SlideShare uma empresa Scribd logo
1 de 30
.
A facial recognition system is a computer application for
automatically identifying or verifying a person from a digital
image or a video frame from a video source. One of the ways
to do this is by comparing selected facial features from the
image and a facial database.
It is typically used in security systems and can be compared to
other biometrics such as fingerprint or eye iris recognition
system.
 It requires no physical interaction on behalf of the user.
 It does not require an expert to interpret the comparison
result.
 Identify a particular person from large crowd.
 Verification of credit card, personal ID, passport.
 Different methods of face recognition.
 Feature extraction methods
 Holistic methods
 Hybrid methods
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets
Every face has at least 80 distinguishable parts called
nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets
4. Structure of cheek bones
Every face has at least 80 distinguishable parts
called nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets
4. Structure of the cheek bones
5. Length of jaw line
A general face recognition software conducts a comparison of these
parameters to the images in its database.
Depending upon the matches found, it determines the result.
This technique is known as feature based matching and it is the most basic
method of facial recognition.
The only way to overcome this challenge is better equipment, i.e.
basically , use of high tech cameras.
It is very much essential for the system to catch the image
accurately.
The only way to overcome this challenge is better
ALGORITHMS for facial recognitions. If the systems are
programmed for every possible permutation and combination of
the image, an accurate match can be achieved.
Some algorithms that try to overcome this problem are as
follows:
-Half-face based algorithm
-Perturbation Space Method(PSM).
-Local binary pattern
-Neural network, etc.
PSM algorithm that converts two dimensional image (e.g.
photographs into three – dimensions (such a process is called
“Morphing”).
The three – dimensionsional representation of the head
are then rotated in
Both the left-to-right and up-and down directions.
The facial recognition equipment used for basic
surveillance purpose has 3 important components.
1. The camera or scanning device
2. Infrared illuminator
3. An efficient software
An IR-illuminator is a device that emits infrared light-low frequency
electromagnetic radiation that's outside the visible spectrum. In other words, it
gives off light that a camera can pick up and use, but that a person can't see-so
while it's still dark to the human eye, the camera can see just fine.
There are 3 main types of infrared illuminators namely diodes, lamps & lasers.
Facial recognition is a very useful mechanism when it comes to office
related user identification. One such example is a product of Havon
industries called FaceID.
Face ID is industry first embedded facial recognition system with leading
“Dual Sensor” Facial Recognition Algorithm, which designed for
application like physical access control and time attendance, identity
management and so on.
In around 10 years from now, it is being estimated that facial
recognition technology will be the backbone of all major security,
home and networking service. With the growth of social
networking over the web, unbelievably accurate facial recognition
algorithms and advanced equipment, a person’s face, no mater
ageing or disguises or damage, can be recognized and data about
that person can be produced.
Here is a small glimpse of what facial recognition technology
would make of the future social networking….
Assuming amazing resolutions, facial and object
recognition, this is how social networking would be in
the future….
Pros:
1.Better security systems.
2.Easy user verifications.
3.Greatly reduces current load on security and judicial systems.
Cons:
1.Privacy issues.
2.Even helps in kidnapping!
3.Errors in detection may cause inconvenience to innocent users.
• Counting of people in a
room (e.g. for
temperature adjustment)
• Domestic security systems
• Police surveillance
• Domestic Computer / phone identification
systems
• Employee management systems in Companies.
• National and International security systems.
1. W. Bledsoe. Man-machine facial recognition
2. T. Kanade Computer Recognition of Human Faces
3. www.wikipedia.com
4. www.authorstream.com
5.www.howstuffworks.com
6. www.inttelix.com
7. www.face-rec.org
8. www.facialrecognitionsolution.com
9. www.facedetection.com

Mais conteúdo relacionado

Mais procurados

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 

Mais procurados (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

Destaque

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710BioEnable
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyDivya Tirunagari
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Ramatís - A Missão do Espiritismo
Ramatís - A Missão do EspiritismoRamatís - A Missão do Espiritismo
Ramatís - A Missão do Espiritismouniversalismo-7
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicFinalyear Projects
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposalIftikhar Ahmad
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghebiitsumudu
 

Destaque (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Embedded Technology
Embedded TechnologyEmbedded Technology
Embedded Technology
 
Ramatís - A Missão do Espiritismo
Ramatís - A Missão do EspiritismoRamatís - A Missão do Espiritismo
Ramatís - A Missão do Espiritismo
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Justlook presentation
Justlook presentationJustlook presentation
Justlook presentation
 
Watermark
WatermarkWatermark
Watermark
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logic
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Watermark
WatermarkWatermark
Watermark
 
Image processing research proposal
Image processing research proposalImage processing research proposal
Image processing research proposal
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 

Semelhante a Face Recognition Technology by Vishal Garg

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxMuhammedNihadP
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyVengadesh Raja
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET Journal
 

Semelhante a Face Recognition Technology by Vishal Garg (20)

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
biometric technology
biometric technologybiometric technology
biometric technology
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured Transaction
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Face Recognition Technology by Vishal Garg

  • 1.
  • 2. .
  • 3. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition system.
  • 4.
  • 5.  It requires no physical interaction on behalf of the user.  It does not require an expert to interpret the comparison result.  Identify a particular person from large crowd.  Verification of credit card, personal ID, passport.
  • 6.
  • 7.  Different methods of face recognition.  Feature extraction methods  Holistic methods  Hybrid methods
  • 8. Every face has at least 80 distinguishable parts called nodal points. Some of them are:
  • 9. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes
  • 10. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose
  • 11. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose 3. Depth of eye sockets
  • 12. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose 3. Depth of eye sockets 4. Structure of cheek bones
  • 13. Every face has at least 80 distinguishable parts called nodal points. Some of them are: 1. Distance between the eyes 2. Width of the nose 3. Depth of eye sockets 4. Structure of the cheek bones 5. Length of jaw line
  • 14. A general face recognition software conducts a comparison of these parameters to the images in its database. Depending upon the matches found, it determines the result. This technique is known as feature based matching and it is the most basic method of facial recognition.
  • 15.
  • 16. The only way to overcome this challenge is better equipment, i.e. basically , use of high tech cameras. It is very much essential for the system to catch the image accurately.
  • 17.
  • 18.
  • 19. The only way to overcome this challenge is better ALGORITHMS for facial recognitions. If the systems are programmed for every possible permutation and combination of the image, an accurate match can be achieved. Some algorithms that try to overcome this problem are as follows: -Half-face based algorithm -Perturbation Space Method(PSM). -Local binary pattern -Neural network, etc.
  • 20. PSM algorithm that converts two dimensional image (e.g. photographs into three – dimensions (such a process is called “Morphing”). The three – dimensionsional representation of the head are then rotated in Both the left-to-right and up-and down directions.
  • 21. The facial recognition equipment used for basic surveillance purpose has 3 important components. 1. The camera or scanning device 2. Infrared illuminator 3. An efficient software
  • 22. An IR-illuminator is a device that emits infrared light-low frequency electromagnetic radiation that's outside the visible spectrum. In other words, it gives off light that a camera can pick up and use, but that a person can't see-so while it's still dark to the human eye, the camera can see just fine. There are 3 main types of infrared illuminators namely diodes, lamps & lasers.
  • 23. Facial recognition is a very useful mechanism when it comes to office related user identification. One such example is a product of Havon industries called FaceID. Face ID is industry first embedded facial recognition system with leading “Dual Sensor” Facial Recognition Algorithm, which designed for application like physical access control and time attendance, identity management and so on.
  • 24. In around 10 years from now, it is being estimated that facial recognition technology will be the backbone of all major security, home and networking service. With the growth of social networking over the web, unbelievably accurate facial recognition algorithms and advanced equipment, a person’s face, no mater ageing or disguises or damage, can be recognized and data about that person can be produced. Here is a small glimpse of what facial recognition technology would make of the future social networking….
  • 25. Assuming amazing resolutions, facial and object recognition, this is how social networking would be in the future….
  • 26. Pros: 1.Better security systems. 2.Easy user verifications. 3.Greatly reduces current load on security and judicial systems. Cons: 1.Privacy issues. 2.Even helps in kidnapping! 3.Errors in detection may cause inconvenience to innocent users.
  • 27. • Counting of people in a room (e.g. for temperature adjustment) • Domestic security systems • Police surveillance • Domestic Computer / phone identification systems • Employee management systems in Companies. • National and International security systems.
  • 28.
  • 29.
  • 30. 1. W. Bledsoe. Man-machine facial recognition 2. T. Kanade Computer Recognition of Human Faces 3. www.wikipedia.com 4. www.authorstream.com 5.www.howstuffworks.com 6. www.inttelix.com 7. www.face-rec.org 8. www.facialrecognitionsolution.com 9. www.facedetection.com