SlideShare a Scribd company logo
FACIAL RECOGNITION SYSTEMS
SUBMITTED BY,
SRUTHI SARA BABU
ALISHA ELIABETH ANOOP
M.B.A - VIDYUT
Facial recognition is a type of biometric technology that uses statistical measurements of
people’s features to digitally determine identity.Though facial recognition can allow for more
ease in day to day life, it comes with major security and privacy issues that might cause concerns
for users.
Facebook, Oregin Department of Motor vehicles etc. use these facial recognition
systems for various purposes.
Facebook’s facial recognition tool called Deepface is nearly as accurate the human
brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy
whether the photos shows the same face.Humans are able to perform the same task with 97.53%
accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon
will be ready for commercial use, most likely to help facebook improve the accuracy of its
existing facial recognition capabilities.Deepface might also be used for real world facial-
tracking.
The Oregon Department of Motor Vehicles uses facial recognition to ensure that
drivers licenses, instruction permits,and ID cards are not issued under false names.Police can
capture a 3D video and upload it to an image gallery for comparison to identify people with prior
criminal records or outstanding warrants.
Facial analysis has progressed beyond scruitinizing static features.Frame by frame
analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While
these insights can drive productive endeavours,they are fraught with privacy implications.
Emotient, another expression analysis start up located in California, received a 6
million infusion of funds in early2014 to support glassware for retail salespeople.Emotient is
confident that the ability to objectively and accurately gauge customer emotions will give retail
teams more tools to increase sales, but customer response to being recorded by cameras
embedded in smartglass is uncertain.
Face recognition technology has come a longway.However, next generation face
recognition systems are going to have widespread application in smart environments-where
computers and machines are more likely helpful to assistants.
QUESTIONS AND ANSWERS
1. What are some of the benefits of using facial recognition technology?Describe some
current and future applications of this technology.
Some of the benefits of facial recognition technology are:
 Increased Security: One of the biggest pros of facial recognition technology is that it
enhances safety and security. From government agencies to personal use, there is an
increasing demand for advanced security and surveillance systems. Organizations can
easily identify and track anyone who comes onto the premises, and they can easily flag
visitors who aren’t welcome. It can be very helpful when it comes to finding potential
terrorists. Plus, there is no key, badge, or password that can be stolen or lost.
 Fast and Accurate: With the ever-increasing demand for speed and the growing number
of cyberattacks, having fast and accurate technology is key. Facial recognition
technology provides verification that is convenient, quick, and accurate. Although
possible, it is very difficult to fool facial recognition technology, which makes it
beneficial in helping prevent fraud.
 No Contact: Facial recognition is preferred over fingerprint scanning because of its non-
contact process. People don’t have to worry about the potential drawbacks related to
fingerprint identification technology, such as germs or smudges.
Deepface soon will be ready for commercial use, most likely to help facebook improve
the accuracy of its existing facial recognition capabilities.Deepface might also be used for real
world facial-tracking.Foe example, monitoring someone’s shopping habits as that person moves
from physical store to store.
The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers
licenses, instruction permits,and ID cards are not issued under false names.Police can capture a
3D video and upload it to an image gallery for comparison to identify people with prior criminal
records or outstanding warrants.
2.How does facial recognition technology threaten the protection of individual privacy?
Facial analysis has progressed beyond scruitinizing static features.Frame by frame
analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While
these insights can drive productive endeavours,they are fraught with privacy implications.For
example , do you want the person conducting the job interview to be able to review a videotape ,
identify fleeting moments of confusion or indecision and decide against hiring you.
3.Would you like deepface to track your activities on facebook and in the physical world?
Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2
photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans
are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s
AI research group in California.Deepface soon will be ready for commercial use, most likely to
help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might
also be used for real world facial-tracking.

More Related Content

What's hot

Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
Shivam Agrawal
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
Jawhar Ali
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
PINKESH PATEL
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
Mohit Kanwar
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ijitcs
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM Security
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
CSCJournals
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
IJECEIAES
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Tony Chew
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Editor IJCATR
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
William Mann
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaperHai Nguyen
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
AshokKumar4108
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
IJCI JOURNAL
 

What's hot (20)

Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTSDE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
DE REPORT ON CAPTCHA CODE FOR CSE B.TECH STUDENTS
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper1208 wp-two-factor-and-swivel-whitepaper
1208 wp-two-factor-and-swivel-whitepaper
 
LdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital ProblemsLdotR - Panel Discussion - Digital Solutions for Digital Problems
LdotR - Panel Discussion - Digital Solutions for Digital Problems
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 

Similar to Facial recognition__systems[1]

Frs
FrsFrs
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Kavika Roy
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
AnkitSakhuja4
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
gulfam ali
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
StudentRocks
 
Image Recognition? But why?
Image Recognition? But why?Image Recognition? But why?
Image Recognition? But why?
TalhaMTZ
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
MagalyLippens
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Dhimankomal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
CSCJournals
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!
Concetto Labs
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Ai in Society
Ai in SocietyAi in Society

Similar to Facial recognition__systems[1] (20)

Frs
FrsFrs
Frs
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
facial Recognization.pdf
facial Recognization.pdffacial Recognization.pdf
facial Recognization.pdf
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Image Recognition? But why?
Image Recognition? But why?Image Recognition? But why?
Image Recognition? But why?
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!8 facial recognition apps that will rule 2020!
8 facial recognition apps that will rule 2020!
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Ai in Society
Ai in SocietyAi in Society
Ai in Society
 

Recently uploaded

Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 

Recently uploaded (20)

Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 

Facial recognition__systems[1]

  • 1. FACIAL RECOGNITION SYSTEMS SUBMITTED BY, SRUTHI SARA BABU ALISHA ELIABETH ANOOP M.B.A - VIDYUT
  • 2. Facial recognition is a type of biometric technology that uses statistical measurements of people’s features to digitally determine identity.Though facial recognition can allow for more ease in day to day life, it comes with major security and privacy issues that might cause concerns for users. Facebook, Oregin Department of Motor vehicles etc. use these facial recognition systems for various purposes. Facebook’s facial recognition tool called Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial- tracking. The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers licenses, instruction permits,and ID cards are not issued under false names.Police can capture a 3D video and upload it to an image gallery for comparison to identify people with prior criminal records or outstanding warrants. Facial analysis has progressed beyond scruitinizing static features.Frame by frame analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While these insights can drive productive endeavours,they are fraught with privacy implications. Emotient, another expression analysis start up located in California, received a 6 million infusion of funds in early2014 to support glassware for retail salespeople.Emotient is confident that the ability to objectively and accurately gauge customer emotions will give retail teams more tools to increase sales, but customer response to being recorded by cameras embedded in smartglass is uncertain. Face recognition technology has come a longway.However, next generation face recognition systems are going to have widespread application in smart environments-where computers and machines are more likely helpful to assistants.
  • 3. QUESTIONS AND ANSWERS 1. What are some of the benefits of using facial recognition technology?Describe some current and future applications of this technology. Some of the benefits of facial recognition technology are:  Increased Security: One of the biggest pros of facial recognition technology is that it enhances safety and security. From government agencies to personal use, there is an increasing demand for advanced security and surveillance systems. Organizations can easily identify and track anyone who comes onto the premises, and they can easily flag visitors who aren’t welcome. It can be very helpful when it comes to finding potential terrorists. Plus, there is no key, badge, or password that can be stolen or lost.  Fast and Accurate: With the ever-increasing demand for speed and the growing number of cyberattacks, having fast and accurate technology is key. Facial recognition technology provides verification that is convenient, quick, and accurate. Although possible, it is very difficult to fool facial recognition technology, which makes it beneficial in helping prevent fraud.  No Contact: Facial recognition is preferred over fingerprint scanning because of its non- contact process. People don’t have to worry about the potential drawbacks related to fingerprint identification technology, such as germs or smudges. Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial-tracking.Foe example, monitoring someone’s shopping habits as that person moves from physical store to store. The Oregon Department of Motor Vehicles uses facial recognition to ensure that drivers licenses, instruction permits,and ID cards are not issued under false names.Police can capture a 3D video and upload it to an image gallery for comparison to identify people with prior criminal records or outstanding warrants.
  • 4. 2.How does facial recognition technology threaten the protection of individual privacy? Facial analysis has progressed beyond scruitinizing static features.Frame by frame analysis can isolate involuntary millisecond-long expressions,revealing private sentiments.While these insights can drive productive endeavours,they are fraught with privacy implications.For example , do you want the person conducting the job interview to be able to review a videotape , identify fleeting moments of confusion or indecision and decide against hiring you. 3.Would you like deepface to track your activities on facebook and in the physical world? Deepface is nearly as accurate the human brain in recognizing a face.It can compare 2 photos and compare it with 97.25% accuracy whether the photos shows the same face.Humans are able to perform the same task with 97.53% accuracy.Deepface was developed by facebook’s AI research group in California.Deepface soon will be ready for commercial use, most likely to help facebook improve the accuracy of its existing facial recognition capabilities.Deepface might also be used for real world facial-tracking.