SlideShare uma empresa Scribd logo
1 de 31
CONTENTS :- 
 Introduction 
 Biometrics 
 Face Recognition 
 Implementation 
 How it works ? 
 Advantages and Disadvantages 
 Applications 
 Conclusion 
 References
INTRODUCTION :- 
 Everyday actions are increasingly being handled 
electronically, instead of pencil and paper or face 
to face. 
 This growth in electronic transactions results in 
great demand for fast and accurate user 
identification and authentication.
 Access codes for buildings, banks accounts and 
computer systems often use PIN's for identification 
and security clearances. 
 Using the proper PIN gains access, but the user of 
the PIN is not verified. When credit and ATM cards 
are lost or stolen, an unauthorized user can often 
come up with the correct personal codes. 
 Face recognition technology may solve this problem 
since a face is undeniably connected to its owner 
except in the case of identical twins.
BIOMETRICS :- 
 A biometric is a unique, measurable characteristic of a 
human being that can be used to automatically 
recognize an individual or verify an individual’s 
identity. 
 Biometrics can measure both physiological and 
behavioral characteristics. 
 Physiological biometrics:- This biometrics is based on 
measurements and data derived from direct 
measurement of a part of the human body. 
 Behavioral biometrics:- this biometrics is based on 
measurements and data derived from an action.
TYPES OF BIOMETRICS :- 
PHYSIOLOGICAL 
a. Finger-scan 
b. Facial Recognition 
c. Iris-scan 
d. Retina-scan 
e. Hand-scan 
BEHAVIORAL 
a. Voice-scan 
b. Signature-scan 
c. Keystroke-scan
 It requires no physical interaction on behalf of the 
user. 
 It is accurate and allows for high enrolment and 
verification rates. 
 It does not require an expert to interpret the 
comparison result. 
 It can use your existing hardware infrastructure, 
existing cameras and image capture. Devices will work 
with no problems. 
 It is the only biometric that allow you to perform 
passive identification in a one to many environments.
FACE RECOGNITION 
 In Face recognition there are two types of comparisons:- 
 VERIFICATION- The system compares the given 
individual with who they say they are and gives a yes or 
no decision. 
 IDENTIFICATION- The system compares the given 
individual to all the Other individuals in the database 
and gives a ranked list of matches.
CONTD… 
 All identification or authentication technologies 
operate using the following four stages: 
 Capture: A physical or behavioral sample is captured 
by the system during Enrollment and also in 
identification or verification process. 
 Extraction: unique data is extracted from the sample 
and a template is created. 
 Comparison: the template is then compared with a 
new sample. 
 Match/non-match: the system decides if the 
features extracted from the new Samples are a match 
or a non match.
IMPLEMENTATION 
The implementation of face recognition technology 
includes the following four stages: 
 Image acquisition 
 Image processing 
 Distinctive characteristic location 
 Template creation 
 Template matching
IMAGE ACQUISITION 
 Facial-scan technology can acquire faces from almost 
any static camera or video system that generates images 
of sufficient quality and resolution. 
 High-quality enrollment is essential to eventual 
verification and identification enrollment images define 
the facial characteristics to be used in all future 
authentication events.
IMAGE PROCESSING 
 Images are cropped such that the ovoid facial image 
remains, and color images are normally converted to 
black and white in order to facilitate initial comparisons 
based on grayscale characteristics. 
 First the presence of faces or face in a scene must be 
detected. Once the face is detected, it must be localized 
and Normalization process may be required to bring the 
dimensions of the live facial sample in alignment with 
the one on the template.
DISTINCTIVE CHARACTERISTIC LOCATION 
 All facial-scan systems attempt to match visible facial 
features in a fashion similar to the way people recognize 
one another. 
 The features most often utilized in facial-scan systems 
are those least likely to change significantly over time: 
upper ridges of the eye sockets, areas around the 
cheekbones, sides of the mouth, nose shape, and the 
position of major features relative to each other.
CONTD.. 
 Behavioural changes such as alteration of hairstyle, 
changes in makeup, growing or shaving facial hair, 
adding or removing eyeglasses are behaviours that 
impact the ability of facial-scan systems to locate 
distinctive features, facial-scan systems are not yet 
developed to the point where they can overcome 
such variables.
TEMPLATE CREATION
 Enrolment templates are normally created from 
a multiplicity of processed facial images. 
 These templates can vary in size from less than 
100 bytes, generated through certain vendors 
and to over 3K for templates. 
 The 3K template is by far the largest among 
technologies considered physiological 
biometrics. 
 Larger templates are normally associated with 
behavioural biometrics.
TEMPLATE MATCHING 
 It compares match templates against enrolment 
templates. 
 A series of images is acquired and scored against the 
enrolment, so that a user attempting 1:1 verification 
within a facial-scan system may have 10 to 20 match 
attempts take place within 1 to 2 seconds. 
 facial-scan is not as effective as finger-scan or iris-scan 
in identifying a single individual from a large 
database, a number of potential matches are generally 
returned after large-scale facial-scan identification 
searches.
HOW FACIAL RECOGNITION SYSTEM 
WORKS 
 Facial recognition software is based on the ability to 
first recognize faces, which is a technological feat in 
itself. If you look at the mirror, you can see that your 
face has certain distinguishable landmarks. These are 
the peaks and valleys that make up the different facial 
features. 
 VISIONICS defines these landmarks as nodal points. 
There are about 80 nodal points on a human face.
CONTD.. 
Here are few nodal points that are measured by the 
software. 
 Distance between the eyes 
 Width of the nose 
 Depth of the eye socket 
 Cheekbones 
 Jaw line 
 Chin
SOFTWARE 
 Detection- When the system is attached to a video 
surveillance system, the recognition software 
searches the field of view of a video camera for 
faces. If there is a face in the view, it is detected 
within a fraction of a second. A multi-scale algorithm 
is used to search for faces in low resolution. The 
system switches to a high-resolution search only after 
a head-like shape is detected. 
 Alignment- Once a face is detected, the system 
determines the head's position, size and pose. A face 
needs to be turned at least 35 degrees toward the 
camera for the system to register it.
 Normalization-The image of the head is scaled and 
rotated so that it can be registered and mapped into an 
appropriate size and pose. Normalization is performed 
regardless of the head's location and distance from the 
camera. Light does not impact the normalization 
process. 
 Representation-The system translates the facial data 
into a unique code. This coding process allows for 
easier comparison of the newly acquired facial data to 
stored facial data. 
 Matching- The newly acquired facial data is 
compared to the stored data and (ideally) linked to at 
least one stored facial representation.
 The system maps the face and creates a face 
print, a unique numerical code for that face. 
Once the system has stored a face print, it can 
compare it to the thousands or millions of face 
prints stored in a database. 
 Each face print is stored as an 84-byte file.
ADVANTAGES AND DISADVANTAGES 
Advantages: 
 There are many benefits to face recognition systems such as 
its convenience and Social acceptability. all you need is your 
picture taken for it to work. 
Face recognition is easy to use and in many cases it can be 
performed without a Person even knowing. 
Face recognition is also one of the most inexpensive 
biometric in the market and Its price should continue to go 
down. 
Disadvantages: 
 Face recognition systems can’t tell the difference between 
identical twins.
APPLICATIONS 
The natural use of face recognition technology is the 
replacement of PIN. 
Government Use: 
Law Enforcement: Minimizing victim trauma verifying 
Identify for court records, and comparing school 
surveillance camera images to know child molesters. 
Security/Counterterrorism: Access control, comparing 
surveillance images to Know terrorist. 
Immigration: Rapid progression through Customs. 
Voter verification: Where eligible politicians are required to 
verify their identity during a voting process this is intended to 
stop “proxy‟ voting where the vote may not go as expected.
Commercial Use: 
Residential Security: Alert homeowners of approaching 
personnel. 
Banking using ATM: The software is able to quickly 
verify a customer’s face. 
Physical access control of buildings areas, doors, cars or 
net access.
CONCLUSION 
 Factors such as environmental changes and mild changes 
in appearance impact the technology to a greater degree 
than many expect. 
 For implementations where the biometric system must 
verify and identify users reliably over time, facial scan 
can be a very difficult, but not impossible, technology to 
implement successfully.
REFERENCES 
 Biometricgroup.com/wiley 
 Wikipedia.org 
 Google
Face Recognition
Face Recognition

Mais conteúdo relacionado

Mais procurados

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
12202843
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 

Mais procurados (20)

Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognization technology
Face recognization technologyFace recognization technology
Face recognization technology
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
face recognition
face recognitionface recognition
face recognition
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognition
Face recognitionFace recognition
Face recognition
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

Destaque

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

Destaque (14)

Improved license plate recognition for low resolution cctv forensics by integ...
Improved license plate recognition for low resolution cctv forensics by integ...Improved license plate recognition for low resolution cctv forensics by integ...
Improved license plate recognition for low resolution cctv forensics by integ...
 
Resolution enhancement of low-quality videos using a high-resolution frame
Resolution enhancement of low-quality videos using a high-resolution frameResolution enhancement of low-quality videos using a high-resolution frame
Resolution enhancement of low-quality videos using a high-resolution frame
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
Biochipss
BiochipssBiochipss
Biochipss
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
3D internet
3D internet3D internet
3D internet
 
Human Recognition in Video
Human Recognition in VideoHuman Recognition in Video
Human Recognition in Video
 
Data compession
Data compession Data compession
Data compession
 
Biochips
BiochipsBiochips
Biochips
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Biometrics Final Visionics
Biometrics Final VisionicsBiometrics Final Visionics
Biometrics Final Visionics
 
4G Technology
4G Technology4G Technology
4G Technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 

Semelhante a Face Recognition

Semelhante a Face Recognition (20)

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 

Último

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Último (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Face Recognition

  • 1.
  • 2. CONTENTS :-  Introduction  Biometrics  Face Recognition  Implementation  How it works ?  Advantages and Disadvantages  Applications  Conclusion  References
  • 3. INTRODUCTION :-  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  • 4.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances.  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  Face recognition technology may solve this problem since a face is undeniably connected to its owner except in the case of identical twins.
  • 5. BIOMETRICS :-  A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity.  Biometrics can measure both physiological and behavioral characteristics.  Physiological biometrics:- This biometrics is based on measurements and data derived from direct measurement of a part of the human body.  Behavioral biometrics:- this biometrics is based on measurements and data derived from an action.
  • 6. TYPES OF BIOMETRICS :- PHYSIOLOGICAL a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan BEHAVIORAL a. Voice-scan b. Signature-scan c. Keystroke-scan
  • 7.
  • 8.  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It does not require an expert to interpret the comparison result.  It can use your existing hardware infrastructure, existing cameras and image capture. Devices will work with no problems.  It is the only biometric that allow you to perform passive identification in a one to many environments.
  • 9. FACE RECOGNITION  In Face recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 10. CONTD…  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 11. IMPLEMENTATION The implementation of face recognition technology includes the following four stages:  Image acquisition  Image processing  Distinctive characteristic location  Template creation  Template matching
  • 12. IMAGE ACQUISITION  Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution.  High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 13.
  • 14. IMAGE PROCESSING  Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.  First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 15. DISTINCTIVE CHARACTERISTIC LOCATION  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.  The features most often utilized in facial-scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 16. CONTD..  Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables.
  • 18.  Enrolment templates are normally created from a multiplicity of processed facial images.  These templates can vary in size from less than 100 bytes, generated through certain vendors and to over 3K for templates.  The 3K template is by far the largest among technologies considered physiological biometrics.  Larger templates are normally associated with behavioural biometrics.
  • 19. TEMPLATE MATCHING  It compares match templates against enrolment templates.  A series of images is acquired and scored against the enrolment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds.  facial-scan is not as effective as finger-scan or iris-scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial-scan identification searches.
  • 20. HOW FACIAL RECOGNITION SYSTEM WORKS  Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.  VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 21. CONTD.. Here are few nodal points that are measured by the software.  Distance between the eyes  Width of the nose  Depth of the eye socket  Cheekbones  Jaw line  Chin
  • 22. SOFTWARE  Detection- When the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high-resolution search only after a head-like shape is detected.  Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.
  • 23.  Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.  Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 24.  The system maps the face and creates a face print, a unique numerical code for that face. Once the system has stored a face print, it can compare it to the thousands or millions of face prints stored in a database.  Each face print is stored as an 84-byte file.
  • 25. ADVANTAGES AND DISADVANTAGES Advantages:  There are many benefits to face recognition systems such as its convenience and Social acceptability. all you need is your picture taken for it to work. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. Disadvantages:  Face recognition systems can’t tell the difference between identical twins.
  • 26. APPLICATIONS The natural use of face recognition technology is the replacement of PIN. Government Use: Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school surveillance camera images to know child molesters. Security/Counterterrorism: Access control, comparing surveillance images to Know terrorist. Immigration: Rapid progression through Customs. Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop “proxy‟ voting where the vote may not go as expected.
  • 27. Commercial Use: Residential Security: Alert homeowners of approaching personnel. Banking using ATM: The software is able to quickly verify a customer’s face. Physical access control of buildings areas, doors, cars or net access.
  • 28. CONCLUSION  Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect.  For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.
  • 29. REFERENCES  Biometricgroup.com/wiley  Wikipedia.org  Google