SlideShare uma empresa Scribd logo
1 de 26
Presented By-Rahul Singh
CSE 3rd Year
College-Nitra Technical Campus Ghaziabad
Linkedin - https://www.linkedin.com/in/rahul-singh-
171b77156/

Outline-
 1. Introduction
 2. Biometrics
 3. History
 4. Facial Recognition
 5. Implementation
 6. How it works
 7. Strengths & Weaknesses
 8. Applications
 9. Conclusion
 10. Refrences
Introduction
 Everyday actions are increasingly being
handled electronically, instead of pencil and
paper or face to face.
 This growth in electronic transactions
results in great demand for fast and accurate
user identification and authentication.
Biometrics
 A biometric is a unique, measurable characteristic of a
human being that can be used to automatically
recognize an individual or verify an individual’s
identity.
 Biometrics can measure both physiological and
behavioral characteristics.
 Physiological biometrics:- This biometrics is based on
measurements and data derived from direct
measurement of a part of the human body.
 Behavioral biometrics:- this biometrics is based on
measurements and data derived from an action
Type of biometrics
What is face recognition system ?
 A facial recognition system is a technology
capable of identifying or verifying a person
from a digital image or a video frame from
a video source.
 It requires no physical interaction on
behalf of the user.
 It is accurate and allows for high
enrolment and verification rates.
 It can use your existing hardware
infrastructure, existing camaras and image
capture Devices will work with no
problems
History
 In 1960s, the first semi-automated system for facial
recognition to locate the features(such as eyes, ears,
nose and mouth) on the photographs.
 In 1970s, Goldstein and Harmon used 21 specific
subjective markers such as hair color and lip thickness
to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition. 03/12/13 8
Facial Recognition
 VERIFICATION- The system compares the given
individual with who they say they are and gives a yes or
no decision.
 IDENTIFICATION- The system compares the given
individual to all the Other individuals in the database
and gives a ranked list of matches.
Identification
 All identification or authentication technologies operate
using the following four stages:
 Capture: A physical or behavioural sample is captured by
the system during Enrollment and also in identification or
verification process.
 Extraction: unique data is extracted from the sample and a
template is created.
 Comparison: the template is then compared with a new
sample.
 Match/non-match: the system decides if the features
extracted from the new Samples are a match or a non
match.
Implimentation
The implementation
of face recognition
technology includes
the following four
stages:
• Image acquisition
• Image processing
•Face image
classification
• Decision making
Image acquisition
Image Processing
 Images are cropped such
that the ovoid facial
image remains, and color
images are normally
converted to black and
white in order to
facilitate initial
comparisons based on
grayscale characteristics.
Distinctive characteristic
location
 All facial-scan systems
attempt to match visible
facial features in a
fashion similar to the
way people recognize
one another.
Template creation
Template matching
 It compares match templates against enrollment
templates.
 • A series of images is acquired and scored against
the enrollment, so that a user attempting 1:1
verification within a facial-scan system may have
10 to 20 match attempts take place within 1 to 2
seconds.
How Facial Recognition System
Works
Strengths
 It is the only biometric able to operate without user cooperation.
 Anywhere that you can put a camera, you can potentially use a facial
recognition system. Many cameras can be installed throughout a
location to maximize security coverage without disrupting traffic
flow.
 Face recognition systems can be installed to require a person to
explicitly step up to a camera and get their picture taken, or to
automatically survey people as they pass by a camera. The later
mode allows for scanning of many people at the same time
 Video or pictures can be replayed through a facial recognition system
for surveillance or forensics work after an event.
 Face scanning is not noticeable, can be done at a comfortable
distance and does not require the user to touch anything.
Weaknesses
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics
reduce matching accuracy.
 It has the potential for privacy abuse due to
non co-operative enrollment and
identification capabilities.
 Such systems may be fooled by hats, beards,
sunglasses and face masks.
Applications
 Banking using ATM
 Voter verification
 Residential/office
Security:
 Security/Counterterroris
m
 Smart Security system
Application
 Apple iPhone X uses
Face id technology.
Applications:Video Demo
Conclusion
 For implementations where the biometric
system must verify and identify users
reliably over time, facial scan can be a very
difficult, but not impossible, technology to
implement successfully.
In National Security
Show of hands, who
believe this system
would work to catch
terrorists and criminals
Reference-
 Wikipedia
 Slide Share
 Google-for images
 Tutorialpoint.com
Face Recognition System/Technology

Mais conteúdo relacionado

Mais procurados

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
12202843
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 

Mais procurados (20)

face recognition
face recognitionface recognition
face recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 

Semelhante a Face Recognition System/Technology

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
IOSR Journals
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
IOSR Journals
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

Semelhante a Face Recognition System/Technology (20)

Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Biometric Face Recognition System
Biometric Face Recognition SystemBiometric Face Recognition System
Biometric Face Recognition System
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Face Recognition System/Technology

  • 1. Presented By-Rahul Singh CSE 3rd Year College-Nitra Technical Campus Ghaziabad Linkedin - https://www.linkedin.com/in/rahul-singh- 171b77156/ 
  • 2. Outline-  1. Introduction  2. Biometrics  3. History  4. Facial Recognition  5. Implementation  6. How it works  7. Strengths & Weaknesses  8. Applications  9. Conclusion  10. Refrences
  • 3. Introduction  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  • 4. Biometrics  A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity.  Biometrics can measure both physiological and behavioral characteristics.  Physiological biometrics:- This biometrics is based on measurements and data derived from direct measurement of a part of the human body.  Behavioral biometrics:- this biometrics is based on measurements and data derived from an action
  • 6. What is face recognition system ?
  • 7.  A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems
  • 8. History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition. 03/12/13 8
  • 9. Facial Recognition  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 10. Identification  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 11. Implimentation The implementation of face recognition technology includes the following four stages: • Image acquisition • Image processing •Face image classification • Decision making
  • 13. Image Processing  Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.
  • 14. Distinctive characteristic location  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.
  • 16. Template matching  It compares match templates against enrollment templates.  • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds.
  • 17. How Facial Recognition System Works
  • 18. Strengths  It is the only biometric able to operate without user cooperation.  Anywhere that you can put a camera, you can potentially use a facial recognition system. Many cameras can be installed throughout a location to maximize security coverage without disrupting traffic flow.  Face recognition systems can be installed to require a person to explicitly step up to a camera and get their picture taken, or to automatically survey people as they pass by a camera. The later mode allows for scanning of many people at the same time  Video or pictures can be replayed through a facial recognition system for surveillance or forensics work after an event.  Face scanning is not noticeable, can be done at a comfortable distance and does not require the user to touch anything.
  • 19. Weaknesses  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to non co-operative enrollment and identification capabilities.  Such systems may be fooled by hats, beards, sunglasses and face masks.
  • 20. Applications  Banking using ATM  Voter verification  Residential/office Security:  Security/Counterterroris m  Smart Security system
  • 21. Application  Apple iPhone X uses Face id technology.
  • 23. Conclusion  For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.
  • 24. In National Security Show of hands, who believe this system would work to catch terrorists and criminals
  • 25. Reference-  Wikipedia  Slide Share  Google-for images  Tutorialpoint.com