SlideShare a Scribd company logo
1 of 22
BIOMETRICS: FACIAL
RECOGNITION
TECHNOLOGY
By Matthew WillertBy Matthew Willert
PUAD 620PUAD 620
OUTLINE
 WHAT IS BIOMETRICS?WHAT IS BIOMETRICS?
 WHAT IS FACIAL RECOGNITIONWHAT IS FACIAL RECOGNITION
TECHNOLOGY?TECHNOLOGY?
 CONTROVERSYCONTROVERSY
 MY OPINION OF THIS TECHNOLOGYMY OPINION OF THIS TECHNOLOGY
 QUESTIONS????????QUESTIONS????????
WHAT IS BIOMETRICS?
BIOMETRICS – any automaticallyBIOMETRICS – any automatically
measurablemeasurable,, robustrobust andand distinctivedistinctive physicalphysical
characteristic or personal trait that can becharacteristic or personal trait that can be
used to identify an individual or verify theused to identify an individual or verify the
claimed identity of an individual.claimed identity of an individual.
TWO MAIN USES
1) IDENTFICATION1) IDENTFICATION
-figure out “Who is X?”-figure out “Who is X?”
-accomplished by system performing a-accomplished by system performing a
“one-to-many” search“one-to-many” search
2) VERIFICATION2) VERIFICATION
-answer the question “Is this X?”-answer the question “Is this X?”
-accomplished by the system performing-accomplished by the system performing
a “one-to-one” searcha “one-to-one” search
TYPES OF BIOMETRICS
Iris ScanningIris Scanning
-measures the iris patter in the colored part-measures the iris patter in the colored part
of the eyeof the eye
Retinal ScanRetinal Scan
-measures the blood vessel patterns in the-measures the blood vessel patterns in the
back of the eyeback of the eye
TYPES OF BIOMETRICS
Voice RecognitionVoice Recognition
-measures the vocal characteristics of a-measures the vocal characteristics of a
person using a specific phraseperson using a specific phrase
Finger PrintingFinger Printing
-measures the unique pattern of lines on a-measures the unique pattern of lines on a
persons fingerpersons finger
FACIAL RECOGNITION
Facial recognition is a form of computerFacial recognition is a form of computer
vision that uses faces to attempt to identifyvision that uses faces to attempt to identify
a person or verify a person’s claimeda person or verify a person’s claimed
identity. Regardless of specific methodidentity. Regardless of specific method
used, the facial recognition is accomplishedused, the facial recognition is accomplished
in a five step process.in a five step process.
FIVE STEP PROCESS (STEP 1)
ACQUIRING THE IMAGE OF ANACQUIRING THE IMAGE OF AN
INDIVIDUALS FACEINDIVIDUALS FACE
2 WAYS TO AQUIRE IMAGE2 WAYS TO AQUIRE IMAGE
1)Digitally scan an existing photograph1)Digitally scan an existing photograph
2)Acquire a live picture of a subject2)Acquire a live picture of a subject
FIVE STEP PROCESS (STEP 2)
LOCATE IMAGE OF FACELOCATE IMAGE OF FACE
-software is used to locate the faces in the-software is used to locate the faces in the
image that has been obtainedimage that has been obtained
FIVE STEP PROCESS (STEP 2)
FIVE STEP PROCESS (STEP 3)
ANALYSIS OF FACIAL IMAGEANALYSIS OF FACIAL IMAGE
-software measures face according to is-software measures face according to is
peaks and valleys (nodal points)peaks and valleys (nodal points)
-focuses on the inner region of the face-focuses on the inner region of the face
known as the “golden triangle”known as the “golden triangle”
-nodal points are used to make a face print-nodal points are used to make a face print
FIVE STEP PROCESS (STEP 4)
COMPARISONCOMPARISON
-the face print created by the software is-the face print created by the software is
compared to all face prints the system hascompared to all face prints the system has
stored in its database.stored in its database.
FIVE STEP PROCESS (STEP 5)
MATCH OR NO MATCHMATCH OR NO MATCH
-software decides whether or not any-software decides whether or not any
comparisons from step 4 are close enoughcomparisons from step 4 are close enough
to declare a possible matchto declare a possible match
FINAL STEP
THE HUMAN OPERATORTHE HUMAN OPERATOR
CONTROVERSY
FALSE POSITIVESFALSE POSITIVES
-FACIAL RECOGNITION VENDOR-FACIAL RECOGNITION VENDOR
TEST 2000TEST 2000
-PALM BEACH INTERNATIONAL-PALM BEACH INTERNATIONAL
AIRPORTAIRPORT
-FACIAL RECOGNITION VENDOR-FACIAL RECOGNITION VENDOR
TEST 2002TEST 2002
CONTROVERSY
VIOLATION OF CONTITUTION RIGHTVIOLATION OF CONTITUTION RIGHT
AGAINST UNREASONABLE SEARCH?AGAINST UNREASONABLE SEARCH?
United States v. DionisioUnited States v. Dionisio, 410 U.S. 1, 14 (1973), 410 U.S. 1, 14 (1973)
-person does not have a reasonable expectation of-person does not have a reasonable expectation of
privacy of those physical characteristics that areprivacy of those physical characteristics that are
constantly exposed to the public such as one’sconstantly exposed to the public such as one’s
facial features, voice and handwritingfacial features, voice and handwriting
CONTROVERSY
THE BORDER EXCEPTIONTHE BORDER EXCEPTION
-the fourth amendment recognizes the-the fourth amendment recognizes the
longstanding right of the sovereign tolongstanding right of the sovereign to
protect itself by stopping and examiningprotect itself by stopping and examining
persons and property crossing into thispersons and property crossing into this
countrycountry
MY THOUGHTS ON FACIAL
RECOGNITION TECHNOLGY
REVIEW
 WHAT IS BIOMETRIC?WHAT IS BIOMETRIC?
 WHAT IS FACIAL RECOGNTIONWHAT IS FACIAL RECOGNTION
TECHNOLOGY?TECHNOLOGY?
 CONTROVERSYCONTROVERSY
 MY OPINIONMY OPINION
QUESTIONS??????

More Related Content

Similar to Pa pr-fa

Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics
 
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...IRJET Journal
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
PEShare.co.uk Shared Resource
PEShare.co.uk Shared ResourcePEShare.co.uk Shared Resource
PEShare.co.uk Shared Resourcepeshare.co.uk
 
Using visual rhythms for detecting video based facial spoof attacks
Using visual rhythms for detecting video based facial spoof attacksUsing visual rhythms for detecting video based facial spoof attacks
Using visual rhythms for detecting video based facial spoof attacksI3E Technologies
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanCyphort
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Trends in Facial Recognition.pptx
Trends in Facial Recognition.pptxTrends in Facial Recognition.pptx
Trends in Facial Recognition.pptxnishiyath
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"Gabriel (Gaby) Bar Giora
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Xeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance PlatformXeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance PlatformSunny Tan
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 

Similar to Pa pr-fa (20)

Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Accuracy of biometrics pw
Accuracy of biometrics pwAccuracy of biometrics pw
Accuracy of biometrics pw
 
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
PEShare.co.uk Shared Resource
PEShare.co.uk Shared ResourcePEShare.co.uk Shared Resource
PEShare.co.uk Shared Resource
 
Using visual rhythms for detecting video based facial spoof attacks
Using visual rhythms for detecting video based facial spoof attacksUsing visual rhythms for detecting video based facial spoof attacks
Using visual rhythms for detecting video based facial spoof attacks
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojan
 
NAVE.pptx
NAVE.pptxNAVE.pptx
NAVE.pptx
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
Face recognition
Face recognition Face recognition
Face recognition
 
Trends in Facial Recognition.pptx
Trends in Facial Recognition.pptxTrends in Facial Recognition.pptx
Trends in Facial Recognition.pptx
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Xeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance PlatformXeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance Platform
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 

Pa pr-fa

  • 1. BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY By Matthew WillertBy Matthew Willert PUAD 620PUAD 620
  • 2. OUTLINE  WHAT IS BIOMETRICS?WHAT IS BIOMETRICS?  WHAT IS FACIAL RECOGNITIONWHAT IS FACIAL RECOGNITION TECHNOLOGY?TECHNOLOGY?  CONTROVERSYCONTROVERSY  MY OPINION OF THIS TECHNOLOGYMY OPINION OF THIS TECHNOLOGY  QUESTIONS????????QUESTIONS????????
  • 3. WHAT IS BIOMETRICS? BIOMETRICS – any automaticallyBIOMETRICS – any automatically measurablemeasurable,, robustrobust andand distinctivedistinctive physicalphysical characteristic or personal trait that can becharacteristic or personal trait that can be used to identify an individual or verify theused to identify an individual or verify the claimed identity of an individual.claimed identity of an individual.
  • 4. TWO MAIN USES 1) IDENTFICATION1) IDENTFICATION -figure out “Who is X?”-figure out “Who is X?” -accomplished by system performing a-accomplished by system performing a “one-to-many” search“one-to-many” search 2) VERIFICATION2) VERIFICATION -answer the question “Is this X?”-answer the question “Is this X?” -accomplished by the system performing-accomplished by the system performing a “one-to-one” searcha “one-to-one” search
  • 5.
  • 6. TYPES OF BIOMETRICS Iris ScanningIris Scanning -measures the iris patter in the colored part-measures the iris patter in the colored part of the eyeof the eye Retinal ScanRetinal Scan -measures the blood vessel patterns in the-measures the blood vessel patterns in the back of the eyeback of the eye
  • 7. TYPES OF BIOMETRICS Voice RecognitionVoice Recognition -measures the vocal characteristics of a-measures the vocal characteristics of a person using a specific phraseperson using a specific phrase Finger PrintingFinger Printing -measures the unique pattern of lines on a-measures the unique pattern of lines on a persons fingerpersons finger
  • 8. FACIAL RECOGNITION Facial recognition is a form of computerFacial recognition is a form of computer vision that uses faces to attempt to identifyvision that uses faces to attempt to identify a person or verify a person’s claimeda person or verify a person’s claimed identity. Regardless of specific methodidentity. Regardless of specific method used, the facial recognition is accomplishedused, the facial recognition is accomplished in a five step process.in a five step process.
  • 9. FIVE STEP PROCESS (STEP 1) ACQUIRING THE IMAGE OF ANACQUIRING THE IMAGE OF AN INDIVIDUALS FACEINDIVIDUALS FACE 2 WAYS TO AQUIRE IMAGE2 WAYS TO AQUIRE IMAGE 1)Digitally scan an existing photograph1)Digitally scan an existing photograph 2)Acquire a live picture of a subject2)Acquire a live picture of a subject
  • 10. FIVE STEP PROCESS (STEP 2) LOCATE IMAGE OF FACELOCATE IMAGE OF FACE -software is used to locate the faces in the-software is used to locate the faces in the image that has been obtainedimage that has been obtained
  • 11. FIVE STEP PROCESS (STEP 2)
  • 12. FIVE STEP PROCESS (STEP 3) ANALYSIS OF FACIAL IMAGEANALYSIS OF FACIAL IMAGE -software measures face according to is-software measures face according to is peaks and valleys (nodal points)peaks and valleys (nodal points) -focuses on the inner region of the face-focuses on the inner region of the face known as the “golden triangle”known as the “golden triangle” -nodal points are used to make a face print-nodal points are used to make a face print
  • 13. FIVE STEP PROCESS (STEP 4) COMPARISONCOMPARISON -the face print created by the software is-the face print created by the software is compared to all face prints the system hascompared to all face prints the system has stored in its database.stored in its database.
  • 14. FIVE STEP PROCESS (STEP 5) MATCH OR NO MATCHMATCH OR NO MATCH -software decides whether or not any-software decides whether or not any comparisons from step 4 are close enoughcomparisons from step 4 are close enough to declare a possible matchto declare a possible match
  • 15. FINAL STEP THE HUMAN OPERATORTHE HUMAN OPERATOR
  • 16. CONTROVERSY FALSE POSITIVESFALSE POSITIVES -FACIAL RECOGNITION VENDOR-FACIAL RECOGNITION VENDOR TEST 2000TEST 2000 -PALM BEACH INTERNATIONAL-PALM BEACH INTERNATIONAL AIRPORTAIRPORT -FACIAL RECOGNITION VENDOR-FACIAL RECOGNITION VENDOR TEST 2002TEST 2002
  • 17.
  • 18. CONTROVERSY VIOLATION OF CONTITUTION RIGHTVIOLATION OF CONTITUTION RIGHT AGAINST UNREASONABLE SEARCH?AGAINST UNREASONABLE SEARCH? United States v. DionisioUnited States v. Dionisio, 410 U.S. 1, 14 (1973), 410 U.S. 1, 14 (1973) -person does not have a reasonable expectation of-person does not have a reasonable expectation of privacy of those physical characteristics that areprivacy of those physical characteristics that are constantly exposed to the public such as one’sconstantly exposed to the public such as one’s facial features, voice and handwritingfacial features, voice and handwriting
  • 19. CONTROVERSY THE BORDER EXCEPTIONTHE BORDER EXCEPTION -the fourth amendment recognizes the-the fourth amendment recognizes the longstanding right of the sovereign tolongstanding right of the sovereign to protect itself by stopping and examiningprotect itself by stopping and examining persons and property crossing into thispersons and property crossing into this countrycountry
  • 20. MY THOUGHTS ON FACIAL RECOGNITION TECHNOLGY
  • 21. REVIEW  WHAT IS BIOMETRIC?WHAT IS BIOMETRIC?  WHAT IS FACIAL RECOGNTIONWHAT IS FACIAL RECOGNTION TECHNOLOGY?TECHNOLOGY?  CONTROVERSYCONTROVERSY  MY OPINIONMY OPINION