SlideShare a Scribd company logo
1 of 30
By
Nagham
1.Introduction
2. Facial recognition system
3. Facial Recognition
4. 2 face recognition
5. 3 face recognition
6. Implementation
7. How it works
8. Advantages & Disadvantage s
9. Applications
10. Conclusion
Everyday actions are increasingly
being handled electronically,
instead of pencil and paper or face
to face. This growth in electronic
transactions results in great
demand for fast and accurate user
identification and authentication.
Access codes for buildings, banks accounts
and computer systems often use PINs for
identification and security clearances. Using
the proper PIN gains access, but the user of
the PIN is not verified. When credit and
ATM cards are lost or stolen, an
unauthorized user can often come up with
the correct personal codes. Face recognition
technology may solve this problem since a
face is undeniably connected to its owner
expect in the case of identical twins.
A facial recognition system is a computer
application capable of identifying or verifying a
person from a digital image or a video frame from
a video source. One of the ways to do this is by
comparing selected facial features from the image
and a facial database
1.It requires no physical interaction on
behalf of the user.
2. It is accurate and allows for high
enrolment and verification rates.
3. It can use existing hardware
infrastructure, existing cameras and
image capture Devices will work with
no problems.
In the past, facial recognition software has relied on a 2D image to
compare or identify another 2D image from the database. To be
effective and accurate, the image captured needed to be of a face
that was looking almost directly at the camera, with little variance
of light or facial expression from the image in the database. This
created quite a problem.
The problems which still present problems to 2D
face recognition systems are:
1.Illumination
2.Pose
3.Expression
4.Occlusion
5.Ageing
A newly-emerging trend in facial recognition
software uses a 3D model, which claims to
provide more accuracy. Capturing a real-time 3D
image of a person's facial surface, 3D facial
recognition uses distinctive features of the face
-- where rigid tissue and bone is most apparent
, such as the curves of the eye socket, nose and
chin -- to identify the subject. These areas are all
unique and don't change over time.
Using depth and an axis of measurement that is
not affected by lighting, 3D facial recognition
can even be used in darkness and has the ability
to recognize a subject at different view angles
with the potential to recognize up to 90 degrees
(a face in profile).
In Facial recognition there are two types
of comparisons:-
 VERIFICATION- The system compares the
given individual with who they say they are
and gives a yes or no decision. ( one to one)
 IDENTIFICATION- The system compares the
given individual to all the Other individuals in
the database and gives a ranked list of matches
(one to many).
All identification or authentication
technologies operate using the following four
stages:
 Capture: A physical or behavioral sample is
captured by the system during Enrollment and
also in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared
with a new sample.
 Match/non-match: the system decides if the
features extracted from the new Samples are a
match or a non match.
The implementation of 3d face recognition
technology includes the following five stages:
• Image acquisition
• Image processing
• Distinctive characteristic location
• Template creation
• Template matching
• Facial-scan technology can acquire faces
from almost any static camera or video system
that generates images of sufficient quality and
resolution.
• High-quality enrollment is essential to
eventual verification and identification
enrollment images define the facial
characteristics to be used in all future
authentication events.
1. 3D Laser Scanners: The acquisition itself is via laser stripe and triangulation.
2. Stereo: . to use two images of an object or scene taken from slightly different
viewpoints.
3. Structured Light:
4. Time of Flight : measuring or inferring the distance that a beam of reflected light
has travelled.
5. Shape from Shading (Photoclinometry) : uses shading from an individual image
in order to estimate the surface orientation.
6. Photometric Stereo (PS): It constructs a 3D form from three or more images of
the same object each lit from a different and known direction and estimating surface
normal at each pixel coordinate
.
• Images are cropped such that the ovoid facial
image remains, and color images are normally
converted to black and white in order to
facilitate initial comparisons based on grayscale
characteristics.
• Once the face is detected, it must be localized
and Normalization process may be required to
bring the dimensions of the live facial sample
in alignment with the one on the template.
1. All facial-scan systems attempt to match visible
facial features in a fashion similar to the way
people recognize one another.
2. The features most often utilized in facial-scan
systems are those least likely to change
significantly over time: upper ridges of the eye
sockets, areas around the cheekbones, sides of the
mouth, nose shape, and the position of major
features relative to each other.
3. Behavioral changes such as alteration of
hairstyle, changes in makeup, growing or
shaving facial hair, adding or removing
eyeglasses are behaviors that impact the ability
of facial-scan systems to locate distinctive
features, facial-scan systems are developed to
the point where they can overcome such
variables
• Enrollment templates are normally created from a
multiplicity of processed facial images.
• These templates can vary in size from less than
100 bytes, generated through certain vendors and to
over 3K for templates.
• The 3K template is by far the largest among
technologies considered physiological biometrics.
• Larger templates are normally associated with
behavioral biometrics
• It compares match templates against enrollment
templates.
• A series of images is acquired and scored
against the enrollment, so that a user attempting
1:1 verification within a facial-scan system may
have 10 to 20 match attempts take place within 1
to 2 seconds.
• facial-scan is not as effective as finger-scan or
iris- scan in identifying a single individual from a
large database, a number of potential matches are
generally returned after large-scale facial-scan
identification searches.






Every face has numerous, distinguishable landmarks, the different peaks and
valleys that make up facial features. these landmarks defined as nodal points.
Each human face has approximately 80 nodal points. Some of these measured by
the software are:
Distance between the eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line.
Chin
These nodal points are measured creating a numerical code, called a faceprint,
representing the face in the database.
Detection
Acquiring an image can be accomplished by digitally scanning an existing
photograph (2D) or by using a video image to acquire a live picture of a
subject (3D).
Alignment
Once it detects a face, the system determines the head's position, size and
pose. As stated earlier, the subject has the potential to be recognized up to
90 degrees, while with 2D, the head must be turned at least 35 degrees
toward the camera.
Measurement
The system then measures the curves of the face on a sub-millimeter (or
microwave) scale and creates a template.
Representation
The system translates the template into a unique code. This coding gives
each template a set of numbers to represent the features on a subject's
face.
Matching
1. If the image is 3D and the database contains 3D images, then
matching will take place without any changes being made to the
image.
2. If the databases is still in 2D images.
When a 3D image is taken, different points (usually three) are
identified. For example, the outside of the eye, the inside of
the eye and the tip of the nose will be pulled out and measured.
3. Once those measurements are in place, an algorithm (a step-by-
step procedure) will be applied to the image to convert it to a 2D
image.
4. After conversion, the software will then compare the image with the
2D images in the database to find a potential match.
Verification or Identification
1. In verification, an image is matched to only one
image in the database (1:1). For example, an image taken
of a subject may be matched to an image in the database to
verify the subject is who he says he is.
2. If identification is the goal, then the image is compared to
all images in the database resulting in a score for each
potential match (1:N).
 It has the ability to leverage existing image
acquisition equipment.
 It can search against static images such as
driver’s license photographs.
 It is the only biometric able to operate
without user cooperation.
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics reduce
matching accuracy.
 It has the potential for privacy abuse due to non
cooperative enrollment and identification
capabilities.
complexity of the sensor
 Security/Counterterrorism. Access control,
comparing surveillance images to Know terrorist.
 Day Care: Verify identity of individuals picking
up the children.
 Residential Security: Alert homeowners of
approaching personnel
 Voter verification: Where eligible politicians are
required to verify their identity during a voting
process this is intended to stop voting where the
vote may not go as expected.
 Banking using ATM: The software is able to
quickly verify a customer’s face.
• Factors such as environmental changes and mild
changes in appearance impact the technology to a
greater degree than many expect.
• For implementations where the biometric system
must verify and identify users reliably over time,
facial scan can be a very difficult, but not
impossible, technology to implement successfully.
The level of interest in 3D face recognition is high among
biometric techniques. 3D face recognition has potential to
be a strong biometric.
THANK YOU

More Related Content

What's hot

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 

What's hot (20)

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
1.4 Performance Measures.ppt
1.4 Performance Measures.ppt1.4 Performance Measures.ppt
1.4 Performance Measures.ppt
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
face recognition
face recognitionface recognition
face recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 

Similar to Pattern recognition 3d face recognition

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Similar to Pattern recognition 3d face recognition (20)

Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Face recognition
Face recognition Face recognition
Face recognition
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
G041041047
G041041047G041041047
G041041047
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 

More from Mazin Alwaaly

More from Mazin Alwaaly (20)

Pattern recognition voice biometrics
Pattern recognition voice biometricsPattern recognition voice biometrics
Pattern recognition voice biometrics
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Pattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognitionPattern recognition hand vascular pattern recognition
Pattern recognition hand vascular pattern recognition
 
Pattern recognition forensic dental identification
Pattern recognition forensic dental identificationPattern recognition forensic dental identification
Pattern recognition forensic dental identification
 
Pattern recognition fingerprints
Pattern recognition fingerprintsPattern recognition fingerprints
Pattern recognition fingerprints
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Multimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networksMultimedia multimedia over wireless and mobile networks
Multimedia multimedia over wireless and mobile networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Multimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital librariesMultimedia content based retrieval in digital libraries
Multimedia content based retrieval in digital libraries
 
Multimedia lossy compression algorithms
Multimedia lossy compression algorithmsMultimedia lossy compression algorithms
Multimedia lossy compression algorithms
 
Multimedia lossless compression algorithms
Multimedia lossless compression algorithmsMultimedia lossless compression algorithms
Multimedia lossless compression algorithms
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Multimedia fundamental concepts in video
Multimedia fundamental concepts in videoMultimedia fundamental concepts in video
Multimedia fundamental concepts in video
 
Multimedia color in image and video
Multimedia color in image and videoMultimedia color in image and video
Multimedia color in image and video
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representation
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Information and data security cryptanalysis method
Information and data security cryptanalysis methodInformation and data security cryptanalysis method
Information and data security cryptanalysis method
 

Recently uploaded

Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cherry
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 
PODOCARPUS...........................pptx
PODOCARPUS...........................pptxPODOCARPUS...........................pptx
PODOCARPUS...........................pptx
Cherry
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
MohamedFarag457087
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
Cherry
 

Recently uploaded (20)

Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.Cyathodium bryophyte: morphology, anatomy, reproduction etc.
Cyathodium bryophyte: morphology, anatomy, reproduction etc.
 
BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...
BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...
BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Kanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.
 
PODOCARPUS...........................pptx
PODOCARPUS...........................pptxPODOCARPUS...........................pptx
PODOCARPUS...........................pptx
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
 
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
 
Understanding Partial Differential Equations: Types and Solution Methods
Understanding Partial Differential Equations: Types and Solution MethodsUnderstanding Partial Differential Equations: Types and Solution Methods
Understanding Partial Differential Equations: Types and Solution Methods
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 
FS P2 COMBO MSTA LAST PUSH past exam papers.
FS P2 COMBO MSTA LAST PUSH past exam papers.FS P2 COMBO MSTA LAST PUSH past exam papers.
FS P2 COMBO MSTA LAST PUSH past exam papers.
 
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
 
Site specific recombination and transposition.........pdf
Site specific recombination and transposition.........pdfSite specific recombination and transposition.........pdf
Site specific recombination and transposition.........pdf
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Cyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptxCyanide resistant respiration pathway.pptx
Cyanide resistant respiration pathway.pptx
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center ChimneyX-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
 

Pattern recognition 3d face recognition

  • 2. 1.Introduction 2. Facial recognition system 3. Facial Recognition 4. 2 face recognition 5. 3 face recognition 6. Implementation 7. How it works 8. Advantages & Disadvantage s 9. Applications 10. Conclusion
  • 3. Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face. This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  • 4. Access codes for buildings, banks accounts and computer systems often use PINs for identification and security clearances. Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins.
  • 5. A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database
  • 6. 1.It requires no physical interaction on behalf of the user. 2. It is accurate and allows for high enrolment and verification rates. 3. It can use existing hardware infrastructure, existing cameras and image capture Devices will work with no problems.
  • 7. In the past, facial recognition software has relied on a 2D image to compare or identify another 2D image from the database. To be effective and accurate, the image captured needed to be of a face that was looking almost directly at the camera, with little variance of light or facial expression from the image in the database. This created quite a problem.
  • 8. The problems which still present problems to 2D face recognition systems are: 1.Illumination 2.Pose 3.Expression 4.Occlusion 5.Ageing
  • 9. A newly-emerging trend in facial recognition software uses a 3D model, which claims to provide more accuracy. Capturing a real-time 3D image of a person's facial surface, 3D facial recognition uses distinctive features of the face -- where rigid tissue and bone is most apparent , such as the curves of the eye socket, nose and chin -- to identify the subject. These areas are all unique and don't change over time. Using depth and an axis of measurement that is not affected by lighting, 3D facial recognition can even be used in darkness and has the ability to recognize a subject at different view angles with the potential to recognize up to 90 degrees (a face in profile).
  • 10. In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision. ( one to one)  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches (one to many).
  • 11. All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 12. The implementation of 3d face recognition technology includes the following five stages: • Image acquisition • Image processing • Distinctive characteristic location • Template creation • Template matching
  • 13. • Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution. • High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 14. 1. 3D Laser Scanners: The acquisition itself is via laser stripe and triangulation. 2. Stereo: . to use two images of an object or scene taken from slightly different viewpoints. 3. Structured Light: 4. Time of Flight : measuring or inferring the distance that a beam of reflected light has travelled. 5. Shape from Shading (Photoclinometry) : uses shading from an individual image in order to estimate the surface orientation. 6. Photometric Stereo (PS): It constructs a 3D form from three or more images of the same object each lit from a different and known direction and estimating surface normal at each pixel coordinate .
  • 15. • Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics. • Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 16. 1. All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another. 2. The features most often utilized in facial-scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 17. 3. Behavioral changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviors that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are developed to the point where they can overcome such variables
  • 18. • Enrollment templates are normally created from a multiplicity of processed facial images. • These templates can vary in size from less than 100 bytes, generated through certain vendors and to over 3K for templates. • The 3K template is by far the largest among technologies considered physiological biometrics. • Larger templates are normally associated with behavioral biometrics
  • 19. • It compares match templates against enrollment templates. • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds. • facial-scan is not as effective as finger-scan or iris- scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial-scan identification searches.
  • 20.       Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. these landmarks defined as nodal points. Each human face has approximately 80 nodal points. Some of these measured by the software are: Distance between the eyes Width of the nose Depth of the eye sockets The shape of the cheekbones The length of the jaw line. Chin These nodal points are measured creating a numerical code, called a faceprint, representing the face in the database.
  • 21. Detection Acquiring an image can be accomplished by digitally scanning an existing photograph (2D) or by using a video image to acquire a live picture of a subject (3D). Alignment Once it detects a face, the system determines the head's position, size and pose. As stated earlier, the subject has the potential to be recognized up to 90 degrees, while with 2D, the head must be turned at least 35 degrees toward the camera.
  • 22. Measurement The system then measures the curves of the face on a sub-millimeter (or microwave) scale and creates a template. Representation The system translates the template into a unique code. This coding gives each template a set of numbers to represent the features on a subject's face.
  • 23. Matching 1. If the image is 3D and the database contains 3D images, then matching will take place without any changes being made to the image. 2. If the databases is still in 2D images. When a 3D image is taken, different points (usually three) are identified. For example, the outside of the eye, the inside of the eye and the tip of the nose will be pulled out and measured. 3. Once those measurements are in place, an algorithm (a step-by- step procedure) will be applied to the image to convert it to a 2D image. 4. After conversion, the software will then compare the image with the 2D images in the database to find a potential match.
  • 24. Verification or Identification 1. In verification, an image is matched to only one image in the database (1:1). For example, an image taken of a subject may be matched to an image in the database to verify the subject is who he says he is. 2. If identification is the goal, then the image is compared to all images in the database resulting in a score for each potential match (1:N).
  • 25.
  • 26.  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation.
  • 27.  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to non cooperative enrollment and identification capabilities. complexity of the sensor
  • 28.  Security/Counterterrorism. Access control, comparing surveillance images to Know terrorist.  Day Care: Verify identity of individuals picking up the children.  Residential Security: Alert homeowners of approaching personnel  Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop voting where the vote may not go as expected.  Banking using ATM: The software is able to quickly verify a customer’s face.
  • 29. • Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully. The level of interest in 3D face recognition is high among biometric techniques. 3D face recognition has potential to be a strong biometric.