尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Submitted To: Submitted By:
Prof. Sandeep Santosh Kashish Garg
1130319
Face Recognition
Contents
 Introduction
 History
 Facial Recognition
 Implementation
 How it works
 Strengths & Weaknesses
 Applications
 Advantages
 Disadvantages
 Conclusion
 References
Introduction
 Everyday actions are increasingly being
handled electronically, instead of pencil and
paper or face to face.
 This growth in electronic transactions results
in great demand for fast and accurate user
identification and authentication.
 Access codes for buildings, banks accounts and
computer systems often use PIN's for
identification and security clearances.
Contd…
 Using the proper PIN gains access, but the
user of the PIN is not verified. When
credit and ATM cards are lost or stolen, an
unauthorized user can often come up
with the correct personal codes.
 Face recognition technology may solve
this problem since a face is undeniably
connected to its owner except in the case
of identical twins.
Facial Recognition ???
 It requires no physical interaction on
behalf of the user.
 It is accurate and allows for high
enrolment and verification rates.
 It can use your existing hardware
infrastructure, existing cameras and image
capture Devices will work with no
problems
History
 In 1960s, the first semi-automated system for
facial recognition to locate the features(such
as eyes, ears, nose and mouth) on the
photographs.
 In 1970s, Goldstein and Harmon used 21
specific subjective markers such as hair Color
and lip thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition.
Facial Recognition
In Facial recognition there are two types
of comparisons:-
 VERIFICATION- The system compares
the given individual with who they say
they are and gives a yes or no
decision.
 IDENTIFICATION- The system
compares the given individual to all
the Other individuals in the database
and gives a ranked list of matches.
Contd…
 All identification or authentication technologies
operate using the following four stages:
 Capture: A physical or behavioral sample is
captured by the system during Enrollment and also
in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared with
a new sample.
 Match/non-match: the system decides if the
features extracted from the new Samples are a
match or a non match.
Implementation
The implementation of face recognition
technology includes the following four stages:
• Image acquisition
• Image processing
• Distinctive characteristic location
• Template creation
• Template matching
Image acquisition
• Facial-scan technology can acquire faces from
almost any static camera or video system that
generates images of sufficient quality and
resolution.
• High-quality enrollment is essential to
eventual verification and identification
enrollment images define the facial
characteristics to be used in all future
authentication events.
Image Processing
Images are cropped such that the ovoid facial image
remains, and color images are normally converted to
black and white in order to facilitate initial
comparisons based on grayscale characteristics.
 First the presence of faces or face in a scene must be
detected. Once the face is detected, it must be
localized and Normalization process may be required
to bring the dimensions of the live facial sample in
alignment with the one on the template.
Distinctive characteristic
location
 All facial-scan systems attempt to match
visible facial features in a fashion similar to
the way people recognize one another.
 The features most often utilized in facial-
scan systems are those least likely to
change significantly over time: upper ridges
of the eye sockets, areas around the
cheekbones, sides of the mouth, nose
shape, and the position of major features
relative to each other.
Contd..
 Behavioural changes such as alteration of
hairstyle, changes in makeup, growing or
shaving facial hair, adding or removing
eyeglasses are behaviours that impact the
ability of facial-scan systems to locate
distinctive features, facial-scan systems are not
yet developed to the point where they can
overcome such variables.
Template creation
Template matching
• It compares match templates against enrollment
templates.
• A series of images is acquired and scored against
the enrollment, so that a user attempting 1:1
verification within a facial-scan system may have
10 to 20 match attempts take place within 1 to 2
seconds.
• facial-scan is not as effective as finger-scan or
iris-scan in identifying a single individual from a
large database, a number of potential matches
are generally returned after large-scale facial-
scan identification searches.
How Facial Recognition System Works
 Facial recognition software is based on the
ability to first recognize faces, which is a
technological feat in itself. If you look at the
mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks
and valleys that make up the different facial
features.
 VISIONICS defines these landmarks as nodal
points. There are about 80 nodal points on a
human face.
Contd..
Here are few nodal points that are
measured by the software.
1. distance between the eyes
2. width of the nose
3. depth of the eye socket
4. cheekbones
5. jaw line
6. chin
SOFTWARE
 Detection- when the system is attached to a
video surveilance system, the recognition
software searches the field of view of a video
camera for faces. If there is a face in the view, it
is detected within a fraction of a second. A
multi-scale algorithm is used to search for faces
in low resolution. The system switches to a high-
resolution search only after a head-like shape is
detected.
 Alignment- Once a face is detected, the system
determines the head's position, size and pose. A
face needs to be turned at least 35 degrees
toward the camera for the system to register it.
Contd…
 Normalization-The image of the head is scaled and
rotated so that it can be registered and mapped into an
appropriate size and pose. Normalization is performed
regardless of the head's location and distance from the
camera. Light does not impact the normalization
process.
 Representation-The system translates the facial data
into a unique code. This coding process allows for easier
comparison of the newly acquired facial data to stored
facial data.
 Matching- The newly acquired facial data is compared
to the stored data and (ideally) linked to at least one
stored facial representation.
 The system maps the face and creates a
faceprint, a unique numerical code for that
face. Once the system has stored a
faceprint, it can compare it to the
thousands or millions of faceprints stored in
a database.
 Each faceprint is stored as an 84-byte file.
Strengths
 It has the ability to leverage existing image
acquisition equipment.
 It can search against static images such as
driver’s license photographs.
 It is the only biometric able to operate without
user cooperation.
Weaknesses
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics reduce
matching accuracy.
 It has the potential for privacy abuse due to
noncooperative enrollment and identification
capabilities.
Applications
Replacement of PIN, physical tokens
No need of human assistance for identification
Prison visitor systems
Border control
Voting system
Computer security
Banking using ATM
Physical access control of buildings ,areas etc.
Advantages
• Convenient, social acceptability
• Easy to use
• Inexpensive technique of identification
Disadvantage
• Problem with false rejection when people
change their hair style, grow or shave a beard
or wear glasses.
• Identical twins
Conclusion
• Factors such as environmental changes
and mild changes in appearance impact
the technology to a greater degree
than many expect.
• For implementations where the
biometric system must verify and
identify users reliably over time, facial
scan can be a very difficult, but not
impossible, technology to implement
successfully.
References
• www.google.com
• www.wikipedia.com
Thank You…

More Related Content

What's hot

FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
Arjun Agnihotri
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Pushkar Dutt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Face recognition
Face recognitionFace recognition
Face recognition
Satyendra Rajput
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
Smriti Tikoo
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
usha2016
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
Herman Kurnadi
 

What's hot (20)

FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
face recognition
face recognitionface recognition
face recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face recognition
Face recognition Face recognition
Face recognition
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 

Viewers also liked

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
Koduru KrisHna
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
micansinfotech
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
IAEME Publication
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
CSCJournals
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Asif Muhammad
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7
swathi b
 
C# simplified
C#  simplifiedC#  simplified
C# simplified
Mohd Manzoor Ahmed
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
Dharmesh Tank
 
Thesis
ThesisThesis
Human detection iccv09
Human detection iccv09Human detection iccv09
Human detection iccv09
fanghuaxue
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
avinash raibole
 
Text to speech converter in C#.NET
Text to speech converter in C#.NETText to speech converter in C#.NET
Text to speech converter in C#.NET
Mandeep Cheema
 
Face Recognition on MATLAB
Face Recognition on MATLABFace Recognition on MATLAB
Face Recognition on MATLAB
Mukesh Taneja
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
ahmad abdelhafeez
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
Abhineet Bhamra
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
Sumeet Kakani
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 

Viewers also liked (20)

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7
 
C# simplified
C#  simplifiedC#  simplified
C# simplified
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Thesis
ThesisThesis
Thesis
 
Human detection iccv09
Human detection iccv09Human detection iccv09
Human detection iccv09
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
Text to speech converter in C#.NET
Text to speech converter in C#.NETText to speech converter in C#.NET
Text to speech converter in C#.NET
 
Face Recognition on MATLAB
Face Recognition on MATLABFace Recognition on MATLAB
Face Recognition on MATLAB
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Face recognigion system ppt

face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
BHARATHGOWDAHA
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
Harshavardhan851231
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
Shailesh Thakur
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Murlidhar Sarda
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
Satyanarayana Tammana
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
ijiert bestjournal
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
venkata Anil
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
venkata Anil
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
Tejas More
 

Similar to Face recognigion system ppt (20)

face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
 

Recently uploaded

QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 

Recently uploaded (20)

QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 

Face recognigion system ppt

  • 1. Submitted To: Submitted By: Prof. Sandeep Santosh Kashish Garg 1130319 Face Recognition
  • 2. Contents  Introduction  History  Facial Recognition  Implementation  How it works  Strengths & Weaknesses  Applications  Advantages  Disadvantages  Conclusion  References
  • 3. Introduction  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances.
  • 4. Contd…  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  Face recognition technology may solve this problem since a face is undeniably connected to its owner except in the case of identical twins.
  • 5. Facial Recognition ???  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
  • 6. History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair Color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition.
  • 7. Facial Recognition In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 8. Contd…  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 9. Implementation The implementation of face recognition technology includes the following four stages: • Image acquisition • Image processing • Distinctive characteristic location • Template creation • Template matching
  • 10. Image acquisition • Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution. • High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 11.
  • 12. Image Processing Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.  First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 13. Distinctive characteristic location  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.  The features most often utilized in facial- scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 14. Contd..  Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables.
  • 16. Template matching • It compares match templates against enrollment templates. • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds. • facial-scan is not as effective as finger-scan or iris-scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial- scan identification searches.
  • 17. How Facial Recognition System Works  Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.  VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 18. Contd.. Here are few nodal points that are measured by the software. 1. distance between the eyes 2. width of the nose 3. depth of the eye socket 4. cheekbones 5. jaw line 6. chin
  • 19. SOFTWARE  Detection- when the system is attached to a video surveilance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high- resolution search only after a head-like shape is detected.  Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.
  • 20. Contd…  Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.  Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 21.  The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database.  Each faceprint is stored as an 84-byte file.
  • 22. Strengths  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation.
  • 23. Weaknesses  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to noncooperative enrollment and identification capabilities.
  • 24. Applications Replacement of PIN, physical tokens No need of human assistance for identification Prison visitor systems Border control Voting system Computer security Banking using ATM Physical access control of buildings ,areas etc.
  • 25. Advantages • Convenient, social acceptability • Easy to use • Inexpensive technique of identification
  • 26. Disadvantage • Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. • Identical twins
  • 27. Conclusion • Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.

Editor's Notes

  1. 1
  翻译: