SlideShare a Scribd company logo
1 of 29
Submitted To: Submitted By:
Prof. Sandeep Santosh Kashish Garg
1130319
Face Recognition
Contents
 Introduction
 History
 Facial Recognition
 Implementation
 How it works
 Strengths & Weaknesses
 Applications
 Advantages
 Disadvantages
 Conclusion
 References
Introduction
 Everyday actions are increasingly being
handled electronically, instead of pencil and
paper or face to face.
 This growth in electronic transactions results
in great demand for fast and accurate user
identification and authentication.
 Access codes for buildings, banks accounts and
computer systems often use PIN's for
identification and security clearances.
Contd…
 Using the proper PIN gains access, but the
user of the PIN is not verified. When
credit and ATM cards are lost or stolen, an
unauthorized user can often come up
with the correct personal codes.
 Face recognition technology may solve
this problem since a face is undeniably
connected to its owner except in the case
of identical twins.
Facial Recognition ???
 It requires no physical interaction on
behalf of the user.
 It is accurate and allows for high
enrolment and verification rates.
 It can use your existing hardware
infrastructure, existing cameras and image
capture Devices will work with no
problems
History
 In 1960s, the first semi-automated system for
facial recognition to locate the features(such
as eyes, ears, nose and mouth) on the
photographs.
 In 1970s, Goldstein and Harmon used 21
specific subjective markers such as hair Color
and lip thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition.
Facial Recognition
In Facial recognition there are two types
of comparisons:-
 VERIFICATION- The system compares
the given individual with who they say
they are and gives a yes or no
decision.
 IDENTIFICATION- The system
compares the given individual to all
the Other individuals in the database
and gives a ranked list of matches.
Contd…
 All identification or authentication technologies
operate using the following four stages:
 Capture: A physical or behavioral sample is
captured by the system during Enrollment and also
in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared with
a new sample.
 Match/non-match: the system decides if the
features extracted from the new Samples are a
match or a non match.
Implementation
The implementation of face recognition
technology includes the following four stages:
• Image acquisition
• Image processing
• Distinctive characteristic location
• Template creation
• Template matching
Image acquisition
• Facial-scan technology can acquire faces from
almost any static camera or video system that
generates images of sufficient quality and
resolution.
• High-quality enrollment is essential to
eventual verification and identification
enrollment images define the facial
characteristics to be used in all future
authentication events.
Image Processing
Images are cropped such that the ovoid facial image
remains, and color images are normally converted to
black and white in order to facilitate initial
comparisons based on grayscale characteristics.
 First the presence of faces or face in a scene must be
detected. Once the face is detected, it must be
localized and Normalization process may be required
to bring the dimensions of the live facial sample in
alignment with the one on the template.
Distinctive characteristic
location
 All facial-scan systems attempt to match
visible facial features in a fashion similar to
the way people recognize one another.
 The features most often utilized in facial-
scan systems are those least likely to
change significantly over time: upper ridges
of the eye sockets, areas around the
cheekbones, sides of the mouth, nose
shape, and the position of major features
relative to each other.
Contd..
 Behavioural changes such as alteration of
hairstyle, changes in makeup, growing or
shaving facial hair, adding or removing
eyeglasses are behaviours that impact the
ability of facial-scan systems to locate
distinctive features, facial-scan systems are not
yet developed to the point where they can
overcome such variables.
Template creation
Template matching
• It compares match templates against enrollment
templates.
• A series of images is acquired and scored against
the enrollment, so that a user attempting 1:1
verification within a facial-scan system may have
10 to 20 match attempts take place within 1 to 2
seconds.
• facial-scan is not as effective as finger-scan or
iris-scan in identifying a single individual from a
large database, a number of potential matches
are generally returned after large-scale facial-
scan identification searches.
How Facial Recognition System Works
 Facial recognition software is based on the
ability to first recognize faces, which is a
technological feat in itself. If you look at the
mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks
and valleys that make up the different facial
features.
 VISIONICS defines these landmarks as nodal
points. There are about 80 nodal points on a
human face.
Contd..
Here are few nodal points that are
measured by the software.
1. distance between the eyes
2. width of the nose
3. depth of the eye socket
4. cheekbones
5. jaw line
6. chin
SOFTWARE
 Detection- when the system is attached to a
video surveilance system, the recognition
software searches the field of view of a video
camera for faces. If there is a face in the view, it
is detected within a fraction of a second. A
multi-scale algorithm is used to search for faces
in low resolution. The system switches to a high-
resolution search only after a head-like shape is
detected.
 Alignment- Once a face is detected, the system
determines the head's position, size and pose. A
face needs to be turned at least 35 degrees
toward the camera for the system to register it.
Contd…
 Normalization-The image of the head is scaled and
rotated so that it can be registered and mapped into an
appropriate size and pose. Normalization is performed
regardless of the head's location and distance from the
camera. Light does not impact the normalization
process.
 Representation-The system translates the facial data
into a unique code. This coding process allows for easier
comparison of the newly acquired facial data to stored
facial data.
 Matching- The newly acquired facial data is compared
to the stored data and (ideally) linked to at least one
stored facial representation.
 The system maps the face and creates a
faceprint, a unique numerical code for that
face. Once the system has stored a
faceprint, it can compare it to the
thousands or millions of faceprints stored in
a database.
 Each faceprint is stored as an 84-byte file.
Strengths
 It has the ability to leverage existing image
acquisition equipment.
 It can search against static images such as
driver’s license photographs.
 It is the only biometric able to operate without
user cooperation.
Weaknesses
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics reduce
matching accuracy.
 It has the potential for privacy abuse due to
noncooperative enrollment and identification
capabilities.
Applications
Replacement of PIN, physical tokens
No need of human assistance for identification
Prison visitor systems
Border control
Voting system
Computer security
Banking using ATM
Physical access control of buildings ,areas etc.
Advantages
• Convenient, social acceptability
• Easy to use
• Inexpensive technique of identification
Disadvantage
• Problem with false rejection when people
change their hair style, grow or shave a beard
or wear glasses.
• Identical twins
Conclusion
• Factors such as environmental changes
and mild changes in appearance impact
the technology to a greater degree
than many expect.
• For implementations where the
biometric system must verify and
identify users reliably over time, facial
scan can be a very difficult, but not
impossible, technology to implement
successfully.
References
• www.google.com
• www.wikipedia.com
Thank You…

More Related Content

What's hot

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 

What's hot (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition
Face recognition Face recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 

Viewers also liked

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR Koduru KrisHna
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motionmicansinfotech
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationIAEME Publication
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...CSCJournals
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7swathi b
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
Human detection iccv09
Human detection iccv09Human detection iccv09
Human detection iccv09fanghuaxue
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition systemavinash raibole
 
Text to speech converter in C#.NET
Text to speech converter in C#.NETText to speech converter in C#.NET
Text to speech converter in C#.NETMandeep Cheema
 
Face Recognition on MATLAB
Face Recognition on MATLABFace Recognition on MATLAB
Face Recognition on MATLABMukesh Taneja
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalahmad abdelhafeez
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniquesAbhineet Bhamra
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 

Viewers also liked (20)

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7
 
C# simplified
C#  simplifiedC#  simplified
C# simplified
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Thesis
ThesisThesis
Thesis
 
Human detection iccv09
Human detection iccv09Human detection iccv09
Human detection iccv09
 
Voice recognition system
Voice recognition systemVoice recognition system
Voice recognition system
 
Text to speech converter in C#.NET
Text to speech converter in C#.NETText to speech converter in C#.NET
Text to speech converter in C#.NET
 
Face Recognition on MATLAB
Face Recognition on MATLABFace Recognition on MATLAB
Face Recognition on MATLAB
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Face recognigion system ppt

face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptxTejas More
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 

Similar to Face recognigion system ppt (20)

face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Face recognigion system ppt

  • 1. Submitted To: Submitted By: Prof. Sandeep Santosh Kashish Garg 1130319 Face Recognition
  • 2. Contents  Introduction  History  Facial Recognition  Implementation  How it works  Strengths & Weaknesses  Applications  Advantages  Disadvantages  Conclusion  References
  • 3. Introduction  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances.
  • 4. Contd…  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  Face recognition technology may solve this problem since a face is undeniably connected to its owner except in the case of identical twins.
  • 5. Facial Recognition ???  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
  • 6. History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair Color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition.
  • 7. Facial Recognition In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 8. Contd…  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 9. Implementation The implementation of face recognition technology includes the following four stages: • Image acquisition • Image processing • Distinctive characteristic location • Template creation • Template matching
  • 10. Image acquisition • Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution. • High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 11.
  • 12. Image Processing Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.  First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 13. Distinctive characteristic location  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.  The features most often utilized in facial- scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 14. Contd..  Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables.
  • 16. Template matching • It compares match templates against enrollment templates. • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds. • facial-scan is not as effective as finger-scan or iris-scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial- scan identification searches.
  • 17. How Facial Recognition System Works  Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.  VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 18. Contd.. Here are few nodal points that are measured by the software. 1. distance between the eyes 2. width of the nose 3. depth of the eye socket 4. cheekbones 5. jaw line 6. chin
  • 19. SOFTWARE  Detection- when the system is attached to a video surveilance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high- resolution search only after a head-like shape is detected.  Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.
  • 20. Contd…  Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.  Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 21.  The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database.  Each faceprint is stored as an 84-byte file.
  • 22. Strengths  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation.
  • 23. Weaknesses  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to noncooperative enrollment and identification capabilities.
  • 24. Applications Replacement of PIN, physical tokens No need of human assistance for identification Prison visitor systems Border control Voting system Computer security Banking using ATM Physical access control of buildings ,areas etc.
  • 25. Advantages • Convenient, social acceptability • Easy to use • Inexpensive technique of identification
  • 26. Disadvantage • Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. • Identical twins
  • 27. Conclusion • Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.

Editor's Notes

  1. 1