SlideShare uma empresa Scribd logo
1 de 37
FACE RECOGNITION
TECHNOLOGY

SARATH GOVIND K.K
S7 IT
NO:33
GECI
Introduction
• Face recognition is a challenging task in
pattern recognition research.
• Most technology are based on image
• It ensure user authentication and security.
What are biometrics?
• A biometric is a unique, measurable
characteristic of a human being .
• used to automatically recognize an individual
or verify an individual’s identity.
• measure both physiological and behavioral
characteristics.
Physiological biometrics
•
•
•
•
•

a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
Behavioral biometrics
• based on measurements and data derived
from an action.
• a. Voice-scan
• b. Signature-scan
• c. Keystroke-scan
Why we choose face recognition over
other biometric?
• It requires no physical interaction on behalf of
the user.
• It can use your existing hardware
infrastructure, existing cameras and image
capture Devices will work with no problems
The Face
• The face is an important part of who you are
and how people identify you.
• Expect in the case of identical twins
Continued..
• In face recognition there are two types of
comparisons
• Verification and identification
Verification
• This is where the system compares the given
individual with who that individual says they
are, and gives a yes or no decision.
Identification
• This is where the system compares the given
individual to all the Other individuals in the
database and gives a ranked list of matches.
Continued…
• All identification or authentication
technologies operate using the following four
stages:
• Capture
• Extraction
• Comparison
• Match/non match
Capture
• A physical or behavioral sample is captured by
the system during Enrollment and also in
identification or verification process
Extraction
• unique data is extracted from the sample and
a template is created.
Comparison
• the template is then compared with a new
sample stored in the data base
Match /non match
• the system decides if the features extracted
from the new Samples are a match or a non
match
Continued..
• Face recognition technology analyze the
unique shape, pattern and positioning of the
facial features.
• Face recognition is very complex technology
and is largely software based.
• The face recognition system locates the head
and finally the eyes of the individual.
Continued..
• A matrix is then developed based on the
characteristics of the Individual’s face.
• This matrix is then compared to matrices that
are in a database and a similarity score is
generated for each comparison.
Capturing methods
• Video imaging
• Thermal imaging
Video imaging
• Video imaging is more common as standard
video cameras can be used .
• The complete facial image is usually captured
and a number of points on the face can then
be mapped, position of the eyes, mouth, nose
tip and the nostrils as a example.
Thermal imaging
• It has better accuracy .
• it uses facial temperature variations caused by
vein structure as the distinguishing traits.
• As the heat pattern is emitted from the face
itself without source of external radiation
these systems can capture images despite the
lighting condition, even in the dark.
Thermal imaging continued..
• The drawback is high cost.
• They are more expensive than standard video
cameras.
Block diagram..
• Fig 1.
CAPTURE

EXTRACT

COMPARISON

MATCH/
NO MATCH

ACCEPT/
REJUCT
Components of face recognition
system
• An automated mechanism that scans and
captures a digital or an analog image of a living
personal characteristics.(enrollment module)
• Another entity which handles compression,
processing, storage and compression of the
captured data with stored data (database)
• The third interfaces with the application system (
identification module)
Explanation
• User interface captures the analog or digital
image of the person's face. In the enrollment
module the obtained sample is preprocessed
and analyzed. This analyzed data is stored in
the database for the purpose of future
comparison.
Continued..
• The database compresses the obtained
sample and stores it. It should have retrieval
property also that is it compares all the stored
sample with the newly obtained sample and
retrieves the matched sample for the purpose
of verification by the user and determine
whether the match declared is right or wrong.
Continued..
• The verification module also consists of a
preprocessing system.
• Verification means the system checks as to who
the person says he or she is and gives a yes or no
decision.
• In this module the newly obtained sample is
preprocessed and compared with the sample
stored in the database.
• The decision is taken depending on the match
obtained from the database. Correspondingly the
sample is accepted or rejected.
Performance
• False acceptance rates(FAR)
• False rejection rates(FRR)
FAR
• The probability that a system will incorrectly
identify an individual or will fail to reject an
imposter.
• It is also called as type 2 error rate
FAR
• FAR= NFA/NIIA
• Where FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter
identification attempts
FRR
• The probability that a system will fail to
identify an enrollee. It is also called
• type 1 error rate.
FRR
•
•
•
•

FRR= NFR/NEIA
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification
attempt
Response time
• The time period required by a biometric
system to return a decision on identification of
a sample.
Threshold/ decision Threshold:
• The acceptance or rejection of a data is
dependent on the match score falling above
or below the threshold.
• The threshold is adjustable so that the system
can be made more or less strict; depending on
the requirements of any given application.
Conclusion
• Face recognition technologies have been
associated generally with very costly top secure
applications. Today the core technologies have
evolved and the cost of equipments is going
down dramatically due to the integration and the
increasing processing power. Certain applications
of face recognition technology are now cost
effective, reliable and highly accurate. As a result
there are no technological or financial barriers for
stepping from the pilot project to widespread
deployment.
References
• IEEE Intelligent Systems
• M.A. Turk and A.P. Pent land, “Face
Recognition Using Eigen faces”, IEEE Conf. on
Computer Vision and Pattern Recognition, pp.
586-591, 1991.

Mais conteúdo relacionado

Mais procurados

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 

Mais procurados (20)

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Computer vision ppt
Computer vision pptComputer vision ppt
Computer vision ppt
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Computer vision
Computer visionComputer vision
Computer vision
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 

Destaque

Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
Sumeet Kakani
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Divya Tirunagari
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
Smriti Tikoo
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
Wesley De Neve
 

Destaque (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
 
Women Body Builders
Women Body BuildersWomen Body Builders
Women Body Builders
 
Academic Entrepreneurship at UCY
Academic Entrepreneurship at UCYAcademic Entrepreneurship at UCY
Academic Entrepreneurship at UCY
 
Face Recognition with Camera
Face Recognition with CameraFace Recognition with Camera
Face Recognition with Camera
 
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
 

Semelhante a Face recognition technology

Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 

Semelhante a Face recognition technology (20)

Face recognition
Face recognitionFace recognition
Face recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face recognition
Face recognition Face recognition
Face recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Face recognition technology

  • 2. Introduction • Face recognition is a challenging task in pattern recognition research. • Most technology are based on image • It ensure user authentication and security.
  • 3. What are biometrics? • A biometric is a unique, measurable characteristic of a human being . • used to automatically recognize an individual or verify an individual’s identity. • measure both physiological and behavioral characteristics.
  • 4. Physiological biometrics • • • • • a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan
  • 5. Behavioral biometrics • based on measurements and data derived from an action. • a. Voice-scan • b. Signature-scan • c. Keystroke-scan
  • 6. Why we choose face recognition over other biometric? • It requires no physical interaction on behalf of the user. • It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
  • 7. The Face • The face is an important part of who you are and how people identify you. • Expect in the case of identical twins
  • 8. Continued.. • In face recognition there are two types of comparisons • Verification and identification
  • 9. Verification • This is where the system compares the given individual with who that individual says they are, and gives a yes or no decision.
  • 10. Identification • This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 11. Continued… • All identification or authentication technologies operate using the following four stages: • Capture • Extraction • Comparison • Match/non match
  • 12. Capture • A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process
  • 13. Extraction • unique data is extracted from the sample and a template is created.
  • 14. Comparison • the template is then compared with a new sample stored in the data base
  • 15. Match /non match • the system decides if the features extracted from the new Samples are a match or a non match
  • 16. Continued.. • Face recognition technology analyze the unique shape, pattern and positioning of the facial features. • Face recognition is very complex technology and is largely software based. • The face recognition system locates the head and finally the eyes of the individual.
  • 17. Continued.. • A matrix is then developed based on the characteristics of the Individual’s face. • This matrix is then compared to matrices that are in a database and a similarity score is generated for each comparison.
  • 18. Capturing methods • Video imaging • Thermal imaging
  • 19. Video imaging • Video imaging is more common as standard video cameras can be used . • The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth, nose tip and the nostrils as a example.
  • 20.
  • 21. Thermal imaging • It has better accuracy . • it uses facial temperature variations caused by vein structure as the distinguishing traits. • As the heat pattern is emitted from the face itself without source of external radiation these systems can capture images despite the lighting condition, even in the dark.
  • 22. Thermal imaging continued.. • The drawback is high cost. • They are more expensive than standard video cameras.
  • 23. Block diagram.. • Fig 1. CAPTURE EXTRACT COMPARISON MATCH/ NO MATCH ACCEPT/ REJUCT
  • 24. Components of face recognition system • An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.(enrollment module) • Another entity which handles compression, processing, storage and compression of the captured data with stored data (database) • The third interfaces with the application system ( identification module)
  • 25.
  • 26. Explanation • User interface captures the analog or digital image of the person's face. In the enrollment module the obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose of future comparison.
  • 27. Continued.. • The database compresses the obtained sample and stores it. It should have retrieval property also that is it compares all the stored sample with the newly obtained sample and retrieves the matched sample for the purpose of verification by the user and determine whether the match declared is right or wrong.
  • 28. Continued.. • The verification module also consists of a preprocessing system. • Verification means the system checks as to who the person says he or she is and gives a yes or no decision. • In this module the newly obtained sample is preprocessed and compared with the sample stored in the database. • The decision is taken depending on the match obtained from the database. Correspondingly the sample is accepted or rejected.
  • 29. Performance • False acceptance rates(FAR) • False rejection rates(FRR)
  • 30. FAR • The probability that a system will incorrectly identify an individual or will fail to reject an imposter. • It is also called as type 2 error rate
  • 31. FAR • FAR= NFA/NIIA • Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 32. FRR • The probability that a system will fail to identify an enrollee. It is also called • type 1 error rate.
  • 33. FRR • • • • FRR= NFR/NEIA FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt
  • 34. Response time • The time period required by a biometric system to return a decision on identification of a sample.
  • 35. Threshold/ decision Threshold: • The acceptance or rejection of a data is dependent on the match score falling above or below the threshold. • The threshold is adjustable so that the system can be made more or less strict; depending on the requirements of any given application.
  • 36. Conclusion • Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment.
  • 37. References • IEEE Intelligent Systems • M.A. Turk and A.P. Pent land, “Face Recognition Using Eigen faces”, IEEE Conf. on Computer Vision and Pattern Recognition, pp. 586-591, 1991.