SlideShare uma empresa Scribd logo
1 de 13
FACE RECOGNITION
TECHNOLOGY
INTRODUCTION
Facial recognition (or face recognition) is a type of biometric software
application that can identify a specific individual in a digital image by analyzing and
comparing patterns.
Facial recognition systems are commonly used for security purposes but are
increasingly being used in a variety of other applications. For example, Facebook uses
facial recognition software to help automate user tagging in photographs.
1. What are biometrics?
Ans: A biometric is a unique, measurable characteristic of a human being that can be
used to automatically recognize an individual or verify an individual identity. Biometrics
can measure both physiological and behavioral characteristics.
Physiological biometrics (based on measurements and data derived from direct the
human body) include:
a. Finger-scan ,
b. Facial Recognition,
c. Iris-scan ,
d. Retina-scan and
e. Hand-scan.
Behavioral biometrics (based on measurements and data derived from an action)
include:
a. Voice-scan ,
b. Signature-scan and
c. Keystroke-scan .
FACE RECOGNITION
The face is an important part of who you are and how people identify you.
For face recognition there are two types of comparisons.
The first is verification and the second is identification.
verification is where the system compares the given individual with who that
individual says they are and gives a yes or no decision..
identification is where the system compares the given individual to all the
Other individuals in the database and gives a ranked list of matches.
All identification or authentication technologies operate using the following
four stages:
1. Capture: A physical sample is captured by the system during enrollment and
also in identification or Verification process.
2. Extraction: unique data is extracted from the sample and a template is
created.
3. Comparison: the template is then compared with a new sample.
4. Match/Non match: the system decides if the features extracted from the
new
CAPTURING OF IMAGE BY STANDARD
VIDEO CAMERAS
The image is optical in characteristics and may be thought of as a collection of a
large number of bright and dark areas representing the picture details.
In other words the picture information is a function of two variables:
Time and Space.
It would require infinite number of channels to transmit optical information
corresponding to picture elements simultaneously. There is practical difficulty in
transmitting all information simultaneously so we use a method called scanning.
COMPONENTS OF FACE RECOGNITION
SYSTEMS
The 3 main components of face recognition systems, they are as follows
 Enrollment module,
 Database and
 Identification module.
HOW FACE RECOGNITION SYSTEMS WORK
Facial recognition software is based on the ability to first recognize faces, which
is a technological feat in itself.
If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial features.
There are about 80 nodal points on a human face. Here are few nodal points that
are measured by the software.
• Distance between the eyes
• Width of the nose
• Depth of the eye socket
• Cheekbones
• Jaw line and
• Chin
These nodal points are measured to create a numerical code, a string of numbers
that represents a face in the database. This code is called face print.
Only 14 to 22 nodal points are needed for faceit software to complete the
recognition process
IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
The implementation of face recognition technology includes the following four
stages:
1. Data acquisition,
2. Input processing ,
3. Face image classification and
4. Decision making .
PERFORMANCE
1. False rejection rates (FRR) :
The probability that a system will fail to identify an enrollee. It is also called
type 1 error rate.
FRR= NFR/NEIA
Where
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification attempt
2. False acceptance rate (FAR) :
The probability that a system will incorrectly identify an individual or will fail
to reject an imposter. It is also called as type 2 error rate
FAR= NFA/NIIA
Where
FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter identification attempts
SOFTWARES
Facial recognition software falls into a larger group of technologies known as
biometrics. Facial recognition methods may vary, but they generally involve a series of
steps that serve to capture, analyze and compare your face to a database of stored images.
The basic process that is used by the Faceit system to capture and compare
images:
1. Detection,
2. Alignment,
3. Normalization,
4. Representation and
5. Matching.
Advantages :
1. There are many benefits to face recognition systems such as its convenience
and Social acceptability. All you need is your picture taken for it to work.
2. Face recognition is easy to use and in many cases it can be performed without
a Person even knowing.
3. Face recognition is also one of the most inexpensive biometric in the market
and Its price should continue to go down.
ADVANTAGES AND DISADVANTAGES
Disadvantage:
1. Face recognition systems cant tell the difference between identical twins.
There are numerous applications for face recognition technology:
Commercial Use:
a. Day Care: Verify identity of individuals picking up the children.
b. Residential Security: Alert homeowners of approaching personnel
c. Voter verification: Where eligible politicians are required to verify
their identity during a voting process.
d. Banking using ATM: The software is able to quickly verify a customer.
APPLICATIONS
Face recognition technologies have been associated generally with very costly
top secure applications. Today the core technologies have evolved and the cost of
equipment is going down dramatically due to the integration and the increasing
processing power. Certain applications of face recognition technology are now cost
effective, reliable and highly accurate.
CONCLUSION
THANK YOU
For any mistakes and suggestion’s feel free to text here
idamakanti.jaswanth@gmail.com

Mais conteúdo relacionado

Mais procurados

Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Face Detection
Face DetectionFace Detection
Face DetectionAmr Sheta
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 

Mais procurados (20)

Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
face recognition
face recognitionface recognition
face recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 

Destaque

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognitionDhanush Kasargod
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 

Destaque (9)

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
gait analysis
gait analysisgait analysis
gait analysis
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Kb gait-recognition
Kb gait-recognitionKb gait-recognition
Kb gait-recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 

Semelhante a FACE RECOGNITION TECHNOLOGY

Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyJawhar Ali
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric systemdominichilton98
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 

Semelhante a FACE RECOGNITION TECHNOLOGY (20)

Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 

Mais de JASHU JASWANTH

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETEJASHU JASWANTH
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)JASHU JASWANTH
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESJASHU JASWANTH
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)JASHU JASWANTH
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaJASHU JASWANTH
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDJASHU JASWANTH
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.JASHU JASWANTH
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of WomenJASHU JASWANTH
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSJASHU JASWANTH
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...JASHU JASWANTH
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES JASHU JASWANTH
 

Mais de JASHU JASWANTH (15)

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETE
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIES
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, China
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLAND
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of Women
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
UNITS & CONVERSIONS
UNITS & CONVERSIONSUNITS & CONVERSIONS
UNITS & CONVERSIONS
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES
 

Último

4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 

Último (20)

4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 

FACE RECOGNITION TECHNOLOGY

  • 2. INTRODUCTION Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other applications. For example, Facebook uses facial recognition software to help automate user tagging in photographs. 1. What are biometrics? Ans: A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct the human body) include: a. Finger-scan , b. Facial Recognition, c. Iris-scan , d. Retina-scan and e. Hand-scan. Behavioral biometrics (based on measurements and data derived from an action) include: a. Voice-scan , b. Signature-scan and c. Keystroke-scan .
  • 3. FACE RECOGNITION The face is an important part of who you are and how people identify you. For face recognition there are two types of comparisons. The first is verification and the second is identification. verification is where the system compares the given individual with who that individual says they are and gives a yes or no decision.. identification is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. All identification or authentication technologies operate using the following four stages: 1. Capture: A physical sample is captured by the system during enrollment and also in identification or Verification process. 2. Extraction: unique data is extracted from the sample and a template is created. 3. Comparison: the template is then compared with a new sample. 4. Match/Non match: the system decides if the features extracted from the new
  • 4. CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS The image is optical in characteristics and may be thought of as a collection of a large number of bright and dark areas representing the picture details. In other words the picture information is a function of two variables: Time and Space. It would require infinite number of channels to transmit optical information corresponding to picture elements simultaneously. There is practical difficulty in transmitting all information simultaneously so we use a method called scanning.
  • 5. COMPONENTS OF FACE RECOGNITION SYSTEMS The 3 main components of face recognition systems, they are as follows  Enrollment module,  Database and  Identification module.
  • 6. HOW FACE RECOGNITION SYSTEMS WORK Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. There are about 80 nodal points on a human face. Here are few nodal points that are measured by the software. • Distance between the eyes • Width of the nose • Depth of the eye socket • Cheekbones • Jaw line and • Chin These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print. Only 14 to 22 nodal points are needed for faceit software to complete the recognition process
  • 7. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY The implementation of face recognition technology includes the following four stages: 1. Data acquisition, 2. Input processing , 3. Face image classification and 4. Decision making .
  • 8. PERFORMANCE 1. False rejection rates (FRR) : The probability that a system will fail to identify an enrollee. It is also called type 1 error rate. FRR= NFR/NEIA Where FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt 2. False acceptance rate (FAR) : The probability that a system will incorrectly identify an individual or will fail to reject an imposter. It is also called as type 2 error rate FAR= NFA/NIIA Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 9. SOFTWARES Facial recognition software falls into a larger group of technologies known as biometrics. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. The basic process that is used by the Faceit system to capture and compare images: 1. Detection, 2. Alignment, 3. Normalization, 4. Representation and 5. Matching.
  • 10. Advantages : 1. There are many benefits to face recognition systems such as its convenience and Social acceptability. All you need is your picture taken for it to work. 2. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. 3. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. ADVANTAGES AND DISADVANTAGES Disadvantage: 1. Face recognition systems cant tell the difference between identical twins.
  • 11. There are numerous applications for face recognition technology: Commercial Use: a. Day Care: Verify identity of individuals picking up the children. b. Residential Security: Alert homeowners of approaching personnel c. Voter verification: Where eligible politicians are required to verify their identity during a voting process. d. Banking using ATM: The software is able to quickly verify a customer. APPLICATIONS
  • 12. Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. CONCLUSION
  • 13. THANK YOU For any mistakes and suggestion’s feel free to text here idamakanti.jaswanth@gmail.com