SlideShare a Scribd company logo
1 of 30
.
A facial recognition system is a computer application for
automatically identifying or verifying a person from a digital
image or a video frame from a video source. One of the ways
to do this is by comparing selected facial features from the
image and a facial database.
It is typically used in security systems and can be compared to
other biometrics such as fingerprint or eye iris recognition
system.
 It requires no physical interaction on behalf of the user.
 It does not require an expert to interpret the comparison
result.
 Identify a particular person from large crowd.
 Verification of credit card, personal ID, passport.
 Different methods of face recognition.
 Feature extraction methods
 Holistic methods
 Hybrid methods
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets
4. Structure of cheek bones
Every face has at least 80 distinguishable parts
called nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets
4. Structure of the cheek bones
5. Length of jaw line
A general face recognition software conducts a comparison of these
parameters to the images in its database.
Depending upon the matches found, it determines the result.
This technique is known as feature based matching and it is the most basic
method of facial recognition.
The only way to overcome this challenge is better equipment, i.e.
basically , use of high tech cameras.
It is very much essential for the system to catch the image
accurately.
The only way to overcome this challenge is better
ALGORITHMS for facial recognitions. If the systems are
programmed for every possible permutation and combination of
the image, an accurate match can be achieved.
Some algorithms that try to overcome this problem are as
follows:
-Half-face based algorithm
-Perturbation Space Method(PSM).
-Local binary pattern
-Neural network, etc.
PSM algorithm that converts two dimensional image (e.g.
photographs into three – dimensions (such a process is called
“Morphing”).
The three – dimensionsional representation of the head
are then rotated in
Both the left-to-right and up-and down directions.
The facial recognition equipment used for basic
surveillance purpose has 3 important components.
1. The camera or scanning device
2. Infrared illuminator
3. An efficient software
An IR-illuminator is a device that emits infrared light-low frequency
electromagnetic radiation that's outside the visible spectrum. In other words, it
gives off light that a camera can pick up and use, but that a person can't see-so
while it's still dark to the human eye, the camera can see just fine.
There are 3 main types of infrared illuminators namely diodes, lamps & lasers.
Facial recognition is a very useful mechanism when it comes to office
related user identification. One such example is a product of Havon
industries called FaceID.
Face ID is industry first embedded facial recognition system with leading
“Dual Sensor” Facial Recognition Algorithm, which designed for
application like physical access control and time attendance, identity
management and so on.
In around 10 years from now, it is being estimated that facial
recognition technology will be the backbone of all major security,
home and networking service. With the growth of social
networking over the web, unbelievably accurate facial recognition
algorithms and advanced equipment, a person’s face, no mater
ageing or disguises or damage, can be recognized and data about
that person can be produced.
Here is a small glimpse of what facial recognition technology
would make of the future social networking….
Assuming amazing resolutions, facial and object
recognition, this is how social networking would be in
the future….
Pros:
1.Better security systems.
2.Easy user verifications.
3.Greatly reduces current load on security and judicial systems.
Cons:
1.Privacy issues.
2.Even helps in kidnapping!
3.Errors in detection may cause inconvenience to innocent users.
• Counting of people in a
room (e.g. for
temperature adjustment)
• Domestic security systems
• Police surveillance
• Domestic Computer / phone identification
systems
• Employee management systems in Companies.
• National and International security systems.
1. W. Bledsoe. Man-machine facial recognition
2. T. Kanade Computer Recognition of Human Faces
3. www.wikipedia.com
4. www.authorstream.com
5.www.howstuffworks.com
6. www.inttelix.com
7. www.face-rec.org
8. www.facialrecognitionsolution.com
9. www.facedetection.com

More Related Content

What's hot

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 

What's hot (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Detection
Face DetectionFace Detection
Face Detection
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710BioEnable
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyDivya Tirunagari
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Ramatís - A Missão do Espiritismo
Ramatís - A Missão do EspiritismoRamatís - A Missão do Espiritismo
Ramatís - A Missão do Espiritismouniversalismo-7
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicFinalyear Projects
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposalIftikhar Ahmad
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghebiitsumudu
 

Viewers also liked (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Embedded Technology
Embedded TechnologyEmbedded Technology
Embedded Technology
 
Ramatís - A Missão do Espiritismo
Ramatís - A Missão do EspiritismoRamatís - A Missão do Espiritismo
Ramatís - A Missão do Espiritismo
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
 
Watermark
WatermarkWatermark
Watermark
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logic
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermark
WatermarkWatermark
Watermark
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 

Similar to Facial Recognition Technology: An Overview

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxMuhammedNihadP
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyVengadesh Raja
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET Journal
 

Similar to Facial Recognition Technology: An Overview (20)

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
biometric technology
biometric technologybiometric technology
biometric technology
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured Transaction
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Facial Recognition Technology: An Overview

  • 1.
  • 2. .
  • 3. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition system.
  • 4.
  • 5.  It requires no physical interaction on behalf of the user.  It does not require an expert to interpret the comparison result.  Identify a particular person from large crowd.  Verification of credit card, personal ID, passport.
  • 6.
  • 7.  Different methods of face recognition.  Feature extraction methods  Holistic methods  Hybrid methods
  • 8. Every face has at least 80 distinguishable parts called nodal points. Some of them are:
  • 9. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes
  • 10. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose
  • 11. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose 3. Depth of eye sockets
  • 12. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose 3. Depth of eye sockets 4. Structure of cheek bones
  • 13. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose 3. Depth of eye sockets 4. Structure of the cheek bones 5. Length of jaw line
  • 14. A general face recognition software conducts a comparison of these parameters to the images in its database. Depending upon the matches found, it determines the result. This technique is known as feature based matching and it is the most basic method of facial recognition.
  • 15.
  • 16. The only way to overcome this challenge is better equipment, i.e. basically , use of high tech cameras. It is very much essential for the system to catch the image accurately.
  • 17.
  • 18.
  • 19. The only way to overcome this challenge is better ALGORITHMS for facial recognitions. If the systems are programmed for every possible permutation and combination of the image, an accurate match can be achieved. Some algorithms that try to overcome this problem are as follows: -Half-face based algorithm -Perturbation Space Method(PSM). -Local binary pattern -Neural network, etc.
  • 20. PSM algorithm that converts two dimensional image (e.g. photographs into three – dimensions (such a process is called “Morphing”). The three – dimensionsional representation of the head are then rotated in Both the left-to-right and up-and down directions.
  • 21. The facial recognition equipment used for basic surveillance purpose has 3 important components. 1. The camera or scanning device 2. Infrared illuminator 3. An efficient software
  • 22. An IR-illuminator is a device that emits infrared light-low frequency electromagnetic radiation that's outside the visible spectrum. In other words, it gives off light that a camera can pick up and use, but that a person can't see-so while it's still dark to the human eye, the camera can see just fine. There are 3 main types of infrared illuminators namely diodes, lamps & lasers.
  • 23. Facial recognition is a very useful mechanism when it comes to office related user identification. One such example is a product of Havon industries called FaceID. Face ID is industry first embedded facial recognition system with leading “Dual Sensor” Facial Recognition Algorithm, which designed for application like physical access control and time attendance, identity management and so on.
  • 24. In around 10 years from now, it is being estimated that facial recognition technology will be the backbone of all major security, home and networking service. With the growth of social networking over the web, unbelievably accurate facial recognition algorithms and advanced equipment, a person’s face, no mater ageing or disguises or damage, can be recognized and data about that person can be produced. Here is a small glimpse of what facial recognition technology would make of the future social networking….
  • 25. Assuming amazing resolutions, facial and object recognition, this is how social networking would be in the future….
  • 26. Pros: 1.Better security systems. 2.Easy user verifications. 3.Greatly reduces current load on security and judicial systems. Cons: 1.Privacy issues. 2.Even helps in kidnapping! 3.Errors in detection may cause inconvenience to innocent users.
  • 27. • Counting of people in a room (e.g. for temperature adjustment) • Domestic security systems • Police surveillance • Domestic Computer / phone identification systems • Employee management systems in Companies. • National and International security systems.
  • 28.
  • 29.
  • 30. 1. W. Bledsoe. Man-machine facial recognition 2. T. Kanade Computer Recognition of Human Faces 3. www.wikipedia.com 4. www.authorstream.com 5.www.howstuffworks.com 6. www.inttelix.com 7. www.face-rec.org 8. www.facialrecognitionsolution.com 9. www.facedetection.com