SlideShare a Scribd company logo
Christina Carr, Becky Schaffran, & Tess Cimini

FACIAL RECOGNITION
Myheritage.com
Guess Who?
Guess Who?
Guess Who?
Guess Who?
What is it?

 Facial recognition systems are built on
  computer programs that analyze images of
  human faces for the purpose of identifying
  them.
How does it work?

 Measure specific facial characteristics to
  create unique file called “template”
 Using templates, compare image to another
  image
   Produces a score on similarity
   Video camera signals
   Pre-existing photos
     i.e. drivers license databases
2D Facial Recognition

 2D Recognition
   Maximum angle: 35 degrees
   Must be similar to program in database
   Sometimes ineffective due to lighting changes
    and other uncontrolled variables
3D Recognition

 3D Recognition
   Can create template from face at 90 degree angle
   More accurate
   Uses depth and an axis of measurement not
    affected by lighting
 Example: Identix® - FaceIt®
   Landmarks or nodal points
   And now: FaceIt®Argus, skin biometrics
eps of 3D Recognition
Uses

                 • Law Enforcement
   Security
                 • Casinos, Super Bowl, Olympics


                 • Border control
Transportation
                 • E-passports


                 • Facebook
Entertainment
                 • SceneTap
Security
 Closed-circuit television (CCTV)
   Surveillance technology crosschecked with mugshot
    databases
Security

 Casinos
 Super Bowl
   Tampa, Fl. (2001): 19 people identified
 London 2012 Olympics
 MORIS
Transportation
 Germany: Fully automated border controls
 Australia: SmartGate
   Compares the face of the individual with image in
    the e-passport microchip
Entertainment

  Facebook Tag
   Suggest
  SceneTap
    50 Chicago bars
  Apps in progress
    Apple
New Developments

 ATM’s
 Advertising & marketing

 “Adidas is working with Intel to install and test digital walls with
 facial recognition in a handful of stores either in the U.S. or Britain.
 If a woman in her 50s walks by and stops, 60% of the shoes
 displayed will be for females in her age bracket, while the other
 40% will be a random sprinkling of other goods.

 ‘If a retailer can offer the right products quickly, people are more
 likely to buy something,’ said Chris Aubrey, vice president of global
 retail marketing for Adidas.”
“Facial Recognition Technology
Challenges Privacy”
 http://abclocal.go.com/kgo/video?id=842585
  5&syndicate=syndicate&section
Limitations

 Not 100% accurate.
 Accuracy can fluctuate because of:
   picture quality
   Lighting
   camera positions
   facial expressions
   and more
Security Issues

 Mistaken identity cases
 Images cannot be used to convict suspects
 The CCTV cameras in London
   1 crime solved per 1000 cameras
CCTV Clip

 http://www.youtube.com/watch?v=fLEtzI1oe
 wI
MORIS

 Mobile Offender Recognition and
  Information System
 Illegal search without a warrant
 No information is stored
Facebook

 Has roughly 600 million users
   that means that Facebook has a database of 600
    million faces.
 Each time you “tag” a photo, Facebook learns
  more about your face.
Google

 Picasa uses the same tagging techniques
 People fear a face recognition update to the
  app Google Goggles.
   the app may even be able to identify peoples SSNs
    just from the photo.
Adam Harvey
•CV Dazzle
•Found
ways to
cheat face
recognition
WHAT DO YOU THINK?

More Related Content

Viewers also liked

Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformPivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformEMC
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investingTravis Klein
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
EMC
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopija
dsrdoc
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
EMC
 
การนำเสนอโดยการเขียน
การนำเสนอโดยการเขียนการนำเสนอโดยการเขียน
การนำเสนอโดยการเขียน
วิทยาลัยเทคนิคราชบุรี
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
Dr. Raju M. Mathew
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
EMC
 
Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013
Mamta Binani
 
El cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilEl cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilmgonellgomez
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1pvsa_8990
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Microsoft TechNet - Belgium and Luxembourg
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
EMC
 
Tues palace of versailles
Tues palace of versaillesTues palace of versailles
Tues palace of versaillesTravis Klein
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religionTravis Klein
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
EMC
 
Informe consulta devoluciones
Informe consulta devolucionesInforme consulta devoluciones
Informe consulta devolucionesNathalia Sanchez
 

Viewers also liked (20)

Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformPivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investing
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopija
 
Day 11
Day 11Day 11
Day 11
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
การนำเสนอโดยการเขียน
การนำเสนอโดยการเขียนการนำเสนอโดยการเขียน
การนำเสนอโดยการเขียน
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013
 
El cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilEl cas del... oriol, oriol i nil
El cas del... oriol, oriol i nil
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Wed thurs reform
Wed thurs reformWed thurs reform
Wed thurs reform
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
Tues palace of versailles
Tues palace of versaillesTues palace of versailles
Tues palace of versailles
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religion
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Day 9
Day 9Day 9
Day 9
 
Informe consulta devoluciones
Informe consulta devolucionesInforme consulta devoluciones
Informe consulta devoluciones
 

Similar to Facial Recognition

Facial recognition
Facial recognitionFacial recognition
Facial recognitiontcimini
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Kavika Roy
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
MagalyLippens
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Dhimankomal
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
Herman Kurnadi
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
CSIRO National AI Centre
 
Combatting Bias in Machine Learning
Combatting Bias in Machine LearningCombatting Bias in Machine Learning
Combatting Bias in Machine Learning
Ayodele Odubela
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
Kejti Cela
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
GAMINGRBF
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
Fabrizio Gramuglio
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
StudentRocks
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpointdkeane01
 
Onboarding AI & Machine Learning
Onboarding AI & Machine LearningOnboarding AI & Machine Learning
Onboarding AI & Machine Learning
Brian Pichman
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
DLabs
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technology
VIKAS KULKARNI
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
MuhammedNihadP
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition TechnologyAvinash Singh
 

Similar to Facial Recognition (20)

Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Combatting Bias in Machine Learning
Combatting Bias in Machine LearningCombatting Bias in Machine Learning
Combatting Bias in Machine Learning
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpoint
 
Onboarding AI & Machine Learning
Onboarding AI & Machine LearningOnboarding AI & Machine Learning
Onboarding AI & Machine Learning
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technology
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Facial Recognition

  • 1. Christina Carr, Becky Schaffran, & Tess Cimini FACIAL RECOGNITION
  • 3.
  • 8. What is it?  Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them.
  • 9. How does it work?  Measure specific facial characteristics to create unique file called “template”  Using templates, compare image to another image  Produces a score on similarity  Video camera signals  Pre-existing photos  i.e. drivers license databases
  • 10. 2D Facial Recognition  2D Recognition  Maximum angle: 35 degrees  Must be similar to program in database  Sometimes ineffective due to lighting changes and other uncontrolled variables
  • 11. 3D Recognition  3D Recognition  Can create template from face at 90 degree angle  More accurate  Uses depth and an axis of measurement not affected by lighting  Example: Identix® - FaceIt®  Landmarks or nodal points  And now: FaceIt®Argus, skin biometrics
  • 12. eps of 3D Recognition
  • 13. Uses • Law Enforcement Security • Casinos, Super Bowl, Olympics • Border control Transportation • E-passports • Facebook Entertainment • SceneTap
  • 14. Security  Closed-circuit television (CCTV)  Surveillance technology crosschecked with mugshot databases
  • 15. Security  Casinos  Super Bowl  Tampa, Fl. (2001): 19 people identified  London 2012 Olympics  MORIS
  • 16. Transportation  Germany: Fully automated border controls  Australia: SmartGate  Compares the face of the individual with image in the e-passport microchip
  • 17. Entertainment  Facebook Tag Suggest  SceneTap  50 Chicago bars  Apps in progress  Apple
  • 18. New Developments  ATM’s  Advertising & marketing “Adidas is working with Intel to install and test digital walls with facial recognition in a handful of stores either in the U.S. or Britain. If a woman in her 50s walks by and stops, 60% of the shoes displayed will be for females in her age bracket, while the other 40% will be a random sprinkling of other goods. ‘If a retailer can offer the right products quickly, people are more likely to buy something,’ said Chris Aubrey, vice president of global retail marketing for Adidas.”
  • 19. “Facial Recognition Technology Challenges Privacy”  http://abclocal.go.com/kgo/video?id=842585 5&syndicate=syndicate&section
  • 20. Limitations  Not 100% accurate.  Accuracy can fluctuate because of:  picture quality  Lighting  camera positions  facial expressions  and more
  • 21. Security Issues  Mistaken identity cases  Images cannot be used to convict suspects  The CCTV cameras in London  1 crime solved per 1000 cameras
  • 23. MORIS  Mobile Offender Recognition and Information System  Illegal search without a warrant  No information is stored
  • 24. Facebook  Has roughly 600 million users  that means that Facebook has a database of 600 million faces.  Each time you “tag” a photo, Facebook learns more about your face.
  • 25. Google  Picasa uses the same tagging techniques  People fear a face recognition update to the app Google Goggles.  the app may even be able to identify peoples SSNs just from the photo.
  • 26. Adam Harvey •CV Dazzle •Found ways to cheat face recognition
  • 27. WHAT DO YOU THINK?

Editor's Notes

  1. -Age is an issue: a study by government’s National Insitute of Standards and Technology found false negative rates for face-recognition verification of 43 percent using photos from only 18 months earlier
  2. Skin biometrics: surface texture analysis of texture of skin, uses algorithms to turn patch of skin into mathematical, measurable space Can define the differences between twins Many problems wouldn’t work if: significant glare on sunglasses, long hair in center of face, poor lighting, lack of resolution
  3. detection: scans already existing 2d photograph or a shot from a 3D video Alignment: up to 90 degrees turned hereMeasurement: measures curves of face on submillimeter scale and creates a templateRepresentation: translates into unique code to create template with set of numbers to represent a person’s faceMatching: new technology converts 3D image into 2D image using algorithm to compare to 2D image in database
  4. From :55 to 2:05ish