SlideShare ist ein Scribd-Unternehmen logo
1 von 37
FACE RECOGNITION
TECHNOLOGY

SARATH GOVIND K.K
S7 IT
NO:33
GECI
Introduction
• Face recognition is a challenging task in
pattern recognition research.
• Most technology are based on image
• It ensure user authentication and security.
What are biometrics?
• A biometric is a unique, measurable
characteristic of a human being .
• used to automatically recognize an individual
or verify an individual’s identity.
• measure both physiological and behavioral
characteristics.
Physiological biometrics
•
•
•
•
•

a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
Behavioral biometrics
• based on measurements and data derived
from an action.
• a. Voice-scan
• b. Signature-scan
• c. Keystroke-scan
Why we choose face recognition over
other biometric?
• It requires no physical interaction on behalf of
the user.
• It can use your existing hardware
infrastructure, existing cameras and image
capture Devices will work with no problems
The Face
• The face is an important part of who you are
and how people identify you.
• Expect in the case of identical twins
Continued..
• In face recognition there are two types of
comparisons
• Verification and identification
Verification
• This is where the system compares the given
individual with who that individual says they
are, and gives a yes or no decision.
Identification
• This is where the system compares the given
individual to all the Other individuals in the
database and gives a ranked list of matches.
Continued…
• All identification or authentication
technologies operate using the following four
stages:
• Capture
• Extraction
• Comparison
• Match/non match
Capture
• A physical or behavioral sample is captured by
the system during Enrollment and also in
identification or verification process
Extraction
• unique data is extracted from the sample and
a template is created.
Comparison
• the template is then compared with a new
sample stored in the data base
Match /non match
• the system decides if the features extracted
from the new Samples are a match or a non
match
Continued..
• Face recognition technology analyze the
unique shape, pattern and positioning of the
facial features.
• Face recognition is very complex technology
and is largely software based.
• The face recognition system locates the head
and finally the eyes of the individual.
Continued..
• A matrix is then developed based on the
characteristics of the Individual’s face.
• This matrix is then compared to matrices that
are in a database and a similarity score is
generated for each comparison.
Capturing methods
• Video imaging
• Thermal imaging
Video imaging
• Video imaging is more common as standard
video cameras can be used .
• The complete facial image is usually captured
and a number of points on the face can then
be mapped, position of the eyes, mouth, nose
tip and the nostrils as a example.
Thermal imaging
• It has better accuracy .
• it uses facial temperature variations caused by
vein structure as the distinguishing traits.
• As the heat pattern is emitted from the face
itself without source of external radiation
these systems can capture images despite the
lighting condition, even in the dark.
Thermal imaging continued..
• The drawback is high cost.
• They are more expensive than standard video
cameras.
Block diagram..
• Fig 1.
CAPTURE

EXTRACT

COMPARISON

MATCH/
NO MATCH

ACCEPT/
REJUCT
Components of face recognition
system
• An automated mechanism that scans and
captures a digital or an analog image of a living
personal characteristics.(enrollment module)
• Another entity which handles compression,
processing, storage and compression of the
captured data with stored data (database)
• The third interfaces with the application system (
identification module)
Explanation
• User interface captures the analog or digital
image of the person's face. In the enrollment
module the obtained sample is preprocessed
and analyzed. This analyzed data is stored in
the database for the purpose of future
comparison.
Continued..
• The database compresses the obtained
sample and stores it. It should have retrieval
property also that is it compares all the stored
sample with the newly obtained sample and
retrieves the matched sample for the purpose
of verification by the user and determine
whether the match declared is right or wrong.
Continued..
• The verification module also consists of a
preprocessing system.
• Verification means the system checks as to who
the person says he or she is and gives a yes or no
decision.
• In this module the newly obtained sample is
preprocessed and compared with the sample
stored in the database.
• The decision is taken depending on the match
obtained from the database. Correspondingly the
sample is accepted or rejected.
Performance
• False acceptance rates(FAR)
• False rejection rates(FRR)
FAR
• The probability that a system will incorrectly
identify an individual or will fail to reject an
imposter.
• It is also called as type 2 error rate
FAR
• FAR= NFA/NIIA
• Where FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter
identification attempts
FRR
• The probability that a system will fail to
identify an enrollee. It is also called
• type 1 error rate.
FRR
•
•
•
•

FRR= NFR/NEIA
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification
attempt
Response time
• The time period required by a biometric
system to return a decision on identification of
a sample.
Threshold/ decision Threshold:
• The acceptance or rejection of a data is
dependent on the match score falling above
or below the threshold.
• The threshold is adjustable so that the system
can be made more or less strict; depending on
the requirements of any given application.
Conclusion
• Face recognition technologies have been
associated generally with very costly top secure
applications. Today the core technologies have
evolved and the cost of equipments is going
down dramatically due to the integration and the
increasing processing power. Certain applications
of face recognition technology are now cost
effective, reliable and highly accurate. As a result
there are no technological or financial barriers for
stepping from the pilot project to widespread
deployment.
References
• IEEE Intelligent Systems
• M.A. Turk and A.P. Pent land, “Face
Recognition Using Eigen faces”, IEEE Conf. on
Computer Vision and Pattern Recognition, pp.
586-591, 1991.

Weitere ähnliche Inhalte

Was ist angesagt?

Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Facial expression recognition based on image feature
Facial expression recognition based on image featureFacial expression recognition based on image feature
Facial expression recognition based on image featureTasnim Tara
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) IT Arena
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Facial expression recognition
Facial expression recognitionFacial expression recognition
Facial expression recognitionSachin Mangad
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face IdentificationKalyan Acharjya
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 

Was ist angesagt? (20)

Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Facial expression recognition based on image feature
Facial expression recognition based on image featureFacial expression recognition based on image feature
Facial expression recognition based on image feature
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream) Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
Face Recognition Based on Deep Learning (Yurii Pashchenko Technology Stream)
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Facial expression recognition
Facial expression recognitionFacial expression recognition
Facial expression recognition
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognization
Face recognizationFace recognization
Face recognization
 

Andere mochten auch

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1Ankit Gupta
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face RecognitionMinh Tran
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710BioEnable
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyDivya Tirunagari
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition SystemMd. Atiqur Rahman
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBPMarwan H. Noman
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABSindhi Madhuri
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Wesley De Neve
 
Face Recognition with Camera
Face Recognition with CameraFace Recognition with Camera
Face Recognition with CameraLin BH
 
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...CSCJournals
 

Andere mochten auch (20)

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...Face Recognition for Personal Photos using Online Social Network Context and ...
Face Recognition for Personal Photos using Online Social Network Context and ...
 
Women Body Builders
Women Body BuildersWomen Body Builders
Women Body Builders
 
Academic Entrepreneurship at UCY
Academic Entrepreneurship at UCYAcademic Entrepreneurship at UCY
Academic Entrepreneurship at UCY
 
Face Recognition with Camera
Face Recognition with CameraFace Recognition with Camera
Face Recognition with Camera
 
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
Usage of Shape From Focus Method For 3D Shape Recovery And Identification of ...
 

Ähnlich wie Face Recognition Tech Guide

Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfshivagreenevv
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 

Ähnlich wie Face Recognition Tech Guide (20)

Face recognition
Face recognitionFace recognition
Face recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face recognition
Face recognition Face recognition
Face recognition
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 

Kürzlich hochgeladen

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Face Recognition Tech Guide

  • 2. Introduction • Face recognition is a challenging task in pattern recognition research. • Most technology are based on image • It ensure user authentication and security.
  • 3. What are biometrics? • A biometric is a unique, measurable characteristic of a human being . • used to automatically recognize an individual or verify an individual’s identity. • measure both physiological and behavioral characteristics.
  • 4. Physiological biometrics • • • • • a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan
  • 5. Behavioral biometrics • based on measurements and data derived from an action. • a. Voice-scan • b. Signature-scan • c. Keystroke-scan
  • 6. Why we choose face recognition over other biometric? • It requires no physical interaction on behalf of the user. • It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
  • 7. The Face • The face is an important part of who you are and how people identify you. • Expect in the case of identical twins
  • 8. Continued.. • In face recognition there are two types of comparisons • Verification and identification
  • 9. Verification • This is where the system compares the given individual with who that individual says they are, and gives a yes or no decision.
  • 10. Identification • This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 11. Continued… • All identification or authentication technologies operate using the following four stages: • Capture • Extraction • Comparison • Match/non match
  • 12. Capture • A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process
  • 13. Extraction • unique data is extracted from the sample and a template is created.
  • 14. Comparison • the template is then compared with a new sample stored in the data base
  • 15. Match /non match • the system decides if the features extracted from the new Samples are a match or a non match
  • 16. Continued.. • Face recognition technology analyze the unique shape, pattern and positioning of the facial features. • Face recognition is very complex technology and is largely software based. • The face recognition system locates the head and finally the eyes of the individual.
  • 17. Continued.. • A matrix is then developed based on the characteristics of the Individual’s face. • This matrix is then compared to matrices that are in a database and a similarity score is generated for each comparison.
  • 18. Capturing methods • Video imaging • Thermal imaging
  • 19. Video imaging • Video imaging is more common as standard video cameras can be used . • The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth, nose tip and the nostrils as a example.
  • 20.
  • 21. Thermal imaging • It has better accuracy . • it uses facial temperature variations caused by vein structure as the distinguishing traits. • As the heat pattern is emitted from the face itself without source of external radiation these systems can capture images despite the lighting condition, even in the dark.
  • 22. Thermal imaging continued.. • The drawback is high cost. • They are more expensive than standard video cameras.
  • 23. Block diagram.. • Fig 1. CAPTURE EXTRACT COMPARISON MATCH/ NO MATCH ACCEPT/ REJUCT
  • 24. Components of face recognition system • An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.(enrollment module) • Another entity which handles compression, processing, storage and compression of the captured data with stored data (database) • The third interfaces with the application system ( identification module)
  • 25.
  • 26. Explanation • User interface captures the analog or digital image of the person's face. In the enrollment module the obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose of future comparison.
  • 27. Continued.. • The database compresses the obtained sample and stores it. It should have retrieval property also that is it compares all the stored sample with the newly obtained sample and retrieves the matched sample for the purpose of verification by the user and determine whether the match declared is right or wrong.
  • 28. Continued.. • The verification module also consists of a preprocessing system. • Verification means the system checks as to who the person says he or she is and gives a yes or no decision. • In this module the newly obtained sample is preprocessed and compared with the sample stored in the database. • The decision is taken depending on the match obtained from the database. Correspondingly the sample is accepted or rejected.
  • 29. Performance • False acceptance rates(FAR) • False rejection rates(FRR)
  • 30. FAR • The probability that a system will incorrectly identify an individual or will fail to reject an imposter. • It is also called as type 2 error rate
  • 31. FAR • FAR= NFA/NIIA • Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 32. FRR • The probability that a system will fail to identify an enrollee. It is also called • type 1 error rate.
  • 33. FRR • • • • FRR= NFR/NEIA FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt
  • 34. Response time • The time period required by a biometric system to return a decision on identification of a sample.
  • 35. Threshold/ decision Threshold: • The acceptance or rejection of a data is dependent on the match score falling above or below the threshold. • The threshold is adjustable so that the system can be made more or less strict; depending on the requirements of any given application.
  • 36. Conclusion • Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment.
  • 37. References • IEEE Intelligent Systems • M.A. Turk and A.P. Pent land, “Face Recognition Using Eigen faces”, IEEE Conf. on Computer Vision and Pattern Recognition, pp. 586-591, 1991.