but not
impossible, technology to implement
successfully.
www.google.com
www.wikipedia.com
www.studymafia.org
face-recognition-technology-ppt.pptx

More Related Content

Similar to face-recognition-technology-ppt.pptx

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Murlidhar Sarda
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Asif Muhammad
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
Harshavardhan851231
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Biometrics
BiometricsBiometrics
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
Shailesh Thakur
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
Tejas More
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
Star Link Communication Pvt Ltd
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 

Similar to face-recognition-technology-ppt.pptx (20)

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

face-recognition-technology-ppt.pptx

  • 1. www.studymafia.org Submitted To: Submitted By: www.studymafia.org www.studymafia.org Seminar On Face Recognition
  • 2.  Introduction  History  Facial Recognition  Implementation  How it works  Strengths & Weaknesses  Applications  Advantages  Disadvantages  Conclusion  References
  • 3.  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  • 4.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearences.  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins.
  • 5.  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems
  • 6.  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition.
  • 7. In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 8.  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 9. The implementation of face recognition technology includes the following four stages:  Image acquisition  Image processing  Distinctive characteristic location  Template creation  Template matching
  • 10.  Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution.  High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 11.
  • 12.  Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.  First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 13.  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.  The features most often utilized in facial-scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 14.  Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables.
  • 15.
  • 16.  Enrollment templates are normally created from a multiplicity of processed facial images.  These templates can vary in size from less than 100 bytes, generated through certain vendors and to over 3K for templates.  The 3K template is by far the largest among technologies considered physiological biometrics.  Larger templates are normally associated with behavioral biometrics,
  • 17.  It compares match templates against enrollment templates.  A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds.  facial-scan is not as effective as finger-scan or iris-scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial- scan identification searches.
  • 18.  Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.  VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 19. Here are few nodal points that are measured by the software. 1. distance between the eyes 2. width of the nose 3. depth of the eye socket 4. cheekbones 5. jaw line 6. chin
  • 20.  Detection- when the system is attached to a video surveilance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high-resolution search only after a head-like shape is detected.  Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.
  • 21.  Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.  Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 22.  The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database.  Each faceprint is stored as an 84-byte file.
  • 23.  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation.
  • 24.  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to noncooperative enrollment and identification capabilities.
  • 25.  Replacement of PIN, physical tokens  No need of human assistance for identification  Prison visitor systems  Border control  Voting system  Computer security  Banking using ATM  Physical access control of buildings ,areas etc.
  • 26. Convenient, social acceptability Easy to use Inexpensive technique of identification
  • 27. Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. Identical twins
  • 28.  Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect.  For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.

Editor's Notes

  1. 1