SlideShare a Scribd company logo
1 of 6
Face Recognition Technology
Face Recognition Technology is a biometric
system of identification. It is very helpful for many
security applications. The main uses of face recognition
is for time attendance, access control and visitor
management. Each human being has different facial
features like peaks, valleys and different peaks in their
face. These landmarks are defined as nodal points. An
approximate number of 80 nodal points present in one
human being. Distance between the eyes, length of the
jaw line, shape of the cheekbones, depth of the eye
sockets and width of the nose are considered for the
measurement. By using the facial identification we can
avoid the intrusion or delay.
The person’s face is captured by using a digital
video camera. And it measures all the necessary
features like distance between the eyes, length of the
jaw line, and shape of the cheekbones, depth of the
eye sockets and width of the nose. The captured
image is compared with the image stored in the
database. After capturing the image a template is
created by extracting a unique data. New image is
compared with it. And check if it matches with the
new image. The person must stand 2 feet back from
camera. Normally the system takes five seconds to
take the decision. Facial recognition system is very
useful for averting terrorist crimes and also it is
widely used in some of the law enforcement sections.
For user verification systems in computer
networks and banking sections it is widely used. For
the taking the time and attendance of employees it is
very fast and safety method. It is very easy to use and
install. It has less cost and very efficient method. It
can control the access. There is no need to carry cards
and keys. Also it is used to keep the track of visitors.
In facial recognition process the picture is cut into
smaller blocks. Then by using some algorithms
mathematical measures are taken. So we can identify
the very small differences in identical twins also.
Main Uses:

   In airports and railway stations.
   In banks
   For stadium security
   Some cash points
   Business uses
   Office management
   Government offices

More Related Content

What's hot (10)

Tna biometric time & attendance solutions
Tna biometric time & attendance solutionsTna biometric time & attendance solutions
Tna biometric time & attendance solutions
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
ATMeye.iQ
ATMeye.iQATMeye.iQ
ATMeye.iQ
 
Excellent Time Attendance Systemn
Excellent Time Attendance SystemnExcellent Time Attendance Systemn
Excellent Time Attendance Systemn
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Biometric Time and Attendance
Biometric Time and Attendance Biometric Time and Attendance
Biometric Time and Attendance
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
A prototype of finger print based licensing system for driving
A prototype of finger print based licensing system for drivingA prototype of finger print based licensing system for driving
A prototype of finger print based licensing system for driving
 

Viewers also liked

Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
Suvadip Shome
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
Abhineet Bhamra
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Divya Tirunagari
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
12206695
 

Viewers also liked (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Real-time Face Detection and Recognition
Real-time Face Detection and RecognitionReal-time Face Detection and Recognition
Real-time Face Detection and Recognition
 
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
 
Difference in biometric systems (Face Recognition Rules)
Difference in biometric systems (Face Recognition Rules)Difference in biometric systems (Face Recognition Rules)
Difference in biometric systems (Face Recognition Rules)
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
NEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition System
 
Seguridad Informatica: Pishing
Seguridad Informatica: PishingSeguridad Informatica: Pishing
Seguridad Informatica: Pishing
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometric attendance system
Biometric attendance systemBiometric attendance system
Biometric attendance system
 
Camshaft
CamshaftCamshaft
Camshaft
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Aadhaar enabled biometric attendance system
Aadhaar enabled biometric attendance systemAadhaar enabled biometric attendance system
Aadhaar enabled biometric attendance system
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 

Similar to Face recognition technology

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
bkbk37
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 

Similar to Face recognition technology (20)

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Face recognition technology

  • 2.
  • 3. Face Recognition Technology is a biometric system of identification. It is very helpful for many security applications. The main uses of face recognition is for time attendance, access control and visitor management. Each human being has different facial features like peaks, valleys and different peaks in their face. These landmarks are defined as nodal points. An approximate number of 80 nodal points present in one human being. Distance between the eyes, length of the jaw line, shape of the cheekbones, depth of the eye sockets and width of the nose are considered for the measurement. By using the facial identification we can avoid the intrusion or delay.
  • 4. The person’s face is captured by using a digital video camera. And it measures all the necessary features like distance between the eyes, length of the jaw line, and shape of the cheekbones, depth of the eye sockets and width of the nose. The captured image is compared with the image stored in the database. After capturing the image a template is created by extracting a unique data. New image is compared with it. And check if it matches with the new image. The person must stand 2 feet back from camera. Normally the system takes five seconds to take the decision. Facial recognition system is very useful for averting terrorist crimes and also it is widely used in some of the law enforcement sections.
  • 5. For user verification systems in computer networks and banking sections it is widely used. For the taking the time and attendance of employees it is very fast and safety method. It is very easy to use and install. It has less cost and very efficient method. It can control the access. There is no need to carry cards and keys. Also it is used to keep the track of visitors. In facial recognition process the picture is cut into smaller blocks. Then by using some algorithms mathematical measures are taken. So we can identify the very small differences in identical twins also.
  • 6. Main Uses:  In airports and railway stations.  In banks  For stadium security  Some cash points  Business uses  Office management  Government offices