SlideShare uma empresa Scribd logo
1 de 14
FACE RECOGNIZATION
By
K.Mounika
K.S Mounika
TABLE OF CONTENTS
Introduction.
How it works?
2D Facial Recognization.
3D Facial Recognization.
Current And Future .
Base line Algorithms.
Conclusion.
INTRODUCTION
• In 1960’s Scientists began work on using
the computer to recognize human faces
• Since then, final recognization software
has come a long way
• Facial recognization software is based on
the ability to recognization a face and
then measure various features of the file
• Every face has numerous, distinguishable
landmarks, the different peaks and
valleys
HOW FACIAL RECOGNIZATION WORKS?
The Software measures
• Distance between the eyes
• Width of the nose.
• Depth of the eye sockets.
• The shape of the cheek bones.
• The length of jaw line.
• These create a numerical code
called face print, representing
the face in the database.
2D FACIAL RECOGNIZATION
3D FACIAL RECOGNIZATION
• Emerging trend in facial recognization software
using a 3D model which provide more accuracy.
• It can even be used in darkness and has the
ability to recognize a subject at different view
angles.
• Using 3D software ,the system goes through a
series of steps to verify the identity of an
individual.
WORKING STEPS…
•Acquiring an image can be
accomplished by digitally
scanning device.
•Once it detects a face,
the system determines the
head’s position, size and
pose.
WORKING STEPS…
The system measures the
curves of the face on a sub-
millimeter scale and creates
a template.
The system translates the unique
code .
WORKING STEPS…
If the image is 3D and the
database contains 3D images,
then matching will take place
without any changes being
made to the image.
In verification, an image is
matched to only one image in
the database.
HARDWARE AND SOFTWARE
REQUIREMENTS
Hardware requirements
• Intel Pentium processor or any other
compatible processor,1 GHz or greater
• Minimum 128 MB of RAM capacity or
more
• Minimum of 32 MB Graphic Card RAM
capacities or more
• Recommended hard disk space of 1GB or
more
HARDWARE AND SOFTWARE
REQUIREMENTS
Software requirements
• Windows 2000/XP or above, Linux. Mac OS
X, Unix
• Python 2.5
• PyQt-Py 2.5
ADVANTAGES
• Repeat offenders are identified using
facial recovery.
• It has been used by Law Enforcement
Agencies to capture random faces in
crowd.
• It is used to verify that the person
received the visa is same person
attempting to gain entry.
• Easy way to access personal accounts
without remembering passwords.
DISADVANTAGES
• Variant Pose may occur because
people always don’t orient to camera
• Different lighting and quality of
camera may also effect recognition
• Invasion of privacy
• Too easy to misuse for wrong
purposes
CONCLUSION
The computer based face recognition industry
has made much useful advancement in past
decade however, the need for higher accuracy
systems remains. Through the determination and
commitment the progress will continue, raising
the bar for face recognition technology.
FUTURE APPLICATION
A4vision, a creator of facial recognition software
is current marketing a system that will keep
track of employee’s time and attendance.

Mais conteúdo relacionado

Mais procurados

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
12206695
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 

Mais procurados (20)

Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 

Destaque (10)

Introduction to pattern recognization
Introduction to pattern recognizationIntroduction to pattern recognization
Introduction to pattern recognization
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
1.palm vein technology(final)
1.palm vein technology(final)1.palm vein technology(final)
1.palm vein technology(final)
 
Pattern Recognition and its Applications
Pattern Recognition and its ApplicationsPattern Recognition and its Applications
Pattern Recognition and its Applications
 
Artificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition systemArtificial intelligence Pattern recognition system
Artificial intelligence Pattern recognition system
 
Pattern Recognition
Pattern RecognitionPattern Recognition
Pattern Recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Introduction to pattern recognition
Introduction to pattern recognitionIntroduction to pattern recognition
Introduction to pattern recognition
 

Semelhante a Face recognization 1

Biometric Recognition using Deep Learning
Biometric Recognition using Deep LearningBiometric Recognition using Deep Learning
Biometric Recognition using Deep Learning
SahithiKotha2
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_en
gaviles01
 
Emotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.pptEmotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.ppt
Gopi Naidu
 
Sixth sense techno_ppt
Sixth sense techno_pptSixth sense techno_ppt
Sixth sense techno_ppt
Feroz Ahmed
 
spt vision objects
spt vision objectsspt vision objects
spt vision objects
Polo Dimeo
 

Semelhante a Face recognization 1 (20)

Flatbed scanner
Flatbed scannerFlatbed scanner
Flatbed scanner
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Face recognition and math
Face recognition and mathFace recognition and math
Face recognition and math
 
Overview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear IndustryOverview of Computer Vision For Footwear Industry
Overview of Computer Vision For Footwear Industry
 
Biometric Recognition using Deep Learning
Biometric Recognition using Deep LearningBiometric Recognition using Deep Learning
Biometric Recognition using Deep Learning
 
ICS1020 CV
ICS1020 CVICS1020 CV
ICS1020 CV
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_en
 
Computer architecture for vision system
Computer architecture for vision systemComputer architecture for vision system
Computer architecture for vision system
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Artificial Intelligence (A.I) and Its Application -Seminar
Artificial Intelligence (A.I) and Its Application -SeminarArtificial Intelligence (A.I) and Its Application -Seminar
Artificial Intelligence (A.I) and Its Application -Seminar
 
Blue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feelBlue Eyes-Even machines can sense and feel
Blue Eyes-Even machines can sense and feel
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Emotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.pptEmotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.ppt
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.
 
Sixth sense techno_ppt
Sixth sense techno_pptSixth sense techno_ppt
Sixth sense techno_ppt
 
Virtual Mouse
Virtual MouseVirtual Mouse
Virtual Mouse
 
spt vision objects
spt vision objectsspt vision objects
spt vision objects
 
Face Detection
Face DetectionFace Detection
Face Detection
 
blue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptxblue eyes technology 2 by study wars.pptx
blue eyes technology 2 by study wars.pptx
 
Presentationanjali.pptx
Presentationanjali.pptxPresentationanjali.pptx
Presentationanjali.pptx
 

Último

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Face recognization 1

  • 2. TABLE OF CONTENTS Introduction. How it works? 2D Facial Recognization. 3D Facial Recognization. Current And Future . Base line Algorithms. Conclusion.
  • 3. INTRODUCTION • In 1960’s Scientists began work on using the computer to recognize human faces • Since then, final recognization software has come a long way • Facial recognization software is based on the ability to recognization a face and then measure various features of the file • Every face has numerous, distinguishable landmarks, the different peaks and valleys
  • 4. HOW FACIAL RECOGNIZATION WORKS? The Software measures • Distance between the eyes • Width of the nose. • Depth of the eye sockets. • The shape of the cheek bones. • The length of jaw line. • These create a numerical code called face print, representing the face in the database.
  • 6. 3D FACIAL RECOGNIZATION • Emerging trend in facial recognization software using a 3D model which provide more accuracy. • It can even be used in darkness and has the ability to recognize a subject at different view angles. • Using 3D software ,the system goes through a series of steps to verify the identity of an individual.
  • 7. WORKING STEPS… •Acquiring an image can be accomplished by digitally scanning device. •Once it detects a face, the system determines the head’s position, size and pose.
  • 8. WORKING STEPS… The system measures the curves of the face on a sub- millimeter scale and creates a template. The system translates the unique code .
  • 9. WORKING STEPS… If the image is 3D and the database contains 3D images, then matching will take place without any changes being made to the image. In verification, an image is matched to only one image in the database.
  • 10. HARDWARE AND SOFTWARE REQUIREMENTS Hardware requirements • Intel Pentium processor or any other compatible processor,1 GHz or greater • Minimum 128 MB of RAM capacity or more • Minimum of 32 MB Graphic Card RAM capacities or more • Recommended hard disk space of 1GB or more
  • 11. HARDWARE AND SOFTWARE REQUIREMENTS Software requirements • Windows 2000/XP or above, Linux. Mac OS X, Unix • Python 2.5 • PyQt-Py 2.5
  • 12. ADVANTAGES • Repeat offenders are identified using facial recovery. • It has been used by Law Enforcement Agencies to capture random faces in crowd. • It is used to verify that the person received the visa is same person attempting to gain entry. • Easy way to access personal accounts without remembering passwords.
  • 13. DISADVANTAGES • Variant Pose may occur because people always don’t orient to camera • Different lighting and quality of camera may also effect recognition • Invasion of privacy • Too easy to misuse for wrong purposes
  • 14. CONCLUSION The computer based face recognition industry has made much useful advancement in past decade however, the need for higher accuracy systems remains. Through the determination and commitment the progress will continue, raising the bar for face recognition technology. FUTURE APPLICATION A4vision, a creator of facial recognition software is current marketing a system that will keep track of employee’s time and attendance.