SlideShare uma empresa Scribd logo
1 de 27
Christina Carr, Becky Schaffran, & Tess Cimini

FACIAL RECOGNITION
Myheritage.com
Guess Who?
Guess Who?
Guess Who?
Guess Who?
What is it?

 Facial recognition systems are built on
  computer programs that analyze images of
  human faces for the purpose of identifying
  them.
How does it work?

 Measure specific facial characteristics to
  create unique file called “template”
 Using templates, compare image to another
  image
   Produces a score on similarity
   Video camera signals
   Pre-existing photos
     i.e. drivers license databases
2D Facial Recognition

 2D Recognition
   Maximum angle: 35 degrees
   Must be similar to program in database
   Sometimes ineffective due to lighting changes
    and other uncontrolled variables
3D Recognition

 3D Recognition
   Can create template from face at 90 degree angle
   More accurate
   Uses depth and an axis of measurement not
    affected by lighting
 Example: Identix® - FaceIt®
   Landmarks or nodal points
   And now: FaceIt®Argus, skin biometrics
eps of 3D Recognition
Uses

                 • Law Enforcement
   Security
                 • Casinos, Super Bowl, Olympics


                 • Border control
Transportation
                 • E-passports


                 • Facebook
Entertainment
                 • SceneTap
Security
 Closed-circuit television (CCTV)
   Surveillance technology crosschecked with mugshot
    databases
Security

 Casinos
 Super Bowl
   Tampa, Fl. (2001): 19 people identified
 London 2012 Olympics
 MORIS
Transportation
 Germany: Fully automated border controls
 Australia: SmartGate
   Compares the face of the individual with image in
    the e-passport microchip
Entertainment

  Facebook Tag
   Suggest
  SceneTap
    50 Chicago bars
  Apps in progress
    Apple
New Developments

 ATM’s
 Advertising & marketing

 “Adidas is working with Intel to install and test digital walls with
 facial recognition in a handful of stores either in the U.S. or Britain.
 If a woman in her 50s walks by and stops, 60% of the shoes
 displayed will be for females in her age bracket, while the other
 40% will be a random sprinkling of other goods.

 ‘If a retailer can offer the right products quickly, people are more
 likely to buy something,’ said Chris Aubrey, vice president of global
 retail marketing for Adidas.”
“Facial Recognition Technology
Challenges Privacy”
 http://abclocal.go.com/kgo/video?id=842585
  5&syndicate=syndicate&section
Limitations

 Not 100% accurate.
 Accuracy can fluctuate because of:
   picture quality
   Lighting
   camera positions
   facial expressions
   and more
Security Issues

 Mistaken identity cases
 Images cannot be used to convict suspects
 The CCTV cameras in London
   1 crime solved per 1000 cameras
CCTV Clip

 http://www.youtube.com/watch?v=fLEtzI1oe
 wI
MORIS

 Mobile Offender Recognition and
  Information System
 Illegal search without a warrant
 No information is stored
Facebook

 Has roughly 600 million users
   that means that Facebook has a database of 600
    million faces.
 Each time you “tag” a photo, Facebook learns
  more about your face.
Google

 Picasa uses the same tagging techniques
 People fear a face recognition update to the
  app Google Goggles.
   the app may even be able to identify peoples SSNs
    just from the photo.
Adam Harvey
•CV Dazzle
•Found
ways to
cheat face
recognition
WHAT DO YOU THINK?

Mais conteúdo relacionado

Destaque

Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformPivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformEMC
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investingTravis Klein
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics EMC
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopijadsrdoc
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?Dr. Raju M. Mathew
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Mamta Binani
 
El cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilEl cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilmgonellgomez
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1pvsa_8990
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...EMC
 
Tues palace of versailles
Tues palace of versaillesTues palace of versailles
Tues palace of versaillesTravis Klein
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religionTravis Klein
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoEMC
 
Informe consulta devoluciones
Informe consulta devolucionesInforme consulta devoluciones
Informe consulta devolucionesNathalia Sanchez
 

Destaque (20)

Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platformPivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
Pivotal deep dive_on_pivotal_hd_world_class_hdfs_platform
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investing
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
Hodočašće u lourdes i paray le-monial 2011 - kopija
Hodočašće u lourdes  i paray le-monial 2011 - kopijaHodočašće u lourdes  i paray le-monial 2011 - kopija
Hodočašće u lourdes i paray le-monial 2011 - kopija
 
Day 11
Day 11Day 11
Day 11
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
การนำเสนอโดยการเขียน
การนำเสนอโดยการเขียนการนำเสนอโดยการเขียน
การนำเสนอโดยการเขียน
 
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?KNOWLEDGE MANAGEMENT - WHERE  THEY ARE GONE WRONG?
KNOWLEDGE MANAGEMENT - WHERE THEY ARE GONE WRONG?
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013Comparative analysis 98 sections of cos act 2013
Comparative analysis 98 sections of cos act 2013
 
El cas del... oriol, oriol i nil
El cas del... oriol, oriol i nilEl cas del... oriol, oriol i nil
El cas del... oriol, oriol i nil
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Wed thurs reform
Wed thurs reformWed thurs reform
Wed thurs reform
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
Tues palace of versailles
Tues palace of versaillesTues palace of versailles
Tues palace of versailles
 
Mon wars of religion
Mon wars of religionMon wars of religion
Mon wars of religion
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Day 9
Day 9Day 9
Day 9
 
Informe consulta devoluciones
Informe consulta devolucionesInforme consulta devoluciones
Informe consulta devoluciones
 

Semelhante a Facial Recognition

Facial recognition
Facial recognitionFacial recognition
Facial recognitiontcimini
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignmentMagalyLippens
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
Combatting Bias in Machine Learning
Combatting Bias in Machine LearningCombatting Bias in Machine Learning
Combatting Bias in Machine LearningAyodele Odubela
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and mathKejti Cela
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptxGAMINGRBF
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyFabrizio Gramuglio
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detectionStudentRocks
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpointdkeane01
 
Onboarding AI & Machine Learning
Onboarding AI & Machine LearningOnboarding AI & Machine Learning
Onboarding AI & Machine LearningBrian Pichman
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?DLabs
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVIKAS KULKARNI
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxMuhammedNihadP
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition TechnologyAvinash Singh
 

Semelhante a Facial Recognition (20)

Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Combatting Bias in Machine Learning
Combatting Bias in Machine LearningCombatting Bias in Machine Learning
Combatting Bias in Machine Learning
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpoint
 
Onboarding AI & Machine Learning
Onboarding AI & Machine LearningOnboarding AI & Machine Learning
Onboarding AI & Machine Learning
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technology
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Facial Recognition

  • 1. Christina Carr, Becky Schaffran, & Tess Cimini FACIAL RECOGNITION
  • 3.
  • 8. What is it?  Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them.
  • 9. How does it work?  Measure specific facial characteristics to create unique file called “template”  Using templates, compare image to another image  Produces a score on similarity  Video camera signals  Pre-existing photos  i.e. drivers license databases
  • 10. 2D Facial Recognition  2D Recognition  Maximum angle: 35 degrees  Must be similar to program in database  Sometimes ineffective due to lighting changes and other uncontrolled variables
  • 11. 3D Recognition  3D Recognition  Can create template from face at 90 degree angle  More accurate  Uses depth and an axis of measurement not affected by lighting  Example: Identix® - FaceIt®  Landmarks or nodal points  And now: FaceIt®Argus, skin biometrics
  • 12. eps of 3D Recognition
  • 13. Uses • Law Enforcement Security • Casinos, Super Bowl, Olympics • Border control Transportation • E-passports • Facebook Entertainment • SceneTap
  • 14. Security  Closed-circuit television (CCTV)  Surveillance technology crosschecked with mugshot databases
  • 15. Security  Casinos  Super Bowl  Tampa, Fl. (2001): 19 people identified  London 2012 Olympics  MORIS
  • 16. Transportation  Germany: Fully automated border controls  Australia: SmartGate  Compares the face of the individual with image in the e-passport microchip
  • 17. Entertainment  Facebook Tag Suggest  SceneTap  50 Chicago bars  Apps in progress  Apple
  • 18. New Developments  ATM’s  Advertising & marketing “Adidas is working with Intel to install and test digital walls with facial recognition in a handful of stores either in the U.S. or Britain. If a woman in her 50s walks by and stops, 60% of the shoes displayed will be for females in her age bracket, while the other 40% will be a random sprinkling of other goods. ‘If a retailer can offer the right products quickly, people are more likely to buy something,’ said Chris Aubrey, vice president of global retail marketing for Adidas.”
  • 19. “Facial Recognition Technology Challenges Privacy”  http://abclocal.go.com/kgo/video?id=842585 5&syndicate=syndicate&section
  • 20. Limitations  Not 100% accurate.  Accuracy can fluctuate because of:  picture quality  Lighting  camera positions  facial expressions  and more
  • 21. Security Issues  Mistaken identity cases  Images cannot be used to convict suspects  The CCTV cameras in London  1 crime solved per 1000 cameras
  • 23. MORIS  Mobile Offender Recognition and Information System  Illegal search without a warrant  No information is stored
  • 24. Facebook  Has roughly 600 million users  that means that Facebook has a database of 600 million faces.  Each time you “tag” a photo, Facebook learns more about your face.
  • 25. Google  Picasa uses the same tagging techniques  People fear a face recognition update to the app Google Goggles.  the app may even be able to identify peoples SSNs just from the photo.
  • 26. Adam Harvey •CV Dazzle •Found ways to cheat face recognition
  • 27. WHAT DO YOU THINK?

Notas do Editor

  1. -Age is an issue: a study by government’s National Insitute of Standards and Technology found false negative rates for face-recognition verification of 43 percent using photos from only 18 months earlier
  2. Skin biometrics: surface texture analysis of texture of skin, uses algorithms to turn patch of skin into mathematical, measurable space Can define the differences between twins Many problems wouldn’t work if: significant glare on sunglasses, long hair in center of face, poor lighting, lack of resolution
  3. detection: scans already existing 2d photograph or a shot from a 3D video Alignment: up to 90 degrees turned hereMeasurement: measures curves of face on submillimeter scale and creates a templateRepresentation: translates into unique code to create template with set of numbers to represent a person’s faceMatching: new technology converts 3D image into 2D image using algorithm to compare to 2D image in database
  4. From :55 to 2:05ish