SlideShare a Scribd company logo
FACIAL RECOGNITION
SYSTEMS
SUBMITTED BY,
SRUTHI SARA BABU
ALISHA ELIABETH ANOOP
M.B.A - VIDYUT
Facial recognition is a type of biometric technology that uses statistical measurements of
people’s features to digitally determine identity.Though facial recognition can allow for more
ease in day to day life, it comes with major security and privacy issues that might cause concerns
for users.
Facebook, Oregin Department of Motor vehicles etc. use these facial recognition
systems for various purposes.
Facebook’s facial recognition tool called Deepface is nearly as accurate the human
brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy
whether the photos shows the same face.Humans are able to perform the same task with 97.53%
accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon
will be ready for commercial use, most likely to help facebook improve the accuracy of its
existing facial recognition capabilities.Deepface might also be used for real world facial-
tracking.
The Oregon Department of Motor Vehicles uses facial recognition to ensure that
drivers licenses, instruction permits,and ID cards are not issued under false names.Police can
capture a 3D video and upload it to an image gallery for comparison to identify people with prior
criminal records or outstanding warrants.
Facial analysis has progressed beyond scruitinizing static features.Frame by frame
analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While
these insights can drive productive endeavours,they are fraught with privacy implications.
Emotient, another expression analysis start up located in California, received a 6
million infusion of funds in early2014 to support glassware for retail salespeople.Emotient is
confident that the ability to objectively and accurately gauge customer emotions will give retail
teams more tools to increase sales, but customer response to being recorded by cameras
embedded in smartglass is uncertain.
Face recognition technology has come a longway.However, next generation face
recognition systems are going to have widespread application in smart environments-where
computers and machines are more likely helpful to assistants.
QUESTIONS AND ANSWERS
1. What are some of the benefits of using facial recognition technology?Describe some
current and future applications of this technology.
Some of the benefits of facial recognition technology are:
 Increased Security: One of the biggest pros of facial recognition technology is that it
enhances safety and security. From government agencies to personal use, there is an
increasing demand for advanced security and surveillance systems. Organizations can
easily identify and track anyone who comes onto the premises, and they can easily flag
visitors who aren’t welcome. It can be very helpful when it comes to finding potential
terrorists. Plus, there is no key, badge, or password that can be stolen or lost.
 Fast and Accurate: With the ever-increasing demand for speed and the growing number
of cyberattacks, having fast and accurate technology is key. Facial recognition
technology provides verification that is convenient, quick, and accurate. Although
possible, it is very difficult to fool facial recognition technology, which makes it
beneficial in helping prevent fraud.
 No Contact: Facial recognition is preferred over fingerprint scanning because of its non-
contact process. People don’t have to worry about the potential drawbacks related to
fingerprint identification technology, such as germs or smudges.
Deepface soon will be ready for commercial use, most likely to help facebook improve
the accuracy of its existing facial recognition capabilities.Deepface might also be used for real
world facial-tracking.Foe example, monitoring someone’s shopping habits as that person moves
from physical store to store.
The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers
licenses, instruction permits,and ID cards are not issued under false names.Police can capture a
3D video and upload it to an image gallery for comparison to identify people with prior criminal
records or outstanding warrants.
2.How does facial recognition technology threaten the protection of individual privacy?
Facial analysis has progressed beyond scruitinizing static features.Frame by frame
analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While
these insights can drive productive endeavours,they are fraught with privacy implications.For
example , do you want the person conducting the job interview to be able to review a videotape ,
identify fleeting moments of confusion or indecision and decide against hiring you.
3.Would you like deepface to track your activities on facebook and in the physical world?
Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2
photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans
are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s
AI research group in California.Deepface soon will be ready for commercial use, most likely to
help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might
also be used for real world facial-tracking.

More Related Content

What's hot

Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
Shivam Agrawal
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
PINKESH PATEL
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
Jawhar Ali
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
Mohit Kanwar
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM Security
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Tony Chew
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
CSCJournals
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
IJECEIAES
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
William Mann
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
AshokKumar4108
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Editor IJCATR
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaperHai Nguyen
 
face recognation
face recognationface recognation

What's hot (20)

Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
face recognation
face recognationface recognation
face recognation
 

Similar to Facial recognition systems

Frs
FrsFrs
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Kavika Roy
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
AnkitSakhuja4
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
gulfam ali
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
StudentRocks
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
MagalyLippens
 
Image Recognition? But why?
Image Recognition? But why?Image Recognition? But why?
Image Recognition? But why?
TalhaMTZ
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Dhimankomal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
CSCJournals
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!
Concetto Labs
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 

Similar to Facial recognition systems (20)

Frs
FrsFrs
Frs
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Image Recognition? But why?
Image Recognition? But why?Image Recognition? But why?
Image Recognition? But why?
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Facial recognition systems

  • 1. FACIAL RECOGNITION SYSTEMS SUBMITTED BY, SRUTHI SARA BABU ALISHA ELIABETH ANOOP M.B.A - VIDYUT
  • 2. Facial recognition is a type of biometric technology that uses statistical measurements of people’s features to digitally determine identity.Though facial recognition can allow for more ease in day to day life, it comes with major security and privacy issues that might cause concerns for users. Facebook, Oregin Department of Motor vehicles etc. use these facial recognition systems for various purposes. Facebook’s facial recognition tool called Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial- tracking. The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers licenses, instruction permits,and ID cards are not issued under false names.Police can capture a 3D video and upload it to an image gallery for comparison to identify people with prior criminal records or outstanding warrants. Facial analysis has progressed beyond scruitinizing static features.Frame by frame analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While these insights can drive productive endeavours,they are fraught with privacy implications. Emotient, another expression analysis start up located in California, received a 6 million infusion of funds in early2014 to support glassware for retail salespeople.Emotient is confident that the ability to objectively and accurately gauge customer emotions will give retail teams more tools to increase sales, but customer response to being recorded by cameras embedded in smartglass is uncertain. Face recognition technology has come a longway.However, next generation face recognition systems are going to have widespread application in smart environments-where computers and machines are more likely helpful to assistants.
  • 3. QUESTIONS AND ANSWERS 1. What are some of the benefits of using facial recognition technology?Describe some current and future applications of this technology. Some of the benefits of facial recognition technology are:  Increased Security: One of the biggest pros of facial recognition technology is that it enhances safety and security. From government agencies to personal use, there is an increasing demand for advanced security and surveillance systems. Organizations can easily identify and track anyone who comes onto the premises, and they can easily flag visitors who aren’t welcome. It can be very helpful when it comes to finding potential terrorists. Plus, there is no key, badge, or password that can be stolen or lost.  Fast and Accurate: With the ever-increasing demand for speed and the growing number of cyberattacks, having fast and accurate technology is key. Facial recognition technology provides verification that is convenient, quick, and accurate. Although possible, it is very difficult to fool facial recognition technology, which makes it beneficial in helping prevent fraud.  No Contact: Facial recognition is preferred over fingerprint scanning because of its non- contact process. People don’t have to worry about the potential drawbacks related to fingerprint identification technology, such as germs or smudges. Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial-tracking.Foe example, monitoring someone’s shopping habits as that person moves from physical store to store. The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers licenses, instruction permits,and ID cards are not issued under false names.Police can capture a 3D video and upload it to an image gallery for comparison to identify people with prior criminal records or outstanding warrants.
  • 4. 2.How does facial recognition technology threaten the protection of individual privacy? Facial analysis has progressed beyond scruitinizing static features.Frame by frame analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While these insights can drive productive endeavours,they are fraught with privacy implications.For example , do you want the person conducting the job interview to be able to review a videotape , identify fleeting moments of confusion or indecision and decide against hiring you. 3.Would you like deepface to track your activities on facebook and in the physical world? Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial-tracking.