SlideShare uma empresa Scribd logo
1 de 34
 
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition system.
 
Every face has at least 80  distinguishable parts called nodal points.  Some of them are:
Every face has at least 80  distinguishable parts called nodal points.  Some of them are: ,[object Object]
Every face has at least 80  distinguishable parts called nodal points.  Some of them are: ,[object Object],[object Object]
Every face has at least 80  distinguishable parts called nodal points.  Some of them are: ,[object Object],[object Object],[object Object]
Every face has at least 80  distinguishable parts called nodal points.  Some of them are: ,[object Object],[object Object],[object Object],[object Object]
Every face has at least 80  distinguishable parts called nodal points.  Some of them are: ,[object Object],[object Object],[object Object],[object Object],[object Object]
A general face recognition software conducts a comparison of these parameters to the images in its database. Depending upon the matches found, it determines the result. This technique is known as feature based matching and it is the most basic method of facial recognition.
A 3D facial recognition model provides greater accuracy than the feature extraction model. It can also be used in a dark surroundings and has a ability to recognize the subject at different view angles. Using 3D software, the system  Goes through a number of steps to verify the identity of an  individual.
Acquiring an image can be done through a digital  scanning device. Once it detects the face, the system determines heads position, size and pose.
The system then measures the curves of the face on a sub-millimeter scale and creates a template. The system translates this template into a unique code.
The image thus acquired will be compared to the images in the data base and if 3D images are not available to the database, then algorithms used to get a straight face are applied to the 3D image to be matched. Finally in verification, the image is matched to only one image in the database and the result is displayed as shown alongside.
The most commonly used unique feature for facial recognition is iris of the eye. No two human beings, even twins have exactly similar iris.
Image acquisition Matching Segmentation Encoding Images obtained from CASIA. Employs Canny edge detector & Hough  Transform .  Normalization  & use of Log-Gabor filter. HD calculation used for  determining  matches
SEGMENTATION:  Involves locating the iris region and  isolating it. ENCODING:  Creating a template that contains the most  discriminating features of the iris. MATCHING: Comparison of two iris templates and  determining if they belong to the same  individual
This system was a success as 93% of samples gave perfect recognition. Salient features of iris were identified, extracted, encoded then matched as desired. The only setback was the fact that Matlab processed the images slowly thus would not suit real time processing. APPLICATION: Immigration department. ATM identity verification.
-Principal Component Analysis using eigenfaces -Linear Discriminate Analysis -Elastic Bunch Graph Matching using Fisherface algorithm -Hidden Markov model -Neuronal motivated dynamic link matching.
 
The only way to overcome this challenge is better equipment, i.e. basically , use of high tech cameras. It is very much essential for the system to catch the image accurately.
 
 
The only way to overcome this challenge is better ALGORITHMS for facial recognitions. If the systems are programmed for every possible permutation and  combination of the image, an accurate match can be achieved. Some algorithms that try to overcome this problem are as follows: -Half-face based algorithm -Local binary pattern -Neural network, etc.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
An IR-illuminator is a device that emits infrared light-low frequency electromagnetic radiation that's outside the visible spectrum. In other words, it gives off light that a camera can pick up and use, but that a person can't see-so while it's still dark to the human eye, the camera can see just fine . There are 3 main types of infrared illuminators namely diodes, lamps & lasers. IR-illuminator Without IR-illuminator
Other FR equipments generally use variations in software. For a domestic Computer user recognition system, a basic 2D face  recognition algorithm is sufficient. With some basic verifications, the user of the phone or Computer can be identified. Complex algorithms and equipment are used in cases of national and international security issues.
Facial recognition is a very useful mechanism when it comes to office related user identification. One such example is a product of Havon industries called FaceID. Face ID is industry first embedded facial recognition system with leading “Dual Sensor” Facial Recognition Algorithm, which designed for application like physical access control and time attendance, identity management and so on.
In around 10 years from now, it is being estimated that facial recognition technology will be the backbone of all major security, home and networking service. With the growth of social networking over the web, unbelievably accurate facial recognition algorithms and advanced equipment, a person’s face, no mater ageing or disguises or damage, can be recognized and data about that person can be produced. Here is a small glimpse of what facial recognition technology would make of the future social networking….
Assuming amazing resolutions, facial and object recognition, this is how social networking would be in the future….
Pros: 1.Better security systems. 2.Easy user verifications. 3.Greatly reduces current load on security and judicial systems. Cons: 1.Privacy issues. 2.Even helps in kidnapping! 3.Errors in detection may cause inconvenience to innocent users.
 
1. W. Bledsoe. Man-machine facial recognition 2. T. Kanade Computer Recognition of Human Faces 3. www.wikipedia.com 4. www.authorstream.com 5.www.howstuffworks.com 6. www.inttelix.com 7. www.face-rec.org 8. www.facialrecognitionsolution.com 9. www.facedetection.com

Mais conteúdo relacionado

Mais procurados

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
Karmesh Maheshwari
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
Arun ACE
 

Mais procurados (20)

Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 

Destaque

STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
Trevor Parsons
 

Destaque (20)

Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
Cuckoo - Time & Attendance by Opportune
Cuckoo - Time & Attendance by OpportuneCuckoo - Time & Attendance by Opportune
Cuckoo - Time & Attendance by Opportune
 
Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door Unlocking
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENTENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
 
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
 
BAASS Connect 2013 - Time and Attendance
BAASS Connect 2013 - Time and AttendanceBAASS Connect 2013 - Time and Attendance
BAASS Connect 2013 - Time and Attendance
 
MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...
MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...
MODERNIZING L&D: PART 3 – THE REAL CASE STUDIES: ORGANIZATIONS THAT ARE SEEIN...
 
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Why Do You Need BIO-METRIC Time and Attendance?
Why Do You Need BIO-METRIC Time and Attendance?Why Do You Need BIO-METRIC Time and Attendance?
Why Do You Need BIO-METRIC Time and Attendance?
 
THE RADICAL CHANGES OF PERFORMANCE MANAGEMENT
THE RADICAL CHANGES OF PERFORMANCE MANAGEMENTTHE RADICAL CHANGES OF PERFORMANCE MANAGEMENT
THE RADICAL CHANGES OF PERFORMANCE MANAGEMENT
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Image attendance system
Image attendance systemImage attendance system
Image attendance system
 
Suprema Time Attendance & Access Control- Grapple Technologies
Suprema Time Attendance & Access Control- Grapple TechnologiesSuprema Time Attendance & Access Control- Grapple Technologies
Suprema Time Attendance & Access Control- Grapple Technologies
 
Time and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideTime and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com Guide
 
PayPunch Biometric Time and Attendance Solution
PayPunch Biometric Time and Attendance SolutionPayPunch Biometric Time and Attendance Solution
PayPunch Biometric Time and Attendance Solution
 
Quick walkthrough of PeopleSoft Time and Attendance modules
Quick walkthrough of PeopleSoft Time and Attendance modulesQuick walkthrough of PeopleSoft Time and Attendance modules
Quick walkthrough of PeopleSoft Time and Attendance modules
 

Semelhante a Facial recognition technology by vaibhav

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Vengadesh Raja
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
bkbk37
 

Semelhante a Facial recognition technology by vaibhav (20)

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Facial recognition technology by vaibhav

  • 1.  
  • 2. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition system.
  • 3.  
  • 4. Every face has at least 80 distinguishable parts called nodal points. Some of them are:
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. A general face recognition software conducts a comparison of these parameters to the images in its database. Depending upon the matches found, it determines the result. This technique is known as feature based matching and it is the most basic method of facial recognition.
  • 11. A 3D facial recognition model provides greater accuracy than the feature extraction model. It can also be used in a dark surroundings and has a ability to recognize the subject at different view angles. Using 3D software, the system Goes through a number of steps to verify the identity of an individual.
  • 12. Acquiring an image can be done through a digital scanning device. Once it detects the face, the system determines heads position, size and pose.
  • 13. The system then measures the curves of the face on a sub-millimeter scale and creates a template. The system translates this template into a unique code.
  • 14. The image thus acquired will be compared to the images in the data base and if 3D images are not available to the database, then algorithms used to get a straight face are applied to the 3D image to be matched. Finally in verification, the image is matched to only one image in the database and the result is displayed as shown alongside.
  • 15. The most commonly used unique feature for facial recognition is iris of the eye. No two human beings, even twins have exactly similar iris.
  • 16. Image acquisition Matching Segmentation Encoding Images obtained from CASIA. Employs Canny edge detector & Hough Transform . Normalization & use of Log-Gabor filter. HD calculation used for determining matches
  • 17. SEGMENTATION: Involves locating the iris region and isolating it. ENCODING: Creating a template that contains the most discriminating features of the iris. MATCHING: Comparison of two iris templates and determining if they belong to the same individual
  • 18. This system was a success as 93% of samples gave perfect recognition. Salient features of iris were identified, extracted, encoded then matched as desired. The only setback was the fact that Matlab processed the images slowly thus would not suit real time processing. APPLICATION: Immigration department. ATM identity verification.
  • 19. -Principal Component Analysis using eigenfaces -Linear Discriminate Analysis -Elastic Bunch Graph Matching using Fisherface algorithm -Hidden Markov model -Neuronal motivated dynamic link matching.
  • 20.  
  • 21. The only way to overcome this challenge is better equipment, i.e. basically , use of high tech cameras. It is very much essential for the system to catch the image accurately.
  • 22.  
  • 23.  
  • 24. The only way to overcome this challenge is better ALGORITHMS for facial recognitions. If the systems are programmed for every possible permutation and combination of the image, an accurate match can be achieved. Some algorithms that try to overcome this problem are as follows: -Half-face based algorithm -Local binary pattern -Neural network, etc.
  • 25.
  • 26.
  • 27. An IR-illuminator is a device that emits infrared light-low frequency electromagnetic radiation that's outside the visible spectrum. In other words, it gives off light that a camera can pick up and use, but that a person can't see-so while it's still dark to the human eye, the camera can see just fine . There are 3 main types of infrared illuminators namely diodes, lamps & lasers. IR-illuminator Without IR-illuminator
  • 28. Other FR equipments generally use variations in software. For a domestic Computer user recognition system, a basic 2D face recognition algorithm is sufficient. With some basic verifications, the user of the phone or Computer can be identified. Complex algorithms and equipment are used in cases of national and international security issues.
  • 29. Facial recognition is a very useful mechanism when it comes to office related user identification. One such example is a product of Havon industries called FaceID. Face ID is industry first embedded facial recognition system with leading “Dual Sensor” Facial Recognition Algorithm, which designed for application like physical access control and time attendance, identity management and so on.
  • 30. In around 10 years from now, it is being estimated that facial recognition technology will be the backbone of all major security, home and networking service. With the growth of social networking over the web, unbelievably accurate facial recognition algorithms and advanced equipment, a person’s face, no mater ageing or disguises or damage, can be recognized and data about that person can be produced. Here is a small glimpse of what facial recognition technology would make of the future social networking….
  • 31. Assuming amazing resolutions, facial and object recognition, this is how social networking would be in the future….
  • 32. Pros: 1.Better security systems. 2.Easy user verifications. 3.Greatly reduces current load on security and judicial systems. Cons: 1.Privacy issues. 2.Even helps in kidnapping! 3.Errors in detection may cause inconvenience to innocent users.
  • 33.  
  • 34. 1. W. Bledsoe. Man-machine facial recognition 2. T. Kanade Computer Recognition of Human Faces 3. www.wikipedia.com 4. www.authorstream.com 5.www.howstuffworks.com 6. www.inttelix.com 7. www.face-rec.org 8. www.facialrecognitionsolution.com 9. www.facedetection.com